Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Computer Mouse
Number of pages: 3 | Number of words: 646

.... in its advancement did not come until 1970 at the Xerox Palo Alto Research Center. Alan Day developed the first working computer that used the . While at the research center Day and other researches developed the first computer that depended on the to point. The next advancement for the came out of the Apple computer. The Apple Lisa computer used a graphical user interface and it helped create the technology used for the . The Macintosh computer used a and it simplified the use of the computer because all you had to do was point and click. The windows based systems a .....


BBS Piracy And The Copyright
Number of pages: 4 | Number of words: 1083

.... electronically. Yves Roy, sergeant of RCMP stated that charges will be laid in early December under paragraph 42 of The Copyright Act. Conviction under this act carries a maximum punishment of a fine of $1 million dollars, and/or 5 years imprisonment. Because newspaper articles are very biased in one point-of- view, it is difficult to look at both sides of this situation. But let us discuss piracy in a more general manner. Software piracy is the act in which someone takes a copyrighted portion or whole of software, then electronically copies and/or distributes .....


A Tour Of The Pentium Pro Processor Microarchitecture
Number of pages: 10 | Number of words: 2646

.... Pentium processor's pipelined implementation uses five stages to extract high throughput from the silicon - the Pentium Pro processor moves to a decoupled, 12-stage, superpipelined implementation, trading less work per pipestage for more stages. The Pentium Pro processor reduced its pipestage time by 33 percent, compared with a Pentium processor, which means the Pentium Pro processor can have a 33% higher clock speed than a Pentium processor and still be equally easy to produce from a semiconductor manufacturing process (i.e., transistor speed) perspective. The Pentium proces .....


Internet Regulation: Policing Cyberspace
Number of pages: 5 | Number of words: 1332

.... War projects of the 1950s.2 The United States Government owns the Internet and has the responsibility to determine who uses it and how it is used. The government must control what information is accessible from its agencies. This material is not lawfully available through the mail or over the telephone, there is no valid reason these perverts should be allowed unimpeded on the Internet. Since our initiative, the industry has commendably advanced some blocking devices, but they are not a substitute for well-reasoned law.4 Because the Internet has become one of the biggest sou .....


Does Microsoft Have Too Much Power?
Number of pages: 4 | Number of words: 950

.... everyone's life. Although it is the super-empire it is today, Microsoft was once a small software business ran by a young Bill Gates in a tiny office. Consisting of a few young adults, they were not progressing as much as they would like too. Their competitor, Digital Research, created the first operating system, known as the CP/M-86 system. Though, not glamorized, CP/M did exist. Their competitors had it a little worse, working out of their not so tidy two story house, made up of a husband and wife. The massive change occurred when a couple of IBM representatives showed up .....


Networks
Number of pages: 14 | Number of words: 3725

.... hardware which often have low use rates. By setting up several computers to share these resources, money is saved from having to provide (for example) each user with their own printer. Fewer peripherals also can translate into lower maintenance costs and lower capital investments on the system as a whole. TYPES OF NETWORKS Networks fall into two categories: Server-Client, and Peer-To-Peer. Server-Client is often the fastest (and more expensive) of the two systems. In this setup one computer is designated as the Server, with the sole purpose of providing access .....


History Of The Propeller
Number of pages: 6 | Number of words: 1516

.... to utilize the “straight blade” propeller were made by balloonists. These contraptions were quite strange and hardly fulfilled their purpose of actually propelling the balloon. The basic propeller had evolved from the simple concepts of da Vinci, and was slowly becoming an effective means of aerial propulsion. To reach the next plateau of flight an increased knowledge of the propeller would be needed, and the mysteries of the propeller and mechanical power would need to be solved. These substantial tasks remained for aviation’s pioneers to tackle during the 19th century. Thro .....


Computer Security And The Law
Number of pages: 17 | Number of words: 4533

.... grapple with the technical side of computer security issues[1]. This problem could be mitigated by involving technical computer security professional in the development of computer security law and public policy. This paper is meant to help bridge to gap between technical and legal computer security communities. II. THE TECHNOLOGICAL PERSPECTIVE A. The Objectives of Computer Security The principal objective of computer security is to protect and assure the confidentiality, integrity, and availability of automated information systems and the data they contain. Each of .....



« prev  39  40  41  42  43  44  45  46  47  48  next »