Paper University  
Search Papers:   
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CONTACT US
PAPER CATEGORIES
       Arts & Movies
       Book Reports
       Creative Writing
       English
       Finance & Money
       Geography & Places
       History
       Legal Issues
       Medicine & Nutrition
       Miscellaneous
       Music & Musicians
       People & Biographies
       Poetry & Poets
       Politics & Government
       Religion
       Science & Nature
       Society
       Technology
 
Technology Term Papers and Reports
Computer Systems Analyst
1366 Words - 5 Pages

.... Do I enjoy the different activities within this area of interest? From the first day that I started my first computer, I have grasped the concepts quickly and with ease. But the computer as well as I will never stop growing. I have introduced myself to all topics of word processing to surfing the web. After reviewing a number of resources, I have noticed a relatively high demand for technologically integrated hardware and software positions available with companies that wish to compete with the demand for “networking”. (“Computer Scientists” 95) This leads me to believe that future employment prospects will be high and of high quality pay within the next e ....


Othello: Game Strategy
695 Words - 3 Pages

.... another one on the end. Example:You see a row of 5 black stones, with a white stone on the end, and beside that white stone a black. You of course, would put a white stone at the end with the 5 black stones, but that is a bad mistake. Go to the side with the one black (a setup move so the computer cannot capitalize when you turn 5 black stones white, and the computer your seven whites black. Always play within your set "square". If you had on the bottom row 3 white, and on the second row 2 blacks, you would only play within that designated square, which is 3 x 3 stones. (see diagram.) This ensures that the computer can only play one stone past the square at any ....


Internet Censorship
1990 Words - 8 Pages

.... that some countries are intent on establishing. Laws that are meant for other types of communication will not necessarily apply in this medium. There are no physical locations where communications take place, making it difficult to determine where violations of the law should be prosecuted. There is anonymity on the Internet and so ages and identities are not known this makes it hard to determine if illegal activities are taking place in regards to people under the legal age. As well, it is difficult to completely delete speech once it has been posted, Meaning that distributing materials that are obscene are banned becomes easy The American Library Association (ALA) has ....


Why Y2K?
1386 Words - 6 Pages

.... even many modern vehicles. Although many companies have gotten off their thumbs and done something about it, its too late to fix everything; meaning that something will fail on the year 2000. And even if some computers ARE compliant, what about those computers that they contact or link to Via the internet that are NOT compliant? They'd only be spewing in garbage the computer cant use, and can may even screw up compliant computers as well. I know what your thinking: "Its not going to happen, someone is going to make some "wonder program" that will fix all the bugs" Well let me tell you something...There are over 500 programming languages, many in foreign languages. Other pro ....


Setting Up A Computer Network
1042 Words - 4 Pages

.... bit more or less than that. First of all let’s talk about the cable type. If your financial resources are limited, coax is the best cable for the price. It is the oldest type but in some cases, it is sufficient because you don’t necessarily need a fast network. If you are not going to be connected to the Internet and your network is only going to be used for office work, coax is fine. The two types of coax that we will be using are RG-8 (thick) and RG-58 (thin). The RG-8 will be used as a backbone cable of the network this backbone cable is necessary because we will be using a bus topology on this network, which physically consist of a single cable (backbone) with multip ....


ISDN Vs. Cable Modems
2980 Words - 11 Pages

.... digital traffic (Cable Modems). It analyzes the potential of each enhancement to deliver Internet access to residential users. It validates the hypothesis that upgraded cable networks can deliver residential Internet access more cost-effectively, while offering a broader range of services. The research for this report consisted of case studies of two commercial deployments of residential Internet access, each introduced in the spring of 1994: · Continental Cablevision and Performance Systems International (PSI) jointly developed PSICable, an Internet access service deployed over upgraded cable plant in Cambridge, Massachusetts; · Internex, Inc. began selling Inter ....


Computer Viruses And Their Effects On Your PC
1272 Words - 5 Pages

.... annoying or it can cost you lots of cold hard cash. A virus is just another name for a class of programs. They do anything that another program can. The only distinguishing characteristic is the program has ability to reproduce and infect other programs. Is a computer virus similar to a human virus? Below is a chart that will show the similarities. Comparing Biological Viruses & Human Viruses Human Virus Effects Attack specific body cells' Modify the genetic information of a cell other than previous one. It performs tasks. New viruses grow in the infected cell itself. An infected program may not exhibit symptoms for a while. Not all cells with which the virus contact a ....


Polymorphic & Cloning Computer Viruses
1865 Words - 7 Pages

.... increased tenfold. The people who create computer viruses are now becoming much more adept at making them harder to detect and eliminate. These so-called "polymorphic" viruses are able to clone themselves and change themselves as they need to avoid detection. This form of "smart viruses" allows the virus to have a form of artificial intelligence. To understand the way a computer virus works and spreads, first one must understand some basics about computers, specifically pertaining to the way it stores data. Because of the severity of the damage that these viruses may cause, it is important to understand how anti-virus programs go about detecting them and how the virus itse ....



1  2  3  4  5  6  7  8  9  10  next »

 
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CANCEL MEMBERSHIP CONTACT US
Copyright © 2006 Paper University