Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Computer Programming
Number of pages: 4 | Number of words: 880

.... testing and revising it. Generally, programmers create software by using the following a basic step-by-step development process: (1) Define the scope of the program by outlining exactly what the program will do. (2) Plan the sequence of computer operations, usually by developing a flowchart (a diagram showing the order of computer actions and data flow). (3) Write the code--the program instructions encoded in a particular programming language. (4) Test the program. (5) Debug the program (eliminate problems in progr .....


So, How Does It Work? The Wankel Rotary Engine
Number of pages: 3 | Number of words: 758

.... (and undoubtedly others). There is also a .30 model Wankel engine from OS / Graupner. Rotor, Eccentric Shaft, Peripheral Housing, and Ports A Rotary Combustion Engine (RCE) as invented by Felix Wankel and developed with Walter Froede of NSU differs from a Piston Engine in four fundamental ways: The RCE Rotor supercedes the piston engine's piston. The RCE Eccentric Shaft [gloss] supercedes the piston engine's crankshaft and connecting rods. The RCE Peripheral Housing [gloss] supercedes the piston engine's cylinder. Intake and Exhaust Ports [gloss] in the housings .....


Hacking
Number of pages: 4 | Number of words: 999

.... codes and then it assembles the program codes into a working computer virus (Ash, 5-6). The formula that a hacker follows to hack is always the same. First, the hacker runs the prefix scanner, usually at night, to get a list of dial-ups, phone numbers that contain carriers. Once he has dials-ups, he has places to explore. Next he uses his terminal to dial-up the carriers. When he connects to the network, he will need to gain entrance to it. The hacker uses his password cracker to find a suitable user name and password. The password cracker does not always work, so the h .....


Trends In Telecommunications
Number of pages: 2 | Number of words: 415

.... advantages of light wave systems are many and include • freedom from electrical disturbance • tremendous bandwidth or information-carrying capacity • small physical size • relative low cost The speed at which information can be moved through the fiber optic cable is also an important advantage. AT&T established an experimental fiber optic system that moves digital information at a speed of 8 gigabits (8 billion bits) per second over a 68-mile stretch of repeaterless fiber optic cable. One gigabit per second is fast enough to support 15,000 voice circuits. The growt .....


The Computer Revolution
Number of pages: 5 | Number of words: 1190

.... larger cost savings in both those employed and what they did with their time. Menial, repetitive tasks could easily be carried out by computers with no loss of efficiency of effectiveness however long the tasks took. The only problem was the expense of the machines. This was solved by the introduction of large Scale Integration (LSI), newly invented components and improving manufacturing techniques, which made the devices in these machines cheaper to build. Due to these advances IBM unveiled the first online transaction processing system in 1964. It was designed for Ameri .....


Classification Analysis
Number of pages: 3 | Number of words: 565

.... computer itself is basically useless. Another form of output, which is rarely noticed by many computer users however, is the printer. Many people have probably used a printer before, but it is just that they never realize it is also a form of output. As opposed to 'output', 'input' consists of components that take in information from the users themselves so that the computer will know the tasks it is supposed to perform and accomplish. The keyboard is classified as a form of input because this is where the users enter commands and text. There are many other forms of .....


Internet Orientation Project
Number of pages: 2 | Number of words: 475

.... and margin structure deteriorates the ability of the representative to offer other low cost substitute items. The new purchasing environment consists of trying to have the parts on the floor when needed, not too early, and never late. Extra stock ends up in inventory, and although labeled as an asset in the books, it is actually a liability. This drives the agent to search for creative ways to control materials. One key way to accomplish this is to utilize distributors that are “committed to long term relationships in which they take on more of the responsibility of managin .....


The Central Processing Unit
Number of pages: 2 | Number of words: 516

.... of Texas Instruments. Now we have the major elements needed to produce a CPU. In 1965 a company by the name of Intel was formed and they began to produce CPU's shortly thereafter. Gordon Moore, one of the founders of Intel, predicted that the number of transistor placed on each CPU would double every 18 months or so. This sounds almost impossible, however this has been a very accutate estimation of the evolution of CPUs. Intel introduced their first processor, a 4004, in November of 1971. This first processor had a clock speed of 108 kilohertz and 2,300 transistors. It .....



« prev  46  47  48  49  50  51  52  53  54  55  next »