Search Lots of Essays


ChuckIII's College Resources - Free Essays, Free Term Papers, Research Papers, Cliff Notes, and Book Reports
We are dedicated to helping students with
their everyday College needs. If you have
any questions or comments Please feel free
to e-mail us @ feedback@ChuckIII.com

Thanks to students like YOU!
Please, Keep them coming and help us grow



Back to Subjects ... Computers

Please choose the letter your topic begins with...
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ALL

Title Word Count

Internet Rating Systems Censors by Default
" Internet Rating Systems: Censors by Default" The Internet, first designed for the military and the scientific community, has grown larger and fast
2470
Alan Turing
Alan Turing was born in London on 23 June 1912. He was the son of Julius Mathius Turing and Ethel Sara Stoney, the youngest of three children, he was
420
computer and kids
280
computer simulation
Computer Simulation WARSIM 2000 is simulation software, used by the armed forces. Extensive, thorough, and tiring work has
2280
computersinternet privacy
INTERNET REGULATION: POLICING CYBERSPACE The Internet is a method of communication and a source
1394
Computing Power Unleashed
This article mainly deals with the microprocessor chip, which is the computer's brain. This computer chip is responsible for the majority of the computers
483
Contrast DOS to Unix
Compare and Contrast Microsoft DOS with UNIX
3715
Cyber Porn
Imagine a place where you have access to anything and everything one could want. Some would say that is only existent in a utopia, and some would say tha
3176
DESIGNING A NETWORK
The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) de
3025
embracing the future with technology
Has technology opened a Pandora's box of social alienation, or alternatively, is it bringing humans into a new era of prosperity and well being?
934
GPS
The new Avionics Modernization Program (AMP) systems installed in the F-111E and EF-111A have raised their share of questions, so I have decided to continue
3360
Hacker
Computer Hacker The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community.
1044
History of Computer Industry
History of the Computer Industry in America Only once in a lifetime will a new invention come about to touch every a
2691
How To Computerize Your Accounts
THESIS: I will explain the steps that need to be taken to computerize business accounts. The steps are planning and informed selec
1651
Internet
Chances are, anyone who is reading this paper has at one time, at least, surfed the net once. Don't worry if you haven't, I willexplain every
1478
Internet Rating Systems Censors by Default
" Internet Rating Systems: Censors by Default" The Internet, first designed for the military and the scientific community, has grown larger and faste
2470
internet tv
ZENITH TO LAUNCH INTERNET TV PRODUCTS BASED ON NC TECHNOLOGY FROM ORACLE LAS VEGAS, Jan. 8, 1997 -- Zenith Electronics Corporation (NYSE:ZE) ha
556
Knowledge Manegment Systems
2195
Networking Principles
One problem that I see with people today is that they are unaware what a computer network is. They might have heard of a comp
2672
No silver bullet
The objectives of this essay are to examine whether or not Brook’s original scepticism that “no single new development in the next ten years w
1735
OLD AND NEW
  What do we usually think of when we hear the word computer? Well most of us seem to fret or run away when we hear that word bu
1699
Pentium III disturbs Privacy
The recent release of the Intel Pentium III has consumers as well as businesses concerned about the privacy of the computer world. The controversial iss
501
plus
-------------------------------------------------------------------------------- Sather is an object oriented language designed to be simple
4092
robots
Robot Design Engineers plan ,design and coordinate the integration of machinery and equipment such as robots, rob
272
Software and copyright
Current copright and patent laws are inapropriate for computer software; their down software development and reduces competition.
2844
The Cyber War
The Internet is a wondrous place. Practically anything you could ever want is available on the Net. It’s like a big city, it has distinguished areas,
1318
microprocessors
4325
Y2K
Why is the Y2K problem being overlooked? The Year 2000 is rapidly approaching! Will we be ready in time?
