Welcome to the Term Paper Galaxy!
  Search Papers  
 
  Site Navigation
    Main
       Home
       Instant Access!
       Members Login
       Questions
       Email Us

    Paper Topics
       American History
       Arts and Theatre
       Biographies
       Book Reports
       Business
       Computers
       Creative Writing
       English
       Geography
       Government
       Medical
       Legal
       Miscellaneous
       Music
       Poetry
       Religion
       Science
       Social Issues
       World History




Find Computers Term Papers

Computer Crimes: Laws Must Be Pass To Address The Increase In Computer Crimes
Number of pages: 7 | Number of words: 1905

.... tend to usually be "between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges."(Shannon, 16:2) "It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from 'normal' individuals, but that is not the case."(Sharp, 18:3) It is believed that the computer criminal "often marches to the same drum as the potential victim but follows and unanticipated path."(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young .....


Ecodisc
Number of pages: 2 | Number of words: 394

.... from any part of the year. For example, you could view the reserve in the middle of winter and see what it looks like in summer. Ecodisc is one of the first interactive programmes, and there are hopes of some day there being interactive broadcast television. This is a breakthrough in visual entertainment, because while television lets you see a place, interactive video will let you explore it. Interactive video is where the viewer decides the plot and characters of a movie, or show. The viewer will basically be able to write their own scripts and produce the movie at the .....


Are "Good" Computer Viruses Still A Bad Idea?
Number of pages: 18 | Number of words: 4796

.... purposes is proposed and directions are given in which this technique can be improved further. The paper also demonstrates that the main reason for the conflict between those supporting the idea of a "beneficial virus" and those opposing it, is that the two sides are assuming a different definition of what a computer virus is. 1. What Is a Computer Virus? The general public usually associates the term "computer virus" with a small, nasty program, which aims to destroy the information on their machines. As usual, the general public's understanding of the term is incorrect. Th .....


The Computer And Mass Communication
Number of pages: 17 | Number of words: 4603

.... my work, I almost always have the radio on, picking a station from dozens of possibilities of broadcast entertainment and news. There is an astonishing electronic information infrastructure surrounding me - surrounding us all. But the electronic part of the information infrastructure is only a tiny fraction of what's available to me. Every morning the newspaper is thrown into the driveway. The paper is an amazing achievement, more than one hundred pages of news, data, photographs, and advertisements pulled over electronic threads from around the world, processed, organised, an .....


Data Security
Number of pages: 5 | Number of words: 1173

.... overdue property taxes (Secure Commerce on The Internet 12). The corporation Citibank also had an incident in 1995 in which Russian hackers stole over 10,000,000 dollars in fraudulent wire transfers by exploiting a hole in it's systems provision for money transfers. It cost the Italian government over 225,000 to repair a glitch in The Rome Air Force Base's system. The telecommunications giant of the west Southwestern Bell had a problem with a hacker named Christopher Schanot that cost them around 100,000 dollars. According to the CSI FBI Computer Crime and Security Survey, .....


Should The U.S. Government Be Scared Of Cyber Terrorism?
Number of pages: 4 | Number of words: 910

.... ago, a Swedish hacker managed to go to London, to Atlanta, and then to Florida where he rerouted and tied up phone lines in each country, put 911 services out of commission, impeded the response of police, fire and rescue services. There are also a lot of cyber attacks within the United States, which are referred to as domestic attacks. In 1996, there were 128 cases of cyber attacks on the FBI's files, in 1998 there were 550. If a terrorist wanted to black out New York City he would have to make physical contact with the power plant by means of bombs, or actual hands on .....


The Internet
Number of pages: 6 | Number of words: 1440

.... The WWW basically is a tool for exploring or surfing . The WWW is an attempt to organize so you can find information easier moving threw document to document. Why do I need to know this? Well now that I got threw all the techno-babble, let's get down to it. If you know how to utilize the Net, in just five minutes you could trade information and comments with millions of people all over the world, get a fast answer to any question imaginable on a scientific, computing, technical, business, investment, or any other subject. You could join over 11,000 electronic conferences, anyt .....


Internet Censorship
Number of pages: 6 | Number of words: 1406

.... emphasizing values and some foreign governments. In the latter, often the government does not want the citizens being introduced to new ideas, which may cause discontent and unrest in some cases. Whether the Internet should and can be censored is one debate which affects much of the modern world. Though there are strong arguments on both sides, by examining evidence it can be decided that there is no feasible way to regulate the Internet at the present time in the United States. Before any censorship can even be attempted, some serious questions must be answered. The most impor .....



« prev  74  75  76  77  78  79  80  81  next »