
|
Search Papers |
|
|
 |
|
Find Computers Term Papers
Noise Reduction In Hearing Aids
Number of pages: 9 | Number of words: 2400.... compensate for both the neurological shortcomings of the hearing impaired person and the wide band increase inherent in any basic amplifier.
Acoustic compensation can be carried out in a hearing aid microphone. Most hearing aids today utilize omnidirectional microphones, which pick up sound equally from all directions. This may be beneficial and practical in some cases, as in the completely in the canal (CIC) aid. The CIC aid uses the natural funneling of the auricle in order to focus sound directly into the instrument. Behind-the-ear (BTE) and full concha in-the-ear .....
|
Making Utilities For MS-DOS
Number of pages: 16 | Number of words: 4348.... And who would be able to
develop applications for an operating system if the documentation for that
system is confidential and available only to the company that developed it?
Obviously, only the company that has developed that operating system will be
able to develop software for it. And this is a violation of the Antitrust Law.
And now I start having a suspicion that this is happening with Microsoft's
operating systems. It should be no secret to anyone that MS-DOS contains a lot
of undocumented system calls, data structures and other features. Numerous books
have been wr .....
|
Telecommunications
Number of pages: 11 | Number of words: 3010.... Computer; Office Systems). The transmission line
used can be a normal or a specially purchased telephone line called a leased, or
private, line (see Telephone). It can also take the form of a microwave or a
communications-satellite linkage, or some combination of any of these various
systems.
Hardware and Software
Each telecommunications device uses hardware, which connects a device to the
transmission line; and software, which makes it possible for a device to
transmit information through the line.
Hardware
Hardware usually consists of a transmitter and a cable interfa .....
|
Modernization Of Air Warfare
Number of pages: 6 | Number of words: 1521.... Air Force said, "Stealth gives us back that fundamental element of war called surprise" (Goodall 9).
After it was found that aircraft could be very useful in war, it was used for large scale reconnaissance. Then people started to add bombs to aircraft and then airplanes started to become an essence of war. After World War 2, new bombers were developed with fast speed, and could travel far distances. They could also carry nuclear bombs and missiles. The use of the bomber aircraft then led to the fighter, which was equipped with guns and missiles. Helicopters were a .....
|
Computer Piracy
Number of pages: 8 | Number of words: 1959.... from the sharing of floppy disks to mismanagement of network software licenses and the production of counterfeit CD-ROMs, including “compilation CDs” that can contain thousands of dollars worth of products.” There are many ways that an individual can commit computer/software piracy. There are six different methods that you can pirate software. The first method of software piracy is called End User Copying. This is the most common method of software/. In order to do this, the individual who purcahsed the software at the local retail/department store must share this product w .....
|
Computer In The Classroom
Number of pages: 5 | Number of words: 1227.... on the desk, taking up a good 50% of the workspace. These monitors are usually greater than a .3 dot pitch or worse and some with only a 33 mHz refresh rate. According to Van Horn, a professor at Augsburg, in his essay titled Electronic classrooms: design and use, this is absolutely unacceptable for multiple reasons. Looking at a computer screen with a low resolution or refresh rate is stressful on the eyes. When students are constantly straining their eyes, according to his studies, creativity is reduced, errors increase due to a hasty finish, and enthusiasm is lost. .....
|
Save The Internet
Number of pages: 6 | Number of words: 1578.... our children.
Pornography is regarded as immoral and downright filthy by the people.
It denies human dignity and often stimulates the user to violent acts (Beahm
295). Therefore, pornography and violence are correlated. It trivializes the
human beauty and converts it into commercialized slime (Beahm 295). Moreover,
the consumption of pornography can lead to a detrimental addiction and the
consumer can become a slave to it (Beahm 297). In short, pornography is a very
addictive drug; which has an equal or more potency to hard-core drugs like
heroin and cocaine. Can you imag .....
|
How Cell Phones Work
Number of pages: 4 | Number of words: 999.... can switch cells as they move around. Cells give cell phones incredible range. A walkie-talkie can transmit perhaps a mile. A CB radio, because it has much higher power, can transmit perhaps 5 miles. Someone using a cell phone, on the other hand, can drive clear across a city and maintain a conversation the entire time. Cells are what give a cell phone its incredible
range (Anonymous #2).
The genius of the cellular system is the realization that a city can be chopped up into small cells, and that the cells allow extensive frequency reuse across a city. Frequency reuse is what .....
|
|