1375
Computerization of a Company
The word ubiquitous means ever present or occurring everywhere. This term could be used to describe the use of the computer in the business. The business w
1197
Computer Calamities
There's nothing worst than when a machine that you depend on so much, just decides it doesn't want to work anymore. If you run a busi
996
The Rise of the Y2K Bug
"The Y2K problem is the electronic equivalent of the El Niño and there will be nasty surprises around the globe."--John Hamre, Dep. Secretary of Defense
743
computing now
________________________________________________
359
Comparing and Contrasting the Internet to Print
Comparing and Contrasting the Internet to Print The differences between the Internet and Print Journalism are clear immediately upon glancing at either of
730
Asynchronous Transfer Mode
1112
Windows NT 40 Workstation year 2000 compliance
Background: To determine whether or not WinNT 4.0 is within year 2000 compliance. From the outlined testing procedures found in the 'YEAR 2000 Testing me
1117
Small Company Y2K Report
3. Hardware and Software Compliance
1311
Apple vs The World
In past years, Apple was on a downward spiral, but now the Mac is back on the right track. The interim CEO Steve Jobs has brought them fr
873
Internet1
To start off this project we clicked on the Explorer Icon on the desktop. Once we were online, we typed the following URL’s according to the part of th
440
Encryption
PGP stands for "Pretty Good Privacy." It is an encryption program. What encryption does is hide information from people who do not know the "secret word" to re
2692
how cpu affect the lives of peole
In this paper I wiil attempt to show you that computers have affected people in so many ways over the pass twenty -to twentyfive years. all by just playing a i
154
Apples G4 Marketing Snafu
In fulfillment of the periodical paper assignment, I have chosen a recent story concerning Apple Computer Inc. as the topic for the first paper.
542
Year 2000 Computer Problem Y2K Bug
Less than two years until the year 2000. Two seemingly small digits may turn January 1, 2000 from a worldwide celebration into a
2234
Turbo C for dummies
************************************** WELCOME TO TURBO C++ FOR WINDOWS 4.5 *******************************
4142
Hackers Not Slackers
Since the introduction of personal computers in the 1970's, the art of computer hacking has grown along with changing roles of comp
740
how to design a network
The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) dep
2951
Website Analysis
The Rhode Island Department of the Attorney General' s Website is very easily accessed through any Internet provider. The domain address for this site is Http
955
The Y2K Bug
The year 2000 problem could have been completely prevented had some early people envisioned the degree to which the microprocessor would
4190
Effects of web on business
The Internet will greatly alter the structure and operation of all industries. For the management of any existing business the
1103
CMIP vs SNMP Network Management
Imagine yourself as a network administrator, responsi
2236
Network Hardware
Ever since the days of the Pony Express, people have looked to getting information, whether personal or business, to its intended receiver as soon as possible
1135
Telephone TV Cable Television
In today's world the bounds of information technology are being pushed further and further every day. With Local Area Networks spanning into WorldWide Area
2101
Multimedia
What is graphics and multimedia? First of all, graphics software pertains to any computer device or program that makes a computer capa
380
Emily DickinsonWhy she is an american poet
Emily Dickinson, a creative poet during the mid-nineteenth century, wrote what many consider to be truly American poetry. To understand why Dickinson is cons
2011
simuulation games
Simulation Games- To take the appearance or form of; to pretend; to make a model of
520
Example Web Site Proposal
I propose to develop a web site for anyone in the sunglass, contact lens, colored co
339
Internet Censorship
Mr. Speaker, distinguished members of the house, The opposition concedes that proctecting children and to enable adults to avoid material which offends the
1108
the year 2000 bug
Do you have a home computer or a small business with a computer? You have undoubtedly read or heard information about the upcoming new century and are wonder
1877
Hackers Good or Evil
Imagine this, you are driving along the road and suddenly you see something spectacular. Now imagine that you are not allowed to deviate from your course to
1174
None Provided
There is a company down in Silicon Valley that seems to think it needs to produce more and more CPUs to push to the public to buy them when they are not neede
502
CFortran and others
Despite having very little knowledge of the wor
3804
A System Analyst
A Systems Analyst analyses, designs and implements the information gathered previously to a system, the final product which is a report of
423
Internet Regulation
INTERNET REGULATION: POLICING CYBERSPACE The Internet is a method of communication and a source of information that is
1103
Complete Computer System
The new Power Mac G4 is up to twice as fast as the fastest Pentium III-based PCs. With its Pentium-cr
961
Mr
Introduction When the Internet and World Wide Web were first created, they were designed a research tools and for the distribution of information t
2550
hacking
Recently, the word ``hacker'' has fallen into disrepute, coming to signify in the popular media the perpetrators of various forms of computer-aided crime. But
