Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Hacking
Number of pages: 4 | Number of words: 996

.... And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong... "I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... you bet you ass we're all alike... we've been spoon- fed baby food at school when we hungered for steak.. the bits of .....


The POSitouch System
Number of pages: 1 | Number of words: 209

.... the use of computer technology. During there search they found systems but none meeting there total needs. That is why the Fullers created the company, (R.D.C) Restaurant Data Concepts. RDC keeps developing better and more efficient equipment to be used in the food service industry. Overall, I feel that POSitouch is well worth the initial expense. It should be looked at as an investment, saving time, and money in all areas needing tight controls. This management tool has been shown to cut labor, and food costs in many food service establishments, not to mention .....


Artificial Intellegence: Identification And Description Of The Issue
Number of pages: 3 | Number of words: 680

.... try and think of new ideas and ways in which to entertain the audiences. They have found that robotics interests people. With that have made many movies about robotics (e.g. Terminator, Star Wars, Jurassic Park ). Movie characters like the terminator would walk, talk and do actions by its self mimicking a human through the use of Artificial Intelligence. Movies and Television robots don't have Artificial Intelligence ( AI ) but are made to look like they do. This gives us the viewers a reality of robotics with AI. Understanding Of The IT Background Of The Issue Artifici .....


The Necessity Of Computer Security
Number of pages: 7 | Number of words: 1815

.... of computers are vast. They are used to run ordinary household appliances such as televisions and microwaves, to being tools in the workplaces through word processing, spreadsheets, and graphics software, to running monumental tasks such as being the heart and soul of the nations tax processing department, and managing the project timetables of the Space Shuttle. It is obvious that the computer is now and always will be inexorably linked to our lives, and we have no choice but to accept this technology and learn how to harness its total potential. With any prog .....


Bugged
Number of pages: 2 | Number of words: 289

.... of eavesdropping. Bugging an office is a relatively simple process if one follows a few basic steps. First, a person needs to select the bug. There are many different types of bugs ranging from the infinity bug with which you can listen in on a telephone conversation from over 200 miles away to an electaronic laser beam which can pick up the vibrations of a person's voice off a window pane. The infinity bug sells for $1,000 on the black market and the laser for $895. Both, however, are illegal. Second, one needs to know where to plant the bug. A bug can be hi .....


Technology 2
Number of pages: 6 | Number of words: 1415

.... (PC's) were in use by 1995, and one out of every three homes had a PC (Shelly, Cashman,& Waggoner, 138). Computers are easy to use when you know how they work and what the parts are. All computers perform the four basic operations of the information processing cycle: input, process, output, and storage. Data, any kind of raw facts, is required for the processing cycle to occur. Data is processed into useful information by the computer hardware. Most computer systems consist of a monitor, a system unit which contains the Central Processing Unit (CPU), a floppy-disk drive, a CD- .....


Data Warehousing
Number of pages: 11 | Number of words: 2756

.... that you read Marc Demarest's The Politics of Data Warehousing in conjunction with this paper. In his June 1997 paper, Marc comments on how little extended discussion of politics there is in the data warehousing literature. As of the writing of this paper, to the best of my knowledge, that situation still has not changed. This in unfortunate because ambitious data warehousing projects are rife with political issues. My working definition of a data warehousing "political issue" is a situation where the equally valid and reasonable goals and interests of two or more parties .....


Internet Security
Number of pages: 7 | Number of words: 1849

.... government involvement to protect the users. The Internet is a new, barely regulated frontier, and there are many reasons to be concerned with security. The same features that make the Internet so appealing such as interactivity, versatile communication, and customizability also make it an ideal way for someone to keep a careful watch on the user without them being aware of it (Lemmons 1). It may not seem like it but it is completely possible to build a personal profile on someone just by tracking them in cyperspace. Every action a person does while logged onto the Interne .....



« prev  52  53  54  55  56  57  58  59  60  61  next »