Paper University  
Search Papers:   
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CONTACT US
PAPER CATEGORIES
       Arts & Movies
       Book Reports
       Creative Writing
       English
       Finance & Money
       Geography & Places
       History
       Legal Issues
       Medicine & Nutrition
       Miscellaneous
       Music & Musicians
       People & Biographies
       Poetry & Poets
       Politics & Government
       Religion
       Science & Nature
       Society
       Technology
 
Technology Term Papers and Reports
Computer Security
2496 Words - 10 Pages

.... of computer. So, people may ask a question: Can we make sure that the information in the computer is safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with compute ....


Floating Point Coprocessors
2861 Words - 11 Pages

.... that works in parallel to the MPU (Micro Processing Unit). A system involving concurrently operating processors can be very complex, since there need to be dedicated communication paths between the processors, as well as software to divide the tasks among them. A practical multiprocessing system should be as simple as possible and require a minimum overhead in terms of both hardware and software. There are various techniques of arranging a coprocessor alongside a microprocessor. One technique is to provide the coprocessor with an instruction interpreter and program counter. Each instruction fetched from memory is examined by both the MPU and the coprocessor ....


Are "Good" Computer Viruses Still A Bad Idea?
4796 Words - 18 Pages

.... inherently bad. It is also considering several of the proposed models of "beneficial" viruses and points out the problems in them. A set of conditions is listed, which every virus that claims to be beneficial must conform to. At last, a realistic model using replication techniques for beneficial purposes is proposed and directions are given in which this technique can be improved further. The paper also demonstrates that the main reason for the conflict between those supporting the idea of a "beneficial virus" and those opposing it, is that the two sides are assuming a different definition of what a computer virus is. 1. What Is a Computer Virus? The general public usua ....


BlueTooth
745 Words - 3 Pages

.... world. Communications effects our daily lives. Recently a new technology was introduced to the electronics world. This technology is known as . is a wireless networking standard for your personal area that provides license-free operation in Europe, Japan, and the United States. What makes so special is its ability to create a wireless link between devices equipped with this new technology. opens us up to a new level of data communications. By making it possible to communicate wirelessly to any device equipped with a chip. Mobile phones can communicate with lap top computers, digital daily planners can be linked to personal computers and have e-mail down loaded to them ....


ITT Trip Scheduling
1411 Words - 6 Pages

.... paragraphs I go through the major steps in developing a system of this nature. A system of this type goes through several phases in its development. I start with the planning phase and go on to discuss research, analysis and conceptual design. Then I talk a little about the models used in this system. I finish by talking about the actual design, the construction, and the implementation of the new ITT system. I finish the paper with a discussion of maintaining the system. The first step in building any DSS is planning. Planning is basically defining the problem. The planning also involves an assessment of exactly what is needed. In this case I deal with trip scheduli ....


Software
744 Words - 3 Pages

.... the cables, connectors, power supply units, and peripheral devices such as the keyboard, mouse, audio speakers, and printers. Hardware is sometimes used as a term collectively describing the physical aspects of telephony and telecommunications network infrastructure. is a general term for the various kinds of programs used to operate computers and related devices. (The term hardware describes the physical aspects of computers and related devices.) can be thought of as the variable part of a computer and hardware the invariable part. is often divided into application (programs that do work users are directly interested in) and system (which includes operating syste ....


Fast Car Physics
1557 Words - 6 Pages

.... aerodynamic efficiency is the single most important element in designing a competitive car for professional racing or getting the car model on the front of a Car and Driver or Motortrend. Aerodynamics is the study of the motion of gases on objects and the forces created by this motion. The Bernoulli effect is one of the most important behind car design. The Bernoulli Effect states that the pressure of a fluid, in gaseous or liquid state, varies inversely with speed or velocity and a slower moving fluid will exert more pressure on and object than the same fluid moving slower (Yager). The goal of car designers is to make the air passing under a car move faster t ....


The Internet
457 Words - 2 Pages

.... by various companies which are on the increase on a daily basis. These companies basically offer the same package but differ in the amounts they charge for membership. In my opinion a good company to subscribe to is one that offers a flat rate. In order to access the internet you require a good computer and a powerful modem . If you have these it is much easier and faster to "Surf the Net". I would recommend a 28.8 kbs modem manufactured by U.S Robotics. The Internet can give you access to both legal & illegal sites on the net. There is pirated software e.g. full version of games that you can access without actually paying for them. The internet can only be acce ....



« prev  79  80  81  next »

 
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CANCEL MEMBERSHIP CONTACT US
Copyright © 2006 Paper University