Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?
Number of pages: 5 | Number of words: 1288

.... of more attention than it has in the past. Computerized break-ins and criminal activity, have become fairly common occurrences in both commercial and academic circles. Hackers are becoming more common, and quickly learning new techniques and methods, which no longer leave computer systems as 'safehouses'. The question of "what kind of person is a Hacker?" cannot be answered simply. Hackers vary in race, style and preference. Since every person is different, therefore so are hackers, "Each Hacker has their own style and methods" (Rootshell). According to the Hackers Code of Eth .....


The Information Super Highway
Number of pages: 11 | Number of words: 2772

.... society. In the 1940’s radio emerged as a strong medium, allowing thousands to hear news, entertainment, and even propaganda. Radio was new and was therefore forced to restrict its use of certain ideas and vocabulary. Years went by and a new form of media emerged: the device television, which was used to see pictures. Another new medium of communication except now with sight too. Television too was forced to restrict profanity, ideas that were not to be expressed, and information that was only for certain individuals. Both radio and television underwent heavy investi .....


History Of The Internet
Number of pages: 6 | Number of words: 1398

.... and the entire document has to be resent, but then different pieces are missing from the new copy of the document. This is a major problem and the obvious solution is to “chop” the information up into smaller pieces and then transmit the smaller pieces2. Then another problem was realized, how does the computer know where to put these small bits of information? The solution to that was what has come to be known as packet-switching (PS). In PS, the entire document is sent in a bunch of tiny “packets,” these packets contain the information of the document “wrapped” .....


Technology Of The Twenty First Century
Number of pages: 3 | Number of words: 591

.... at home. The Internet is a big part of our lives today. It is being used everywhere and every way. The Internet was first originally used in 1969 for military purposes but look around today almost every home that has a computer has the Internet. The Internet has came a long way. Everyone has the Internet or has some access to the Internet some how. It serves for many purposes one being for business. Another may be just for enjoyment. The Internet allows people to communicate together at high speeds with their computers. People can go onto chat services and talk to other pe .....


Communication Technology
Number of pages: 4 | Number of words: 944

.... be able to buy cars from japan or sell crops to foreign countries. Government communicate using global technology. Mass meetings are held using video conferencing and speaker phones. Massive oversea trade deals are made overseas with the aids of phones, fax, and the Internet. Without these forms of communication we would have to take a plane across the ocean just to talk to someone on the other side of the pond. Types Of Communication Systems 1. A data communication system involves the use of computers in processing information. These systems are a part of any technic .....


Biometric Systems
Number of pages: 2 | Number of words: 484

.... are also many significant niche markets which are growing rapidly. For example, biometric identification cards are being used at a university in Georgia to allow students to get their meals, and in a Maryland day care center to ensure that the right person picks up the right child. In Los Angeles, they are using fingerprints to stop welfare fraud. And they're also being used by frequent business travellers for rapid transit through immigration and customs in Holland, and now at JFK and Newark airports in the United States. It could also be used to simply prevent one employ .....


The Bulgarian And Soviet Virus Factories
Number of pages: 34 | Number of words: 9220

.... presented were, in general, correct, but the author had completely missed the fact that the majority of PC users are not experienced programmers. A few months later, in the fall of the same year, two men came in the editor's office of the magazine and claimed that they have found a computer virus. Careful examination showed that it was the VIENNA virus. At that time the computer virus was a completely new idea for us. To make a computer program, whose performance resembles a live being, is able to replicate and to move from computer to computer even against the will of .....


Airplanes
Number of pages: 7 | Number of words: 1727

.... These designs are referred to as high-, mid-, and low-wing, respectively. The number of wings can also vary. Airplanes with a single set of wings are referred to as monoplanes, while those with two sets are called biplanes. To help fly the airplane, the wings have two types of control surfaces attached to the rear, or trailing, edges. They are referred to as ailerons and flaps. Ailerons extend from about the midpoint of each wing outward to the tip. They move in opposite directions - when one aileron goes up, the other goes down. Flaps extend outward from the fusela .....



« prev  7  8  9  10  11  12  13  14  15  16  next »