Paper University  
Search Papers:   
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CONTACT US
PAPER CATEGORIES
       Arts & Movies
       Book Reports
       Creative Writing
       English
       Finance & Money
       Geography & Places
       History
       Legal Issues
       Medicine & Nutrition
       Miscellaneous
       Music & Musicians
       People & Biographies
       Poetry & Poets
       Politics & Government
       Religion
       Science & Nature
       Society
       Technology
 
Technology Term Papers and Reports
Osi Model
583 Words - 3 Pages

.... between two end users in a network can be divided into layers, with each layer adding its own set of special, related functions. Each user is at a computer equipped with these seven layers of function. So, in a given message between users, there will be a flow of data through each layer at one end down through the layers in that computer and, at the other end, when the message arrives, another flow of data up through the layers in the receiving computer. The actual programming and hardware that makes these seven layers of function is usually a combination of the computer OS, applications, TCP/IP and the software and hardware that enable you to put a signal on one o ....


The Computer Underground.
4290 Words - 16 Pages

.... information of any sort. This paper attempts to expose what the CU truly is and dispel some of the myths propagated by the media and other organizations. This paper also tries to show the processes and reasons behind the criminalization of the CU and how the CU is viewed by different organizations, as well as some of the processes by which it came into being. What the CU is has been addressed by the media, criminologists, secuity firms, and the CU themselves, they all have a different understanding or levels of comprehention, this paper attempts to show the differences between the views as well as attempt to correct misunderstandings that may have been propagated ....


Society And The Role That Computers Play In USA
1150 Words - 5 Pages

.... the fastest growing technical jobs, software engineering tops the list. Carnegie Mellon University reports, “recruitment of it's software engineering students is up this year by over 20%.” All engineering jobs are paying well, proving that highly skilled labor is what employers want! “There is clear evidence that the supply of workers in the [unskilled labor] categories already exceeds the demand for their services,” says L. Mishel, Research Director of Welfare Reform Network. In view of these facts, I wonder if these trends are good or bad for society. “ The danger of the information age is that while in the short run it may be cheaper to replace workers w ....


The History And Development Of Computers
1942 Words - 8 Pages

.... wheel calculator. This rectangular box was called a Pascaline. It used eight movable dials to add sums up to eight figures long. Pascal's device used a base of ten to accomplish this. When the ten's dial moved one revolution, the dial representing the hundred's place moved one notch and so on. The drawback to the Pascaline, of course, was its limitation to addition. In 1694, a German mathematician named Gottfried Wilhem von Leibniz, improved the Pascaline by creating a machine that could also multiply. Leibniz's mechanical multiplier worked by a system of gears and dials. By studying Pascal's original notes and drawings, Leibniz was able to refine his machine. It wasn' ....


Requirements Needed In Certain Computer Related Fields
889 Words - 4 Pages

.... 000 annually. Commcorp Project Leader The Project leader for the Commcorp corporation designs and implements new systems for all areas of Commcorp as well as maintaining existing programs. Some requirements are: - 5 years progressive experience in an MVS/XA environment - detailed knowledge of COBOL (for business applications) - detailed knowledge and experience in CICS, VSAM, and MICROS. - Strong analytical, design and leadership skills an asset. The salary of a project leader varies occasionally, but in this case it is an important position, earning $60 000 - 70 000 annually. Systems Administrator S ....


The Internet
1386 Words - 6 Pages

.... was made for everyone no matter what a person is interested in (Gay 1). It is possible for someone to buy clothing without leaving their home. Designers like Calvin Klein have webpages in which clothing can be purchased by just supplying a credit card number (Gorman 30). can help with a lot of problems. For parents, can be extremely helpful. At certain websites, such as http://www.stlmoms.com, parents can get help about child illnesses, breast-feeding, pregnancy, childcare, or any other parenting problem that may arise (Licklider C1). Another thing that is very helpful is that if something were to go wrong with a computer, chat rooms area available that have many peo ....


Software Piracy
1389 Words - 6 Pages

.... may be illegally copied and distributed annually worldwide. These copies work as well as the originals and sell for significantly less money. Piracy is relatively easy, and only the largest rings of distributors are usually caught. In addition, software pirates know that they are unlikely to serve hard jail time when prisons are overcrowded with people convicted of more serious crimes. The software industry loses more than $15.2 billion annually worldwide due to software piracy. Software piracy costs the industry: $482 every second $28,900 every minute $1.7 million ever ....


Computer Security
2495 Words - 10 Pages

.... may ask a question: Can we make sure that the information in the computer is safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who expe ....



« prev  48  49  50  51  52  53  54  55  56  57  next »

 
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CANCEL MEMBERSHIP CONTACT US
Copyright © 2006 Paper University