508
Hackers
Since the introduction of personal computers in the 1970's, the art of computer hacking has grown along with changing roles
2808
Data Encryption
The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send informat
725
Internet Security
Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems
1889
Interactive class
How to Go From Class-Room to Web-Room as Painlessly as Possible By Rik Hall, University of New Brunswick, Fredericton, New Brunswick
3099
Hackers1
The meaning of a hacker is one who accesses a computer that can supposably not be accessed to non authorized people of the community. Hackers may use any type
1039
Computer Viruses
Introduction In the past decad
1778
Computers
Could one imagine what the world would be like today without computers? For one, I would not be typing this paper right now. Comput
1215
Benefits of the internet for your business
Access to the Internet is rapidly becoming a necessity in today’s business environment. Internet access at my business enables workers to perform a wide varie
543
Domain Name Server
Network software generally needs a 32-bit Internet address in order to open a connection or send a datagram. However users prefer to deal
759
Line Noise
Achieving a reliable Internet connection as close to 56K as possible is something every Internet user strives to achieve. However, due to
1031
mp3s
As we are approaching the 21st century communications is becoming a vital key in business and home computing. As a result we are constantly inventing new wa
643
Software Licensing
In 1993 worldwide illegal copying of domestic and international software cost $12.5 billion to the software industry, with a loss of $2.2 billion in the Unit
3710
Government Intervention on the Internet
During the past decade, our society has become based solely on the ability to move large amounts of information across great distances
2858
Legislation passed to address computer crimes
Over the past month you could not pick up a newspaper without finding an article about the recent Denial of Service (DOS) attacks on E-commerce sites over the
1022
Operating Systems
The first thing I wanted to do for this project was to determine how the computer system I chose was going to be used. I wanted to purchase a pers
2626
Windows NT
Since it was first released in 1993, Microsoft Windows NT Server has established itself as the network
2204
Censoring the Internet
The internet offers a huge wealth of information both good and bad, unfortunately the vary nature of the internet makes policing th
2499
web advertising
Web Advertising Web advertising, not to mention the Internet itself, finds itself in a stage of relative infancy and therefore provides ma
5817
Reality Misunderstood
Day by day cyberspace is becoming a more intricate part of our society. As it does, we rely on it more to manage finances, research, a
1331
Polymorphic
The generation of today is growing up in a fast-growing, high-tech world which allows us to do the impossibilitie
1796
Bill Gates and Steve Jobs since 1980
In the early 80s the world so the initial boom of the computer era. The first personal computers were sold and the main players of the business were sorted ou
633
databases
Large databases can contain hundreds of interrelated files. Fortunately a database management system can shield
695
Government Control of the Internet
During the past decade, our society has become based solely on the ability to move large amounts of information across large distances quickly. Computerizatio
1822
education on the internet
In today's society, the internet has become a very important learning tool. It is used for day to day activities, such
438
Why Microsoft is not a monopoly
Is Microsoft actually a monopoly? No, they are not. They don’t force you to buy their products, they are not the only company out there,
504
System Details
Fiesta the Sun Also Rises by Hemingway The Sun Also Rises: Hemingway's depiction of the traditional hero The Hemingway Hero Prevalent among many of Ernest Hemi
2590
Computer Programmer
Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data proc
1836
history of computers
"Man, born free, is everywhere in chains." (Pg. 328) This was the basis for William Blake's poetry. Blake may have written dreams of sunny da
1046
Technology for Disabled
Technology for the disabled has made numerous advances over the recent years. The things they have been doing to help disabled people to be able to stay with
1087
government censorship on the internet
Government Censorship on the Internet Thesis: Government Censorship would damage the atmosphere of the freedom
986
history of computers1
Somewhere around 3000BC the first mechanical counting device created was the abacus. The abacus is still used today and, amazing
879
Censorship
The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer
3623
Internet history
volution is the cornerstone of modern biology. It unites all the fields of biology under one theoretical umbrella. It is not a difficult concept, but very few
1152
System Analyst
Systems analysts solve computer problems and enable computer technology to meet individual needs of an organization. They help an organization realize the ma
535
modems and connections
The issues discussed here often overlook the very basic things you need to get a modem connection - if you've never used a modem, or you are doing a new instal
1756
Bill Gates
In its 23-year lifetime, Microsoft has had three distinct phases. The first, from 1975 to 1989, was characterized by both bold thrusts into new businesses.
