Paper University  
Search Papers:   
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CONTACT US
PAPER CATEGORIES
       Arts & Movies
       Book Reports
       Creative Writing
       English
       Finance & Money
       Geography & Places
       History
       Legal Issues
       Medicine & Nutrition
       Miscellaneous
       Music & Musicians
       People & Biographies
       Poetry & Poets
       Politics & Government
       Religion
       Science & Nature
       Society
       Technology
 
Technology Term Papers and Reports
Internet Addiction
1880 Words - 7 Pages

.... beginning stages. While lost in this so called 'Cyber Community' for long periods of time, people are neglecting other important activities like; time with the family, socializing, work and health concerns. One of the most extensive studies on Internet Addiction to date was conducted by Dr. Kimberly S. Young of the University of Pittsburgh at Bradford. In her study, she revealed concrete evidence supporting the Internet Addiction claim. However, help for web addicts is available. There are several web sites available for the treatment of Internet addiction, as well as counseling centers and clinics. Is it Live, or is it Internet? Internet Addiction The Internet is the larges ....


Solving Problem Creatively Over The Net
460 Words - 2 Pages

.... must have a high counter number so that people will revisit the homepage again. I can't use any "sensual" word to attract people cause it's against Geocities's rule. So I did a very nasty thing. I cheated, I put an extra counter number in my homepage beside my origi nal counter number so each time when it reload it will look like this---->0101.While the only people who visited my homepage was myself, but instead the counter number show 101. MIRC The Solution When my PC suffered a data crash, I lost all my data. I lost all my e-mail address and most importantly my browser.The computer technician managed to repair my PC but he gave me an old version of Netscape.I have ....


Laws Must Be Passed To Address The Increase In The Number And Types Of Computer Crimes
1340 Words - 5 Pages

.... be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be "between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges."(Shannon, 16:2) "It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from 'normal' individuals, but that is not the case."(Sharp, 18:3) It is believed that the computer criminal "often marches t ....


Agricultural Technological Advancements
327 Words - 2 Pages

.... of the soils of the world, as well as the management of soils to produce food and protect the environment. Hydroponics from the Latin 'water working', is simply growing plants without soil. Hydroponics is as old as the Hanging Gardens of Babylon. Today this technology is widely used to grow lush, healthy indoor plants and premium grade vegetables, fruits and herbs. The physiological requirements of plants can be met without the use of soil or natural sunlight. Plants are rooted (and thus supported) in an inert medium and nutrition is provided by water soluble mineral elements. The corn borer is devastating for the farmer, costing growers more than $1 billion ann ....


Computer - Hacking
471 Words - 2 Pages

.... of an organisation like the N.A.S.A for example. Often they do not know what kind of problems they will have to face. An example for this would be a little boy of twelve years of age, who managed to enter into the database of an important stock exchange computer. His parents will probably be fined, also if this boy did not do any real harm. As I already mentioned, hackers are in most cases only interested in the so called “cracking” of passwords without wanting to destroy anything. There is definitely also a great competition under the top-hackers of the world. Hackers often gain entrance because of a lack of security. This brings me to my second point which deals w ....


Transfers Of Technology From The Developing World
1560 Words - 6 Pages

.... these people to become prosperous nations that can fend for themselves and provide for their people. Transfers of technology from the developed world to the developing world will improve the standard of living, increase efficiency in production and become a base for economic growth, without this transfer these countries will fall further into poverty and economic ruin, with little hope for survival. For most people of the developed world, the developing world is not something they concern themselves with; they do not see it everyday and therefore it does not exist. This could not be farther from the truth. The developing world is in need of help but the developed world consta ....


The Power On Self Test
1575 Words - 6 Pages

.... by pressing the DEL key after resetting (CTRL-ALT-DEL) or powering up the computer. You can bypass the extended CMOS settings by holding the key down during boot-up. This is really helpful, especially if you bend the CMOS settings right out of shape and the computer won't boot properly anymore. This is also a handy tip for people who play with the older AMI BIOSes with the XCMOS setup. It allows changes directly to the chip registers with very little technical explanation. A Typical BIOS POST Sequence Most BIOS POST sequences occur along four stages: 1. Display some basic information about the video card like its brand, video BIOS version and video memory available. ....


Artificial Intelligence
2749 Words - 10 Pages

.... 6 Current Applications 7 Optical Character Recognition 8 Conclusion 9 Recommendations 10 Bibiography 11 INTRODUCTION Purpose The purpose of this study is to determine additional areas where artificial intelligence technology may be applied for positive identifications of individuals during financial transactions, such as automated banking transactions, telephone transactions , and home banking activities. This study focuses on academic research in neural network technology . This study was funded by the Banking Commission in its effort to deter fraud. Overview Recently, the thrust of studies into practical applications for art ....



« prev  23  24  25  26  27  28  29  30  31  32  next »

 
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CANCEL MEMBERSHIP CONTACT US
Copyright © 2006 Paper University