Get Help Writing Your Paper Here
  home | faq | cancel
search papers :
Paper Topics
> American History
> Arts and Theater
> Biography
> Book Reports
> Computer
> Creative Writing
> Economics
> English
> Geography
> Health
> Legal Issues
> Miscellaneous
> Music
> Poetry
> Political
> Religion
> Science
> Social Issues
> World History
> Sign Up Today

We have been helping thousands of students with their term papers since 1998. We can help you with yours too.
> Register


Help With Computer Papers



How Technology Has Hurt Us
[ view this term paper ]Words: 365 | Pages: 2

... More people are turning the guns on themselves. Kids bring guns to school with them for protection against people who may use a gun on them for retaliation. Politically its divided the nation on whether private citizens should be able to carry guns. Disposable items have caused a big garbage problem. We use everything from disposable pens to disposable diapers. We can stop some of the garbage problem by recycling. Air conditioners are using up allot of our electricity. There are times in the summer when brown outs happen because if our excessive use of the air conditioners. Freon gets released into our ...




"Computer Security" By Time Life Books
[ view this term paper ]Words: 528 | Pages: 2

... it only possible for someone to access a computer by using a password or by locking it up. Computer security works by many ways of password use or by locking it up. The password method is enforced by prompting a computer user to enter a password before they can access any programs or information already contained within the computer. Another password security method would be to have the computer user carry a digital screen that fits in your pocket. This digital screen receives an encrypted message and displays numbers that change every few minutes. These numbers make the password one needs for the next few mi ...




MMX Technology
[ view this term paper ]Words: 1403 | Pages: 6

... users to take advantage of. is Intel's most recent processor enhancement, but what is it? How does it work? What does it mean as far as performance improvements? is the first new chip architecture from Intel in ten years. From a technological standpoint, there are significant changes: MMX defines a set of 57 new computer instructions that extend the x86 instruction set of approximately 80; it has 32 KB of on-chip cache, verses the non-MMX on-chip cache of 16 KB, which enhances performance of even non-MMX applications, and it makes use of Single Instruction Multiple Data (SIMD) for more efficient data processin ...




Hubble Space Telescope
[ view this term paper ]Words: 562 | Pages: 3

... the HST began in 1981 with the assembly of its' precision ground mirror. By the end of 1985, the entire spacecraft was complete with the scientific instruments, optical components, and remaining hardware intact and prepared for launch. Although scheduled for launch in 1986, the project was later postponed due to the space shuttle Challenger disaster. During this period, HST was subjected to intense tests and observation in order to prepare its duty in space. The HST was finally launched aboard the STS-31 mission of the space shuttle Discovery on April 24, 1990. Shortly after its launch in 1990, an error was found in ...




Radar Detector
[ view this term paper ]Words: 387 | Pages: 2

... Phazer makes your vehicle electronically invisible to the police speed-detecting equipment. It mixes a portion of the radar signals with background clutter and bounces it back to the squad car by way of wave guide antenna, which effectively confuses the computer inside the radar gun. Police radar takes five to ten speed measurements per second of the vehicle. The Phazer sends two different signals to the radar, so the final result is that police radar can not verify the speed of the vehicle and displays no speed at all. The Phazer also protects your vehicle from Lidar guns which use distance over time t ...




The History Of The Internet And The WWW
[ view this term paper ]Words: 1079 | Pages: 4

... Board Service. A BBS is a computer that you can ether dial into or access from the Internet. BBS's are normally text based. 2. The Creator of the WWW- A graduate of Oxford University, England, Tim is now with the Laboratory for Computer Science ( LCS)at the Massachusetts Institute of Technology ( MIT). He directs the W3 Consortium, an open forum of companies and organizations with the mission to realize the full potential of the Web. With a background of system design in real-time communications and text processing software development, in 1989 he invented the World Wide Web, an internet-based hypermedia ini ...




CMIP Vs. SNMP : Network Management
[ view this term paper ]Words: 2384 | Pages: 9

... program. Sitting in front of a large screen displaying a map of the world, leaning back gently in your chair. A gentle warning tone sounds, and looking at your display, you see that California is now glowing a soft red in color, in place of the green glow just moments before. You select the state of California, and it zooms in for a closer look. You see a network diagram overview of all the computers your company has within California. Two systems are flashing, with an X on top of them indicating that they are experiencing problems. Tagging the two systems, you press enter, and with a flash, the screen displ ...




Computer Crimes: Laws Must Be Pass To Address The Increase In Computer Crimes
[ view this term paper ]Words: 1905 | Pages: 7

... all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be "between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges."(Shannon, 16:2) "It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow ...




A Quantum Computer
[ view this term paper ]Words: 1627 | Pages: 6

... behave like waves, these different places are different states that an atom can exist in simultaneously. What’s the big deal about quantum computing? Imagine you were in a large office building and you had to retrieve a briefcase left on a desk picked at random in one of hundreds of offices. In the same way that you would have to walk through the building, opening doors one at a time to find the briefcase, an ordinary computer has to make it way through long strings of 1’s and 0’s until it arrives at the answer. But what if instead of having to search by yourself, you could instantly create as many ...




The Production, Characteristics And Use Of Aluminium And Its
[ view this term paper ]Words: 1590 | Pages: 6

... has risen steadily over the last decade. The reasons for the extensive use of aluminium lies in the diverse range of properties (mechanical, physical etc.) exhibited by aluminium and its alloys: „h A key property is low density. Aluminium is only one-third the weight of steel. „h Aluminium and most of its alloys are highly resistant to most forms of corrosion. The metal's natural coating of aluminium oxide provides a highly effective barrier to the effects of air, temperature, moisture and chemical attack. „h Aluminium is a superb conductor of electricity. This property allied with other intrinsic qualitie ...




Browse: « prev  8  9  10  11  12  next »

Copyright © 2024 PaperHelp. All rights reserved