909
The Impact of Computers
Computer technology not only has solved problems but also has created some, including a certain amount of culture shock as individu
632
computer hackers
REACTION PAPER FOR CASE STUDY #2, Chapter 17 This Reaction Paper represents my comments about and answers to questions concerning Case Study #2 in Chapter
269
Internets impact on political participation
Internet's Effect On Political Participation 1) The internet has become a vital tool i
213
JAVA 2
December 1999 Sun Microsystems publicly released a series of eighty mini-programs known as Java 2 Enterprise Edition (J2EE) which are designed to enhance large
555
patented algorithms
Software consists of lists of instructions that a computer reads and executes. The tasks done by a computer are largely repetitive; the same
956
Building a computer
With increasing popularity of computer games, and multimedia home PC users often
2298
The Millenium Bug
The millennial sun will first rise over human civilization in the independent republic of Kirbati, a group of thirty low lying coral isla
883
computers in the classrooms or not
Computers in the Classrooms . . . or Not? Should computers be the sole teachers of students in the classroom? The argument is whether or not students shoul
1116
Iomega Zip Drives
Iomega offers a wide range of zip drives which include the USB Port drives, parallel Port drives, SCSI port drives, and Internal drives. There are advantage
514
Government Censorship
Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas on the Internet; therefore, government should not encourage censorsh
4398
Computer Enginnering
A Strong Background in Computer Technology Computer technology has advanced dramatically over the past ten years. Tech
1038
Windows Vs Linux Presentation
Evaluate Operating Systems (OS) that could be beneficial
356
ecommerce
A video case study titled “ Opportunities for investing online; Secrets to success” in Chapter # 3, page 144 of the textbook talks about the future of e-commer
703
Planning Information Systems
Planning for Management Information System Planning for Management Information System
1924
The problem of online casino
In our society today, computer technology plays an important role in many forms of entertainment, especially in the field of online casino. As technology adva
771
Independent Work No1
The one website that I am adamant about visiting regularly is the video game publication Next Generation's site, located at http:
560
hotline
The Hotline Connect software suite enables Server communities on personal computers worldwide that combined, comprise the Hotline
617
brave new world characters
Bernard Marx is the most important character in the first part of this book. He's a very small person (he looks like a gamma person) for being an alpha and he
267
Getting paid to hack
Many of the products we buy today are no more than large collections of zeroes and ones. High-priced software, high-quality music, and valuable reference m
3893
How Can Artificial Intelligence Help Us
Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances c
2947
structure
Structured Design is a method to convert an ``informal specification'' including a set of data flow diagrams and process specifications into a de
2048
IT failure and dependance
In Today’s Society we are so Dependent on I.T that the Consequences of its Failure May be Catastrophic. Discuss the Threats and Causes of Failure, and Steps Ta
898
the pc
539
Basic Computer construction
This report will tell you the 10 basic steps to constructing a high powered home computer in under 2 hours. Most people believe that you have to be a
477
computer fundermentals
The society in which we live is complex and sophisticated. As consumers we demand a variety of goods and services to enable us to maintain the quality o
3444
Computer Addiction
There once was a time when the only computers known to the average person were those the military possesse
645
cisco
- No pertinent information in this chapter to note.
