Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Noise Reduction In Hearing Aids
Number of pages: 9 | Number of words: 2400

.... compensate for both the neurological shortcomings of the hearing impaired person and the wide band increase inherent in any basic amplifier. Acoustic compensation can be carried out in a hearing aid microphone. Most hearing aids today utilize omnidirectional microphones, which pick up sound equally from all directions. This may be beneficial and practical in some cases, as in the completely in the canal (CIC) aid. The CIC aid uses the natural funneling of the auricle in order to focus sound directly into the instrument. Behind-the-ear (BTE) and full concha in-the-ear .....


Making Utilities For MS-DOS
Number of pages: 16 | Number of words: 4348

.... And who would be able to develop applications for an operating system if the documentation for that system is confidential and available only to the company that developed it? Obviously, only the company that has developed that operating system will be able to develop software for it. And this is a violation of the Antitrust Law. And now I start having a suspicion that this is happening with Microsoft's operating systems. It should be no secret to anyone that MS-DOS contains a lot of undocumented system calls, data structures and other features. Numerous books have been wr .....


Telecommunications
Number of pages: 11 | Number of words: 3010

.... Computer; Office Systems). The transmission line used can be a normal or a specially purchased telephone line called a leased, or private, line (see Telephone). It can also take the form of a microwave or a communications-satellite linkage, or some combination of any of these various systems. Hardware and Software Each telecommunications device uses hardware, which connects a device to the transmission line; and software, which makes it possible for a device to transmit information through the line. Hardware Hardware usually consists of a transmitter and a cable interfa .....


Modernization Of Air Warfare
Number of pages: 6 | Number of words: 1521

.... Air Force said, "Stealth gives us back that fundamental element of war called surprise" (Goodall 9). After it was found that aircraft could be very useful in war, it was used for large scale reconnaissance. Then people started to add bombs to aircraft and then airplanes started to become an essence of war. After World War 2, new bombers were developed with fast speed, and could travel far distances. They could also carry nuclear bombs and missiles. The use of the bomber aircraft then led to the fighter, which was equipped with guns and missiles. Helicopters were a .....


Computer Piracy
Number of pages: 8 | Number of words: 1959

.... from the sharing of floppy disks to mismanagement of network software licenses and the production of counterfeit CD-ROMs, including “compilation CDs” that can contain thousands of dollars worth of products.” There are many ways that an individual can commit computer/software piracy. There are six different methods that you can pirate software. The first method of software piracy is called End User Copying. This is the most common method of software/. In order to do this, the individual who purcahsed the software at the local retail/department store must share this product w .....


Computer In The Classroom
Number of pages: 5 | Number of words: 1227

.... on the desk, taking up a good 50% of the workspace. These monitors are usually greater than a .3 dot pitch or worse and some with only a 33 mHz refresh rate. According to Van Horn, a professor at Augsburg, in his essay titled Electronic classrooms: design and use, this is absolutely unacceptable for multiple reasons. Looking at a computer screen with a low resolution or refresh rate is stressful on the eyes. When students are constantly straining their eyes, according to his studies, creativity is reduced, errors increase due to a hasty finish, and enthusiasm is lost. .....


Save The Internet
Number of pages: 6 | Number of words: 1578

.... our children. Pornography is regarded as immoral and downright filthy by the people. It denies human dignity and often stimulates the user to violent acts (Beahm 295). Therefore, pornography and violence are correlated. It trivializes the human beauty and converts it into commercialized slime (Beahm 295). Moreover, the consumption of pornography can lead to a detrimental addiction and the consumer can become a slave to it (Beahm 297). In short, pornography is a very addictive drug; which has an equal or more potency to hard-core drugs like heroin and cocaine. Can you imag .....


How Cell Phones Work
Number of pages: 4 | Number of words: 999

.... can switch cells as they move around. Cells give cell phones incredible range. A walkie-talkie can transmit perhaps a mile. A CB radio, because it has much higher power, can transmit perhaps 5 miles. Someone using a cell phone, on the other hand, can drive clear across a city and maintain a conversation the entire time. Cells are what give a cell phone its incredible range (Anonymous #2). The genius of the cellular system is the realization that a city can be chopped up into small cells, and that the cells allow extensive frequency reuse across a city. Frequency reuse is what .....



« prev  62  63  64  65  66  67  68  69  70  71  next »