Paper University  
Search Papers:   
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CONTACT US
PAPER CATEGORIES
       Arts & Movies
       Book Reports
       Creative Writing
       English
       Finance & Money
       Geography & Places
       History
       Legal Issues
       Medicine & Nutrition
       Miscellaneous
       Music & Musicians
       People & Biographies
       Poetry & Poets
       Politics & Government
       Religion
       Science & Nature
       Society
       Technology
 
Technology Term Papers and Reports
The Computer Underground
15764 Words - 58 Pages

.... of the "computer underground" (CU). The CU is composed of actors in three roles, "computer hackers," "phone phreaks," and "software pirates." These roles have frequently been ignored or confused in media and other accounts of CU activity. By utilizing a data set culled from CU channels of communication this paper provides an ethnographic account of computer underground organization. It is concluded that despite the widespread social network of the computer underground, it is organized primarily on the level of colleagues, with only small groups approaching peer relationships. Certification: In accordance with departmental and Graduate School policies, this ....


Battle Of Computer Bytes
1008 Words - 4 Pages

.... the ease of use on a Mac. The Windows 95 interface is much better than Windows 3.x. It borrows some from the Macintosh interface and has improved on it. Some improvements are the ability to work with folder icons that represent directories and subdirectories in DOS. Windows 95, unlike the Mac, logically groups data and resources. A Taskbar menu lets you call up and switch between any software application at any time. Thus feature is better than the Mac's because its use is more obvious. It clearly shows what is running and allows you to switch programs with a single click of the mouse. Control panels have been added so you can configure your hardware. There is easy acc ....


Radio: A Form Of Communication
3073 Words - 12 Pages

.... waves is retrieved and presented in an understandable form. This form may be sound from a loudspeaker, a picture on a television, or a printed page from a teletype machine. HISTORY Early Experimenters The principles of radio had been demonstrated in the early 1800s by such scientists as Michael Faraday and Joseph Henry. They had individually developed the theory that a current flowing in one wire could induce (produce) a current in another wire that was not physically connected to the first. Hans Christian Oersted had shown in 1820 that a current flowing in a wire sets up a magnetic field around the wire. If the current is made to change and, in particular, made to ....


Making Utilities For MS-DOS
4348 Words - 16 Pages

.... for that platform. In particular, proper documentation is essential for such a platform. Not providing enough documentation for a system that everyone uses can have disastrous results. Think of it, an operating system is useless by itself, its sole purpose is to provide services to applications. And who would be able to develop applications for an operating system if the documentation for that system is confidential and available only to the company that developed it? Obviously, only the company that has developed that operating system will be able to develop software for it. And this is a violation of the Antitrust Law. And now I start having a suspicion that this is ....


The Internet: How It Works And How It Effects The World
1646 Words - 6 Pages

.... enemy attack. The ARPANET was very successful, and every university in the country wanted to sign up. Because so many people wanted to use the Net, ARPANET started getting hard to manage, especially with many university sites on it. Therefore, it was broken into two parts: MILNET, which had all the military sites, and ARPANET, which had all the nonmilitary sites. "The two networks remained connected, however, thanks to a technical scheme called IP (Internet Protocol), which enabled traffic to be routed from one net to another as needed. All the networks connected by IP in the Internet speak IP, so they can all exchange messages." (Levine 12) Even though there were onl ....


Computer Security
2026 Words - 8 Pages

.... So, people may ask a question: Can we make sure that the information in the computer is safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs ....


Computer Crime Is Increasing
1410 Words - 6 Pages

.... and executed; an example is the transfer of money balances in accounts to perpetrators' accounts for withdrawal. Computers are instruments of crime when they are used to plan or control such criminal acts. Examples of these types of crimes are complex embezzlements that might occur over long periods of time, or when a computer operator uses a computer to steal or alter valuable information from an employer. Variety and Extent Since the first cases were reported in 1958, computers have been used for most kinds of crime, including fraud, theft, embezzlement, burglary, sabotage, espionage, murder, and forgery. One study of 1,500 computer crimes established that most of t ....


Software And High School
609 Words - 3 Pages

.... The proper choice of software is very important especially for beginners. Their first encounter with the computer should be exiting and fun. It should stimulate their interest in the computing field. First and foremost is the fact that computer software is a very important educational tool. Students in high schools experience computers for the first time through games and other entertaining software. These help develop youth's mental pathway in the way of logic, reflexes and the ability to make quick and concrete decisions [Lipcomb, 66]. The next step requires them to think more seriously about the machines. Secondary students learn the first steps in computer p ....



« prev  47  48  49  50  51  52  53  54  55  56  next »

 
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CANCEL MEMBERSHIP CONTACT US
Copyright © 2006 Paper University