Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Webhosting For An Online Store
Number of pages: 3 | Number of words: 667

.... I would equate the failure of a Web host for an e-commerce site to that of a fire for a traditional store, and would expect that a similarly high proportion of Web stores would go out of business as a result. I guess that most Web merchants are complacent, either assuming that they will never have to change hosts or that if they do it will be a straightforward matter. However, the truth is that changing your Web hosting service can be very difficult, particularly for e-commerce sites because the software the store runs on - whether CGI scripts or a fully-fledged Web comm .....


COMPUTER CRIME Hackers And Security Measures
Number of pages: 17 | Number of words: 4401

.... telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attracted by today’s technology. The Internet can be used for criminal purposes in different ways: from a simple ‘blackmail’ to the most perplex crim .....


Linux Operating System
Number of pages: 4 | Number of words: 998

.... system. It is almost impossible to write a virus for Linux because it must be 30-40 MB. Also, it has firewall system to protect the network from hackers. This minimizes the number of viruses capable of affecting a Linux system. If we think about it, there are many viruses for Windows that can harm your system. Linux is a stable Operating System. You can kill an individual process that is not replying with kill command vs. shutting down your system in Windows. Linux has true multitasking properties. You can run up to twelve processes at the same time with no performan .....


5 Modes Of Transportation
Number of pages: 6 | Number of words: 1431

.... of transportation. Each mode is made up of primary subsystems. The subsystems of railroad transportation include freight trains and passenger trains. Freight trains are used to transport goods and materials between cities while passenger trains are used to transport people. Although freight trains are still used all across the nation, rail intercity freight has accounted for a decreasing share of the total ton mileage over the past 30 years. This is mostly due to the increase in truck transport. Rail passenger traffic had also declined over the years until better ser .....


Protecting A Computer
Number of pages: 10 | Number of words: 2495

.... The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in the computer lab. In the beginning, h .....


Computer Languages
Number of pages: 2 | Number of words: 489

.... more sophisticated lines of code that are much more confusing than the previous two. The format and layout of the various languages are very diverse between some, and between others are somewhat similar. When programming in Basic the user has to type in line numbers before each new line of code. In an updated version of Basic called QBasic, numbers are optional. Turbo pascal does not allow the user to input numbers, it has preset commands that seperate each part of the program. This is similar to QBasic, but is much more sophisticated. Instead of using the command gosu .....


Dell Computer Corporation
Number of pages: 4 | Number of words: 1036

.... of Dell’s sales are to large corporations, government agencies and educational institutions. Dell also serves medium and small business and home-PC users. Dell’s award-winning customer service, industry-leading growth and financial performance continue to differentiate the company from competitors. At the heart of that performance is Dell’s unique direct-to-customer business model. “Direct” refers to the company’s relationships with its customers, from home-PC users to the world’s largest corporations. There are no retailers or other resellers adding unnecessary tim .....


Home Computer Network
Number of pages: 3 | Number of words: 684

.... speed. Additionally, if one computer on your network crashes, you can move to another computer and continue your work. So, if you use your network and file server effectively, you can have a high degree of reliability, security, and efficiency. Second, an in- can allow you to have only one Internet connection while giving Internet access to all computers on your network. This is very important if you only have one phone line. If you were to add an additional phone line for each computer you wanted to be connected to the Internet, well, let’s just say that this would be a cos .....



« prev  36  37  38  39  40  41  42  43  44  45  next »