Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



The Vast Cyber-frontier Is Being Threatend With Censorship From The Government
[ view this term paper ]Words: 2556 | Pages: 10

... Communications Decency Act with a vetos of the past versions, President Bill Clinton signed the bill into law on February 8, 1996.1 Before hand, congress approved the largest change of the nation's communications laws in 62 years. One of the largest controversial topics included in the bill is the censorship of pornography, which now is a strenuously enforced crime of distributing knowingly to children under 18. The congress overwhelmingly passed the bill with a landslide 414-16 House vote and a 91-5 Senate vote.2 It seems now that the wide bill might not be what it cracked up to be, as it stands now, anyone who m ...




Technological Literacy
[ view this term paper ]Words: 10060 | Pages: 37

... that researchers and social commentators are looking at much broader social and cultural consequences of the impact of computer mediated communication and, even among educationists, concerns are not confined exclusively to pedagogical and curriculum issues. It seems that what is on everyone's mind are questions of significant and permanent social change seeping into every crevasse of our everyday work and private lives. Many of the issues that are being raised today, and which I will sketch out here, deal with abstract notions about the virtual and `real', about time and space, about `body-less' interactions and com ...




Warfare Technology
[ view this term paper ]Words: 1183 | Pages: 5

... War II. The advancements to weaponry in America during the 1930’s to 1940’s greatly influenced the tides of battle for the allies. The firearms of the time were becoming faster, increased accuracy, and more lethal. The M-1 Carbine was the standard semi-automatic rifle for all American troops and was later fitted to be fully automatic. The bazooka, invented in 1941 by American scientists, was first used in the invasion of North Africa in war and proved to be excellent anti-tank warfare. It was also during this time that bullets were upgraded from the pinfire type to the rimfire type. The rimfire type proved ...




Local Area Networks
[ view this term paper ]Words: 876 | Pages: 4

... to each other. For larger area need there are several other types of networks such as the Internet. LANs systems can be defined and connected in many different ways. This is the reason for the standardization for every one can have a common ground to start from. “The LANs described Herein are distinguished from other types of data networks in that they are optimized for a moderate size geographic area such as a single office building, warehouse, or a campus. The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information for all stations to receive. As a consequence, it does ...




A Tour Of The Pentium Pro Processor Microarchitecture
[ view this term paper ]Words: 2646 | Pages: 10

... This unique combination of architectural features, which Intel describes as Dynamic Execution, enabled the first Pentium Pro processor silicon to exceed the original performance goal. Building from an already high platform The Pentium processor set an impressive performance standard with its pipelined, superscalar microarchitecture. The Pentium processor's pipelined implementation uses five stages to extract high throughput from the silicon - the Pentium Pro processor moves to a decoupled, 12-stage, superpipelined implementation, trading less work per pipestage for more stages. The Pentium Pro processor r ...




The Anti-Trust Case Against Microsoft
[ view this term paper ]Words: 2404 | Pages: 9

... Sherman and Clayton Antitrust Acts,(Maldoom 1) which are designed to stop the formation of monopolies. The investigation continued on for the next three years without resolve, until Novell, maker of DR-DOS, a competitor of Microsoft's MS-DOS, filed a complaint with the Competition Directorate of the European Commission in June of 1993. (Maldoom 1) Doing this stalled the investigations even more, until finally in August of 1993, (Check 1)the Federal Trade Commission decided to hand the case over to the Department of Justice. The Department of Justice moved quickly, with Anne K. Bingaman, head of the Antitrust Divisi ...




Internet Site Evaluations
[ view this term paper ]Words: 2253 | Pages: 9

... informed and aware of the Internet and websites in general. Authorship "How to perform open heart surgery: A Primer by Billy 'cool kid' Johnson." If a member of ones family had a heart attack, would the above source help in saving their life if a hospital was inaccessible? This would depend on the authenticity and authorship of the source. In any case, using material from an unquestionable source is not a reliable idea. Why? Because the authorship of the source, probably the most important criterion one must use in evaluating the effectiveness of a website, is sometimes debatable. The author of a website can ...




Piracy
[ view this term paper ]Words: 588 | Pages: 3

... pirates. When pirates distribute the illegal software, one could say that they are helping, than hurting the software companies. By distributing the software world wide, it creates great advertisement for the software companies and their products. Although the software company is losing profits from that particular version, it could generate future sales with other versions. Also, when the pirates distribute the software this could be a great source of test data for the software companies. This is an effective way to catch any unfounded bugs in the software program. From debugging to hacking, hackers can be ...




Radio - Making Waves In America
[ view this term paper ]Words: 1502 | Pages: 6

... properties, the later invention of a working wireless radio, and the resulting technology have been instrumental to AmericaÕs move into the Information Age. The invention of radio is commonly credited to Guglielmo Marconi, who, starting in 1895, developed the first ÒwirelessÓ radio transmitter and receiver. Working at home with no support from his father, but plenty from his mother, Marconi improved upon the experiments and equipment of Hertz and others working on radio transmission. He created a better radio wave detector or cohere and connected it to an early type of antenna. With the help of his brothers a ...




The Steam Engine
[ view this term paper ]Words: 1974 | Pages: 8

... invention of revolutionized European society by enabling tasks to be done quicker, cheaper, and more dependably. use throughout the several professions revolutionized numerous aspects of Western European Society. The first important use of came in 1776. was used to show the Cornish miners how successful it could be in removing the water from the mineshafts. This proved to be of great importance to the Cornish, because one of their biggest problems was the flooding of the mining shafts. (The Penetration of the Industry by Steam Power) The mine owners “worried…that the mines would have to be shut down u ...




Browse: « prev  53  54  55  56  57  next »

Copyright © 2024 PaperHelp. All rights reserved