Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



Video Cards
[ view this term paper ]Words: 2882 | Pages: 11

... added dimension, they all look more realistic and attractive. Nevertheless, 3D do not exist in most of the business programs today, but it can be forecasted that it is not far away. Many new kinds of video cards have been introduced to the market recently. In the past, the video card could only deliver two dimensional graphics which were only in low resolution. However, there has now emerged as a result of high resolution three dimensional graphics technology. This paper will discuss why the video card nowadays can process high resolution three dimensional graphics, but why the video card in the past could only ...




Careers In Computer Engineering
[ view this term paper ]Words: 1674 | Pages: 7

... processes which provide a high degree of efficiency and quality. The popular ATM, or automated teller machine available at many banks, is operated through interlocking computer networks, and a person several thousand miles away from home can obtain quick cash from a machine at any hour of the day or night. A person with a degree in computer engineering has many options for a career. Many colleges offer electrical engineering curricula and computer engineering may be an offshoot. The University of Delaware describes a person with a degree in electrical engineering as a "generalist," with computer engineers as ...




Privacy And Anonymity And Information Network Technologies
[ view this term paper ]Words: 1692 | Pages: 7

... the use of widespread computer technologies, our personal information had no real value beyond its immediate transaction. When data and information was provided by a citizen or consumer it had no secondary reuse. However, due to advances in technology and data retrieval systems and transactions, information has been given commercial value, especially with regards to the issue of who owns and controls this information. The information age has been a period that has allowed rights to privacy to beocme seriously jeopardized by new information technologies. Richard A. Spinello, has defin ...




The Year 2000 Computer Problem
[ view this term paper ]Words: 2304 | Pages: 9

... problem quite well. "We programmed computers to store the date in the following format: dd/mm/yy. This only allows 2 digits for the year. January 1, 2000 would be stored as 01/01/00. But the computer will interpret this as January 1, 1900- not 2000" (de Jager 1). The '19' is "hard-coded" into computer hardware and software. Since there are only 2 physical spaces for the year in this date format, after '99', the only logical choice is to reset the number to '00'. The year 2000 problem is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. "Time is ...




New Weapons And Technology In World War I
[ view this term paper ]Words: 1966 | Pages: 8

... range of twenty-five miles in the battle. It had a few weaknesses such as limited range, and frequent mechanical failure. The seven-ton Renault tank was created by the French. It was lighter and faster. In 1914 Winston Churchill decided that the British aircraft should be protected from the ground by using armored motor vehicles. The Germans counteracted this by digging trenches across the roads of Germany. Some of the first armored vehicles were just normal cars converted in a tank. In 1915, Wolseley developed a thirty-cwt. lorry chassis with armored sides and a revolving turret with a Vickers-maxim mach ...




Computer Crime In The 1990's
[ view this term paper ]Words: 2399 | Pages: 9

... Fraud In North America the telecommunications industry estimates long distance fraud costs five hundred million perhaps up to a billion every year, the exact the exact figures are hard to be sure of but in North America alone phone fraud committed by computer hackers costs three, four maybe even up to five billion dollars every year. Making an unwitting company pay for long distance calls is the most popular form of phone fraud today. The first step is to gain access to a private automated branch exchange known as a "PABX" or "PBX". One of these can be found in any company with twenty or more emplo ...




Year 2000: Fiction, Fantasy, And Fact
[ view this term paper ]Words: 682 | Pages: 3

... says " . . . the problem could cost businesses a total of $600 billion to remedy." (p. 1) The fallacy that mainframes were the only machines to be affected was short lived as industry realized that 60 to 80 million home and small business users doing math or accounting etc. on Windows 3.1 or older software, are just as susceptible to this "bug." Can this be repaired in time? For some, it is already too late. A system that is devised to cut an annual federal deficit to 0 by the year 2002 is already in "hot water." Data will become erroneous as the numbers "just don't add up" anymore. Some PC owners can u ...




Computer Multimedia
[ view this term paper ]Words: 1359 | Pages: 5

... computer applications, such as photographic storage, and the Internet. Computers can also store, transmit and play back sound. When a picture or a sound is stored on a computer it said to be digitized. There are two main ways of digitizing a picture. One is by vector graphics. Here the information in the picture is stored as mathematical equations. Engineering drawing applications such as CAD (computer assisted device) use this method. The other method is by bit mapped graphics. Here the computer actually keeps track of every point in the picture and its description. Paint programs use this technique. Drawi ...




Windows 95 Beats Mac
[ view this term paper ]Words: 411 | Pages: 2

... number of different hardware setups available in the PC world. Is a particular board going to work with my PC? With Windows 95, these problems were alleviated with plug and play technology. With plug and play compatible boards, the computer detects and configures the new board automatically. The operating system may recognize some hardware components on older PCs. Mac userw will claim that they always had the convenicnce of a plug and play system, ubt the difference shows in teh flexibility of the two systems. Another set of arguments Mac users use in favor of their sysstems over PCs is in multimedia and networking ...




What Is An Information Systems Project
[ view this term paper ]Words: 509 | Pages: 2

... of programmers to produce or improve software for use. Project Management is the act of taking different organizations and people to complete several different jobs for one particular goal. Providing scheduling, cost and budget requirements, and quality control to ensure the customer is stratified. Any mix up in scheduling could cause a delay and increase the cost and reduce profit. Time management and people skills are a must to be a successful project manager. 2. Stud the enclosed article “HOW MUCH TECHNICAL TRAINING DOES A PROJECT MANAGER NEED?” Then, answer the question, supporting your answer. Fo ...




Browse: « prev  60  61  62  63  64  next »

Copyright 2024 PaperHelp. All rights reserved