
|
Search Papers |
|
|
 |
|
Find Computers Term Papers
Computer Mouse
Number of pages: 3 | Number of words: 646.... in its advancement did not come until 1970 at the Xerox Palo Alto Research Center. Alan Day developed the first working computer that used the . While at the research center Day and other researches developed the first computer that depended on the to point. The next advancement for the came out of the Apple computer. The Apple Lisa computer used a graphical user interface and it helped create the technology used for the . The Macintosh computer used a and it simplified the use of the computer because all you had to do was point and click.
The windows based systems a .....
|
BBS Piracy And The Copyright
Number of pages: 4 | Number of words: 1083.... electronically.
Yves Roy, sergeant of RCMP stated that charges will be laid in early
December under paragraph 42 of The Copyright Act. Conviction under this
act carries a maximum punishment of a fine of $1 million dollars, and/or 5
years imprisonment.
Because newspaper articles are very biased in one point-of- view, it
is difficult to look at both sides of this situation. But let us discuss
piracy in a more general manner. Software piracy is the act in which
someone takes a copyrighted portion or whole of software, then
electronically copies and/or distributes .....
|
A Tour Of The Pentium Pro Processor Microarchitecture
Number of pages: 10 | Number of words: 2646.... Pentium processor's pipelined implementation
uses five stages to extract high throughput from the silicon - the Pentium Pro
processor moves to a decoupled, 12-stage, superpipelined implementation, trading
less work per pipestage for more stages. The Pentium Pro processor reduced its
pipestage time by 33 percent, compared with a Pentium processor, which means the
Pentium Pro processor can have a 33% higher clock speed than a Pentium processor
and still be equally easy to produce from a semiconductor manufacturing process
(i.e., transistor speed) perspective.
The Pentium proces .....
|
Internet Regulation: Policing Cyberspace
Number of pages: 5 | Number of words: 1332.... War projects of the 1950s.2 The United States Government owns the Internet and has the responsibility to determine who uses it and how it is used. The government must control what information is accessible from its agencies.
This material is not lawfully available through the mail or over the telephone, there is no valid reason these perverts should be allowed unimpeded on the Internet. Since our initiative, the industry has commendably advanced some blocking devices, but they are not a substitute for well-reasoned law.4 Because the Internet has become one of the biggest sou .....
|
Does Microsoft Have Too Much Power?
Number of pages: 4 | Number of words: 950.... everyone's life. Although it is the super-empire it is today,
Microsoft was once a small software business ran by a young Bill Gates in a tiny
office. Consisting of a few young adults, they were not progressing as much as
they would like too. Their competitor, Digital Research, created the first
operating system, known as the CP/M-86 system. Though, not glamorized, CP/M did
exist. Their competitors had it a little worse, working out of their not so
tidy two story house, made up of a husband and wife. The massive change occurred
when a couple of IBM representatives showed up .....
|
Networks
Number of pages: 14 | Number of words: 3725.... hardware which often have low use rates. By setting up several
computers to share these resources, money is saved from having to provide
(for example) each user with their own printer. Fewer peripherals also can
translate into lower maintenance costs and lower capital investments on the
system as a whole.
TYPES OF NETWORKS
Networks fall into two categories: Server-Client, and Peer-To-Peer.
Server-Client is often the fastest (and more expensive) of the two
systems. In this setup one computer is designated as the Server, with the
sole purpose of providing access .....
|
History Of The Propeller
Number of pages: 6 | Number of words: 1516.... to utilize the “straight blade” propeller were made by balloonists. These contraptions were quite strange and hardly fulfilled their purpose of actually propelling the balloon. The basic propeller had evolved from the simple concepts of da Vinci, and was slowly becoming an effective means of aerial propulsion. To reach the next plateau of flight an increased knowledge of the propeller would be needed, and the mysteries of the propeller and mechanical power would need to be solved. These substantial tasks remained for aviation’s pioneers to tackle during the 19th century.
Thro .....
|
Computer Security And The Law
Number of pages: 17 | Number of words: 4533.... grapple with the technical side of computer
security issues[1]. This problem could be mitigated by involving technical
computer security professional in the development of computer security law and
public policy. This paper is meant to help bridge to gap between technical and
legal computer security communities.
II. THE TECHNOLOGICAL PERSPECTIVE
A. The Objectives of Computer Security
The principal objective of computer security is to protect and assure
the confidentiality, integrity, and availability of automated information
systems and the data they contain. Each of .....
|
|