Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

An Insight Into Virtual Reality
Number of pages: 5 | Number of words: 1218

.... with 15 sensors that monitor finger flexion, extension, hand position and orientation. Connected to a computer through fiber optic cables. Sensor inputs enable the computer to generate an on screen image of the hand that follows the operator's hand movements. The glove also has miniature vibrators in the finger tips to provide feedback to the operator from grasped virtual objects. Therefore, driven by the proper software, the system allows the operator to interact by grabbing and moving a virtual object within a simulated room, while experiencing the "feel" of the object. .....


“Sin In The Global Village”: Privacy In Cyberspace
Number of pages: 4 | Number of words: 970

.... address) back to its origin. In short, people’s visions about a totally anonymous Internet are false because of the electronic trail that is left for others to find. Linda Tripp, who taped her conversations with the former White House intern Monica Lewinsky, exposed President Clinton’s recent oral sex scandal by means of surveillance. Wright is suggesting that this could happen to anyone. Computer surveillance isn’t all that uncommon these days so people should look out for what they write and where they go on the Internet because someday it might be used against them. Disi .....


Amd Vs. Intel
Number of pages: 3 | Number of words: 783

.... as Intel chips. It needed a different motherboard, a socket-7 motherboard. This hurt AMD’s chances at the beginning, but in early 1998 they unveiled their mighty K6-2 processor. The K6-2 Processor was “bigger, better, and cheaper.” The processor ran on a 100mhz bus, while Intel’s chips still ran on a 66mhz bus, this made AMD’s chip faster. It also was nearly 16% cheaper than any Intel based Pentium!! computer. The gaming community accepted the k6-2 with cautious, but open, arms. With their new SIMD-Enhanced (Single Instruction Multiple D .....


Telnet
Number of pages: 3 | Number of words: 669

.... FTP (file transfer protocol), crude email programs, and news reading. Telnet made library catalogs, online services, bulletin boards, databases and other network services available to casual computer users, although not with the friendly graphic user interfaces one sees today. Each of the early internet functions could be invoked from the UNIX prompt, however, each of them used a different client program with its own unique problems. Internet software has since greatly matured, with modern web browsers (i.e. Netscape and Internet Explorer) easily handling the WWW protocol .....


The Computer Underground
Number of pages: 58 | Number of words: 15764

.... this paper provides an ethnographic account of computer underground organization. It is concluded that despite the widespread social network of the computer underground, it is organized primarily on the level of colleagues, with only small groups approaching peer relationships. Certification: In accordance with departmental and Graduate School policies, this thesis is accepted in partial fulfillment of degree requirements. ______________________ Thesis Director __________________ .....


Computer Crimes
Number of pages: 5 | Number of words: 1152

.... raise in the hacker’s ego game. Only seventy-five computer crime prosecutions were reported in the United States in 1986, according to the National Center for Computer Crime Data in Santa Cruz, Calif. By 1989, that number jumped to 500 prosecutions. that year cost businesses and banks and, ultimately, consumers about $500 million. "As the use of computers has increased, so has their criminal misuse" (Parker 54:G13). Computers are used to obtain credit card numbers, which are then used to order thousands of dollars worth of whatever the hackers want. "In recent years, in .....


The Future Of The Internet
Number of pages: 2 | Number of words: 457

.... to date with what is being developed on the internet. With these technological advances, systems will be faster, more powerful, and capable of doing more complicated tasks. As more people with different interests, thoughts, and ideas get involved with the internet, there will be more information available (Elmer-Dewitt 64). As the number of internet users increases, the prices will gradually decrease on internet software and organizations (Peterson 358). The best quality about the size of the internet is it is so big that it cannot be destroyed (Elmer-Dewitt 62). There .....


Microprocessors
Number of pages: 9 | Number of words: 2468

.... work. A really good analogy for the way the inner workings of a chip operate can be found in How Microprocessors Work. In their book, Wyant and Hammerstrom describe a microprocessor as a factory and all of the inner workings of the chip as the various parts of a factory (Wyant and Hammerstrom, 71-103). Basically a microprocessor can be seen as a factory because like a factory it is sent something and is told what to do with it. The microprocessor factory processes information. This most basic unit of this information is the bit. A bit is simply on or off. It is either a one .....



« prev  60  61  62  63  64  65  66  67  68  69  next »