184
None Provided1
In today's fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younge
1355
Hacking a Art
In today's fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younger th
1622
Dvorak keyboard
The Dvorak keyboard layout has been slow to catch on due to lack of scientifically conclusive evidence that it is superior to the QWERTY sequence. The major
317
Superhighway or Road to Nowhere
What impact, if any, is the use of computers and other digital technologies having on the learning process of today’s student? To what extent or de
2431
computers
Computers are found in practically every household today. Everywhere you look, people have access to a Personal Computer, someway or another. As computers ge
407
LeadersManagers effective on organizations
Leaders/Managers effective on organizations. I have so many ideas of what an effective leader should be that I often feel overwhelmed and cannot imagine ho
1128
interracial children
Proposal: Would there be a benefit for interracial children having a multiracial box on any application as means of identifying interracial children.
1777
How Will We Use Tomorrows PCs
Tomorrow's PCs are going to be different in many ways; they will be more powerful, they will include more facilities for mul
2772
Catcher in the Rye Thesis Paper
The Catcher in the Rye is a story about a young man named Holden Caulfield and the experiences that he faces after bei
495
computer underground
The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home comp
8260
pbx hybrid networks
PBX and Key systems are the wave of communication for business everywhere. The key difference between PBX and Key/Hybrid system
515
Networking
Written in 1940 and published in 1947, “The Pearl” is another of Steinbeck’s novels, which tells the great American dream. Th
972
Macromedia
Electronic End-User Software License Agreement THIS AGREEMENT IS A LEGAL DOCUMENT. READ IT CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS
1471
Y2K
Less than two years until the year 2000. Two seemingly small digits may turn January 1, 2000 from a worldwide celebration into a universal nightmare. With com
2233
Why Computers are Important in my Life
As each us of look at our lives, do we realize the importance of these electronic mechanisms we call computers? I shall now endeavor to elaborate upon how thes
500
To Hack or Not to Hack
Look at them, sitting there unscathed like small children. The poor unsuspecting file server and its accompanying network of computers are just inviting the l
503
The wave of the future
The wave of the future is drowning out very quickly. All the technology we have created will bit the dust before the systems really are used. At the end of t
1695
Computer Viruses1
In the past decade, computer and networking technology has seen enormous growth. This grow
4580
zzzzzzztest
TEST TEST peaceof one path at the expense of another; 8.Right meditation: to quiet the mind and present true pictures to the mind of any hindrances to the Midd
907
Networking1
Design and Installation of Internal Network for the Air Force Base Computer Training Center The Air Force Base Network Standardiza
2294
Internet2
For well over a decade, experts in office automation have predicted the demise of the typewriter. In their view the computer is today's choice because of
403
OSI Layers of a Network
During the past two decades there has been a tremendous increase in the numbers and sizes of networks. Many of the networks, however, were built using dif
776
Networking and Telecommunication Management
Networking and Telecommunication Management “The AT&T long-distance networks crashes and millions of calls go unanswered. A computer hacker reprog
1377
Using NetIQ s AppManager
J. Banks, J. Brown, E. Kimble, J. Sachsel Enterprise Network Management Solution
5347
Semiconductors The Silicon Chip
Silicon is the raw material most often used in integrated circuit (IC) fabrication. It is the second most abundant
1462
Internet3
Negotiation is a common word that always appears in our personal and professional lives. Business is also negotiating. From the day you s
2492
Computing professional
688
Lan Proposal
Barrett & Barrett Advertising NJ is the newly established satellite office of Barrett & Barrett Advertising CA. Due to their increasing number of East Coast c
1201
how to make a web page
Have you ever sat down at your computer and wondered how web pages are made? Web pages appear as though they would be hard to make, but they are actually quick
625
Storage Technologies
Innovations in Magnetic and Optical storage systems. Using Nanotechnology scientists ar Rice University have been able to sto
255
PCs are Better than Macs for Home Users
For years, Macs and PCs have been competing for home users. Apple has recently released the new iMac, and the notebook version of the iMac – the iBook. Even th
1989
PCs are Better than Macs for Home Users1
For years, Macs and PCs have been competing for home users. Apple has recently released the new iMac, and the notebook version of the iMac – the iBook. Even th
1989
DOS
DOS (Disk Operating System) was developed by the Microsoft Corporation, as the standard operating system for use with IBM personal computers. It controls the
466
Computer Viruses2
A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge
834
Dos
DOS (Disk Operating System) was developed by the Microsoft Corporation, as the standard operating system for use with IBM personal computers. It controls the
466
Computer Crimes
Computer crime started in the early 1970’s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a c
1179
oppertunities and challenges of the internet
Opportunities and Challenges of the Internet In a world of light-speed data transmission, any individual with little training and expertise can make a for
1397
Internet Security1
The Internet has become a greater medium of communication, data exchange, and entertainment over the past 5 years. With this widespre
1852
NT Server
How do you move a PDC or a BDC to a new domain? Change the Domain Name System Policy Editor will allow you to restrict logon times
10611
I love you virus
ILOVEYOU (VBS.LoveLetter.A) is a Melissa-like worm that spreads through email and infects certain files.
