Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Masters Of Deception (MoD)
Number of pages: 5 | Number of words: 1215

.... the phone lines. Back then there was no Internet or AOL yet people could still communicate through computers. All they needed was a modem and some phone #'s of other modems and they were in business. Paul met Eli first. They learned to hack together. After a while they started looking for bigger and better hacks. They came across a famous hacker named Phiber Optic (Mark). He taught them all he knew about the telephone company. Then they were able to break into the New York phone company. This was only the beginning of their hacking endeavors. Paul, Mark, Eli be .....


Auditing Computer Security
Number of pages: 5 | Number of words: 1201

.... workstation or on member servers, the audit policy determines the amount and type of security logging performed on the individual computer. You will first plan the policy, then implement it, and finally view the results. You can set up on audit policy for a domain to: track the success and failure of events, such as when users attempt to log on, read a file, make changes to user and group permissions, change the security policy, and make a network connection. Eliminate or minimize the risk of unauthorized use of resources. Track trends over time by maintaining an archive .....


Against Federal Censorship Of The Internet
Number of pages: 2 | Number of words: 334

.... decency act. The Supreme Court stated that the act was not only vague but that it unconstitutionally restricted the free speech rights of adults. An estimated of 40% of Internet material originates from foreign countries, where the US's Decency Act would not apply. Governments should not have the power to determine what sort of material is fit or unfit for individuals and their children to access on the Internet. Such power could become an oppressive form of censorship and could be used in an arbitrary manner by local judges and prosecutors to target minority viewpoints. .....


History Of The Internet
Number of pages: 18 | Number of words: 4930

.... the Internet. This would lead to need for regulation in what is acceptable content on the Internet, and how the first amendment has blocked many policy attempts trying to regulate the technology. We can point to the fact that emergence of any new technology is always the contribution of several intertwined social factors over a period of many years. The Internet as we know it today is no exception. We can show that the beginnings of the Internet started in the 1940's and took over in the 50's to be shaped into what we consider is the Internet of today. We can also show t .....


Information About Viruses
Number of pages: 2 | Number of words: 326

.... as the .EXE and .COM files. On a Macintosh, any file can be contaminated. A disk can also be infected even without any files on it. These viruses are called BOOT SECTOR viruses. These viruses reside on the part of the floppy disk, or hard disk that store the information so that these disks can be used, and is loaded into memory each time the computer is booted by one of these disks. DON'T DESPAIR! Despite all of what has just been said, viruses are controllable. Their is software called Virus Protection Software. A couples of programs that h .....


Virtual Reality - What It Is And How It Works
Number of pages: 3 | Number of words: 752

.... and entertainment uses among other things. In order to create this alternate reality, however, you need to find ways to create the illusion of reality with a piece of machinery known as the computer. This is done with several computer-user interfaces used to simulate the senses. Among these, are stereoscopic glasses to make the simulated world look real, a 3D auditory display to give depth to sound, sensor lined gloves to simulate tactile feedback, and head-trackers to follow the orientation of the head. Since the technology is fairly young, these interfaces have not been .....


Ecommerce
Number of pages: 3 | Number of words: 715

.... Consumers are not the only ones "surfing" around for info. Businesses also focus on other companies to sell their products. General Electric sold machine and appliance parts using a new business to business technology called "extranet". GE used its successful "extranet" to roll in 1996 online sales of one billion dollars. Another very successful type of business on the net is the coming of services backed by research, such as discount stock trading, including e.Schwab and a Web-only company called E*Trade. Travel services have been very promising because the transactions .....


Should This Business Update To Windows 2000 From Windows 98
Number of pages: 2 | Number of words: 455

.... Microsoft has dedicated several Web pages to upgrade issues. Once if you then decide to update, do it when you can devote time to the changeover. If you have multiple machines, make the change in stages running the old operating system during the transition. First of all, the first thing is to determine that Windows 2000 is compatible with your machines. According to Windows 2000ˇ¦s description, ˇ§you need, at minimum, a PC with a 133-MHz Pentium-compatible CPU, 64 megabytes of RAM and one gigabyte of disk space. It is better with a faster CPU (300 MHz or better) and sever .....



« prev  48  49  50  51  52  53  54  55  56  57  next »