Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

The Year 2000 Bug
Number of pages: 8 | Number of words: 1942

.... For example, if a train is running on a track and the power cuts out, then the gates wont go down and people will be in a lot of trouble. (Also, what happens if the power goes out in a hospital? (Also see “WHAT IS Y2K” later on) Food is one essential thing that is crucial to survival and many people think that we may need lots of canned and dry goods. As in any crisis situation, some believe that the worst will happen: We will all die, go to war, or the world will explode, etc. Then again, others think that maybe we should be prepared just in case all of our electricity g .....


The Future Of Computer Crime In America
Number of pages: 4 | Number of words: 916

.... information sources are doing so by illegal means and are often motivated by deviant and illegal means. It is said that at any given time the average American has his name on an active file in over 550 computer information databases of which nearly 90% are online, and of the 550 databases the number comes no where close to how many time your personal information is listed in some database in an unactive file. The "Average American" could simply sit in his/her home doing nearly nothing all day long and still have his/her name go through over 1,000 computers a day. .....


The Utilities Confront Y2K
Number of pages: 6 | Number of words: 1524

.... Each of these utilities have a high dependency on devices that have a high probability for not being Y2K compliant. These devices very nearlyd waste) are very much affected by Y2K. Problemed areas are found throughout the water infrastructure. Most obviously water utilities' computer systems will be affected by Y2K unless compliance is fulfilled. If the computers fail, the main areas affected would include customer service, accounts payable and receivable, databases, and management systems. Problems of this type are usually easily fixed, however the computer systems th .....


Media Influence
Number of pages: 2 | Number of words: 382

.... giving the information about the position of Albanians and the NATO's attack. (Johanna Mcgeary, Standoff in Kosovo,Time weekly news magazine, March 29,1999) A person who doesn't know anything about the Kosovo events and read Johanna Mcgeary will hate from Yugoslav President Slobodan Milosevic . Most of the people who read this media item may feel hostility to the Serbs and may try to help Muslims. And also support the NATO's attacked. As a result this article can be very effective article for the Muslims. Nowadays Kosovo events have a big place on the mass media. CNN shows .....


Technology Transfer
Number of pages: 3 | Number of words: 768

.... exploitation of Africa and Asia by Europeans. In the book The Tools of Empire, Headrick the author connects theses factors through many examples in history. Leading into the twentieth century even though many would like to fast forward into the dawn of electronics, there is still a major focus on technology in Africa and Asia. However, the transfer of technology is now steering away from dominating and leaning towards local adaptation. Africa and India experienced a deeper affect of technological transfer because they were conquered and colonized by Europe. The steamboat with i .....


Cryptography
Number of pages: 5 | Number of words: 1227

.... rushing to judge my character, it is important to first understand what a hacker does and what a cracker does. A hacker likes to work with computers and tries hard to figure out how they work. A Cracker has malicious intent, a hacker may or may not intend to commit an act of fraud. It is possible to be a hacker and a cracker at the same time. Crackers like to break into systems for the pure joy of destroying. Some hackers have decided to help system administrators either make their system more secure or catch a person who has committed a computer crime. This is where I fit in .....


The History And Future Of Computers
Number of pages: 4 | Number of words: 953

.... Blaise Pascal. In 1642 he made the device to aid his father, who was a tax collector. In 1694 Gottfried Leibniz improved the machine so that with the rearrangement of a few parts it could be used to multiply. The next logical advance came from Thomas of Colmar in 1890, who produced a machine that could perform all of the four basic operations, addition, subtraction, multiplication and division. With the added versatility this device was in operation up until the First World War. Thomas of Colmar made the common calculator, but the real start of computers as they are kn .....


Green Architecture
Number of pages: 3 | Number of words: 656

.... land use, and waste reduction. Green buildings are not only designed for present use, but consideration is also been given to future uses as well. An adaptable structure can be "recycled" many times over the course of its useful life. If specific technical issues prevent use of the building for a new function, then the materials used in its construction are designed to facilitate ease of recycling and reprocessing of materials. Buildings consume a variety of materials in their construction. Green design reduces the dependence on resource intensive products and materials .....



« prev  31  32  33  34  35  36  37  38  39  40  next »