966
None Provided2
As we get closer to the twenty-first century, we find that soon a computer will be another common household appliance. As the television was introduced in the
1868
EVISION THE FUTURE
As the 21st century dawns ahead of us, the future holds what seems to be the best advancements of our civilization. Man has come a long way since the first com
554
Personality
Working with computers is a great pleasure for anyone who ever has really discovered how they work. Maintaining computers can broken into a ver
462
Unix File System
The Unix File System has the job of maintain all the data which is stored in the computer. The data which is maintained includes programs
584
Microsot Word 2000
-The creator of the popular Windows operating system
641
Instruction Set
It has become increasingly popular to build one's own computer. In many cases, it saves money, and guarantees that you get what you want. Building your own
1488
Types of Computer Viruses
A computer virus is a program that is designed to damage your computer, programs, and files. Like a virus in a living thing, a computer virus can spread if
1440
System Analysts
Ok, I know you are wondering what is a systems analysts and what do they do. Well in this paper not only am I going to tell what they do but I will also tell
716
Computer Crime
New times bring new crimes. It's a story as old as humanity and as new as the Internet. First comes cars, then car thieves follow. Telephones are followed by t
2684
A Brief History Of The Internet
By default, any definitive history of the Internet must be short, since the Internet (in one form or another) has only been in existence for less than
1028
Comparing operating systems
Comparing Microsoft Operating Systems : 95/98/NT This report is centered on the similarities and differences of the three major
321
Computer Viruses3
Almost every End-user in the world has heard of computer viruses and/or has had one at one point in time. Don’t worry if you haven’t heard about them, you wo
1261
Voyager System
This report contents information about the Voyager System used by the Access Services Department of Harvey A. Andruss Library. The computerized syst
3211
java
Java is the substance whose aroma is awakening the Internet community. It is a new programming language developed by Sun Microsystems that has
1046
EMail Etiquette
This document is intended to offer guidance to users of electronic mail (e-mail) systems, whether it's a twelve-year old comp
3908
None Provided3
______________________________________________________________________ Untold Windows Tips and Secrets By Ankit Fadia ankit@bol.net.in
5507
ATT Breakup
Our book talks about managing strategy and strategic planning. I chose to write my paper on AT&T’s recent breakup into four satellite compa
803
Dna Computing The Future or the End
The future of computers is in the hands of the next century. The evolution of the Computer Age has become a
1731
History of Computers
The earliest existence of a modern day computer's ancestor was the abacus. These date back to almost 2000 years ago. It is simply a wooden rack holding paralle
1346
Artificial Intelligence
Current neural network technology is the most progressive of the artificial intelligence systems today. Applications of neural networks have made
2712
Hiding behind a Computer
Are computers and the Internet redefining human identity as people explore the boundaries of their personalities, adopt multiple selves, and form onlin
1383
internet and travel
In the past ten to twenty years the internet has opened up a world one could have never have imagined. It has made the inconvenience of everyday life convenie
1188
Systems Development Lifecycle
XYZ Ceramic Supply is a growing company in the arts and craft supply industry,
1178
Computer Ethics
Computer crime has increased in resent years. The book gives several examples of past computer crimes. Before reading chapter 2 I thought that computer crim
1276
computer
When thought of acid rain, some people may think of green, burning acid falling from the sky, destroying everything in sight. This may be a bit ridi
559
HACKERS
In the article that I read was about Hackers. It talked about the aspects of how the youths of today commit this crime. Hacking overall requires the utmost i
418
Disk Defragmentation
Fast, reliable disk performance is mandatory in today’s complex information technology world, because system response and virtual memory performance depend
990
MP3
Two years ago, MP3 was just another audio compression format. Today, it's a Net phenomenon that's at the center of an enormous controversy.
