Home | Cancel Membership | Contact Us    
 
Paper Topic:
   PAPER CATEGORIES
Arts
Biography
Book Reports
Business
Computers
Creative Writing
English
Geography
Health
Legal
Miscellaneous
Music
Poetry
Religion
Science
Social Studies



Term Papers on Computers

Ethics In Cyberspace
Number of words: 940 - Number of pages: 4

.... 5) honor property rights including copyrights and patents 6) give proper credit for intellectual property 7) respect the privacy of others 8) honor confidentiality. The very nature of electronic communication raises new moral issues. Individuals and organizations should be proactive in examining these concerns and developing policies which protect liabilities. Issues which need to be addressed include: privacy of mail, personal identities, access and control of the network, pornographic or unwanted messages, copyright, and comm .....


History Of The Internet
Number of words: 856 - Number of pages: 4

.... faced with a problem. How could the country communicate after a nuclear war? The Pentagon's Advanced Research Projects Agency, ARPA, had a solution. They would create a non-centralized network that linked from city to city, and base to base. The network was designed to function when parts of it were destroyed. The network could not have a center because it would be a primary target for enemies. In 1969, ARPANET was created, named after its original Pentagon sponsor. There were four supercomputer stations, called nodes, on this high speed network. ARPANET g .....


Against Federal Censorship Of The Internet
Number of words: 334 - Number of pages: 2

.... upheld the lower court's ruling and struck down the decency act. The Supreme Court stated that the act was not only vague but that it unconstitutionally restricted the free speech rights of adults. An estimated of 40% of Internet material originates from foreign countries, where the US's Decency Act would not apply. Governments should not have the power to determine what sort of material is fit or unfit for individuals and their children to access on the Internet. Such power could become an oppressive form of censorship and could be used in an arbitrary manne .....


The Necessity Of Computer Security
Number of words: 1815 - Number of pages: 7

.... true nature had yet to be seen." Today's applications of computers are vast. They are used to run ordinary household appliances such as televisions and microwaves, to being tools in the workplaces through word processing, spreadsheets, and graphics software, to running monumental tasks such as being the heart and soul of the nations tax processing department, and managing the project timetables of the Space Shuttle. It is obvious that the computer is now and always will be inexorably linked to our lives, and we have no choice but to accept this technology .....


Cryptography
Number of words: 3143 - Number of pages: 12

.... and the encrypted data is no longer safe. The sender and the receiver then usually agree on a new key to prevent any further damage. In ancient Greece, around 550 Bc, messages were sent encoded to generals and could only be decoded using special staff keys. The key actually consisted of a physical object, which was applied on the message to get the decrypted version of it. In 50 Bc., one of the most simple cryptographic algorithms ever used was the one called the Caesar cipher, that was used by Julius Caesar to send messages to his generals. It consisted simply .....


Computer Crime In The 1990's
Number of words: 2399 - Number of pages: 9

.... four maybe even up to five billion dollars every year. Making an unwitting company pay for long distance calls is the most popular form of phone fraud today. The first step is to gain access to a private automated branch exchange known as a "PABX" or "PBX". One of these can be found in any company with twenty or more employees. A "PABX" is a computer that manages the phone system including it's voice mail. Once inside a "PABX" a hacker looks for a phone whose voice mail has not yet been programmed, then the hacker cracks it's access code and programs it's voice m .....


All About Disk Geometry And The 1024 Cylinder Limit For Disks.
Number of words: 1103 - Number of pages: 5

.... that I used kernel version 2.0.8 source as a reference.Other versions may differ a bit. 2.Booting When the system is booted, the BIOS reads sector 0 (known as the MBR - the Master Boot Record) from the first disk (or from floppy), and jumps to the code found there - usually some bootstrap loader.These small bootstrap programs found there typically have no own disk drivers and use BIOS services.This means that a Linux kernel can only be booted when it is entirely located within the first 1024 cylinders. This problem is very easily solved: make sure .....


Truth And Lies About The Computer Virus
Number of words: 1126 - Number of pages: 5

.... the truth. There is no organization that certifies wheather or not a virus is real. Even more potentially harmful is that the anti-virus companies could write viruses in order to sell their programs. Software companies have and do distort the truth about viruses. "Antivirus firms tend to count even the most insignificant variations of viruses for advertising purposes. When the Marijuana virus first appeared, for example, it contained the word "legalise," but a miscreant later modified it to read "legalize." Any program which detects the original virus can det .....



« prev  14  15  16  17  18  19  20  21  22  23  next »

Copyright © 2024 Paper Sucks! All rights reserved.