Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Advancement Of Technology And Science And Its Influence On Science Fiction Novels
Number of pages: 5 | Number of words: 1166

.... the author knows that it is always present in the mind of the reader. It is this plausablilty of what conventionally should not be acceptable that has led to science fiction's increasing popularity over the years. As James explains, "much sf is concerned with the future and with the possibilities presented by scientific and technological change" (James 3). Truly, humans exploring and even colonizing other worlds, the plot of many a science fiction novel, has to many become inevitable. The successful series of Apollo moon landings in the 1960's and the knowledge that we .....


Video Games: The High Tech Threat To Our Younger Generation
Number of pages: 10 | Number of words: 2673

.... dollar business growing at 40 per cent a year from 1987 to 1993 (Palmeri 102). Tetzeli in his article "Videogames: Serious Fun" compares videogames $ 6.5 billion--a--year business to the Hollywood film industry (110). He continues to point out that two Japan based conglomerate have put about 64 million videogame machines in US households in total. In addition to that they also produced and licenced for all their softwares for their machines (110). Palmery estimates to produce and market a ful featured videogame it would costs up to $10 million (102). Because of the c .....


Computer Fraud And Crimes
Number of pages: 4 | Number of words: 993

.... of memory being used and the file usage if something is going on that should not be. If a virus is found, system administrators can pinpoint the user who put the virus into the network and investigate whether or not there was any malice intended. One computer application that is becoming more widely used and, therefore, more widely abused, is the use of electronic mail or email. In the present day, illegal hackers can read email going through a server fairly easily. Email consists of not only personal transactions, but business and financial transactions. There are not m .....


The Y2k Issue
Number of pages: 6 | Number of words: 1450

.... problems, or even that a majority will. But without question, some will. The extent of that "some" is largely unknown. Water treatment facilities, food & farming, defense, transportation, hospitals & emergency service, power, banking, law enforcement, communications, fuel, and government are all things in question. Experts have testified before banking subcommittees that any major firm that has not already completed its assessment can not hope to become Y2K compliant by January 1, 2000. None of the utilities that were surveyed were assured after making inquiries that t .....


Agricultural Technological Advancements
Number of pages: 2 | Number of words: 327

.... grow lush, healthy indoor plants and premium grade vegetables, fruits and herbs. The physiological requirements of plants can be met without the use of soil or natural sunlight. Plants are rooted (and thus supported) in an inert medium and nutrition is provided by water soluble mineral elements. The corn borer is devastating for the farmer, costing growers more than $1 billion annually in the United States. Bt stands for Bacillus thuringiensis, which is a naturally occurring soil organism. Bacillus thuringiensis produces a powerful toxin protein that kills the European corn bo .....


The Future Of Security
Number of pages: 2 | Number of words: 368

.... with the one in the database of the account owner and making sure the funds are available to cover the entire purchase. If the purchase is approved the account will be debited in real-time. Transactions can be denied for lack of funds, retina scans not matching, the person has missed a court date or is wanted by the government for questioning or committing a crime. If the transaction is denied, the reason is displayed on the cashier’s screen and security is immediately notified if the customer is wanted by the government or if the retina scans do not match. Monthly bills w .....


Implementing A CAD System TO Reduce Costs
Number of pages: 6 | Number of words: 1503

.... improvement as a result of CAD would be that of achieving much tighter tolerances in building new products. Using a CAD system, part designs could be received in an electronic format such as a math model. These models are currently in use by customers such as GM, BMW and Mercedes. The effect of having math models of all new products would enable a quicker turnaround in both quoting and production of products. CAD Vendors & Hardware Suppliers: Upon observing the various systems used by several customers and suppliers, the major CAD vendors worth consideration have been .....


The History And Development Of Computers
Number of pages: 8 | Number of words: 1942

.... drawback to the Pascaline, of course, was its limitation to addition. In 1694, a German mathematician named Gottfried Wilhem von Leibniz, improved the Pascaline by creating a machine that could also multiply. Leibniz's mechanical multiplier worked by a system of gears and dials. By studying Pascal's original notes and drawings, Leibniz was able to refine his machine. It wasn't until 1820 that mechanical calculators gained widespread use. Charles Xavier Thomas de Colmar, a Frenchman, invented a machine that could perform the four basic arithmetic functions. Colmar's mechan .....



« prev  73  74  75  76  77  78  79  80  81  next »