1235
Micro Chips
The impression that I have gotten from the latest magazines and websites about microchips is that the chip is definitely the mile stone in computer hardware
1160
ObjectOriented Programming vs Procedural Programming
It was way back in the 1970’s when Kernighan and Ritchie were working on creating a new programming language they would soon call C. It was called this becaus
814
Artificial IntelligenceCognitive Ability of Information Proc
Artificial Intelligence: Cognitive Ability or Information Processing Computers have become an integral part of our everyday lives. We rely upon these
1955
Pircay is still a crim
Software Piracy is the most common computer crime, it is the illegal
498
comparing computers
At home I have Microsoft Office, not the 2000 version but I can tell you th
272
Resistance to Technology
Technology. What would we do without it? Probably have a lot less fun and have a lot shorter life span. Think about it, you
1041
What do you know about computers
Prior to attending this class I thought I knew a lot about computers. What I’ve learned is that all I really knew was "buzz" words: megahertz, gigabyte, ram,
2525
Career As a Webmaster
1904
java project
public class scroll extends java.applet.Applet implements Runnable {
161
MICROSOFTS LEGAL ISSUES
Recently, Microsoft started having legal problems. It was one legal battle after another. It was taking too much time away from what Microsoft does best. Pe
495
Microsofts Legal Troubles
Recently, Microsoft started having legal problems. It was one legal battle after another. It was taking too much time away from what Microsoft does best. P
496
Smart Houses
The world of computer technology is continuously advancing each and every day. We look back at what we had 5 years ago and are amazed to see how far we ha
993
Advancements in Peripherals
A Peripheral device is any external device attached to a computer. Without Peripherals a computer is just a box full of w
346
Advancements in Peripherals1
Recent Developments in Computer Peripherals Including an in-depth look at Multimedia Input Devices
3564
Charles Babbage
Charles Babbage is often called the "father of computing" because of his invention of the Analytical Engine. However, many people do not know the details of t
832
computer crime
It's the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you
1513
What is the internet
Sometime in the mid 1960's, during the Cold War, it became apparent that there was a need for a bombproof communications
735
Smart Houses1
The world of computer technology is continuously advancing each and every day. We look back at what we had 5 years ago and are amazed to see how far we ha
993
Ergonomics
Ergonomics is the science of fitting the job to the worker. When there is a mismatch between the physical requirements of the job and th
1234
SUB SEVEN VIRUS
Imagine this, you’re at home playing on the computer when suddenly your cd drive opens. You brush it off as it were nothing unusual but then a few minutes go
1072
final exam
1. To format a high-density diskette to use on my PC, I would first click on “My Computer”,
724
IT related terms
A high-level programming language developed by Dennis Ritchie at Bell Labs in the mid 1970s. Although originally designed as a syst
3844
ecommerce1
An e-commerce solution for a business is the incorporation of all aspects of the business operation into an electronic format. Many well-es
208
ecommerce2
An e-commerce solution for a business is the incorporation of all aspects of the business operation into an electronic format. Many well-es
2838
ecommerce3
An e-commerce solution for a business is the incorporation of all aspects of the business operation into an electronic format. Many well-es
2838
Computer hacking
As the world becomes more and more reliant on computers the computer hacking industry is greatly rising. With people such as Kevin Mitnick, who is known as
1514
computer purchase
PROF. MARTINEZ COMPUTER PURCHASE Recently, I decided to purchase a new computer. Buying a computer can be a complic
2047
computer programer
Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data proc
1836
Multimedia1
1.1 ALGUNAS CONCEPCIONES DE MULTIMEDIA Es una nueva plataforma donde se integran componentes
4425
ECommerce
THE IMPORTANCE OF IMPLEMENTING AN E-COMMERCE SOLUTION FOR AN EXISTING BUSINESS:
2891
Networking2
There are many kinds of networks, however this paper will be about networking computers. As we move further and further into the paperless society, the need fo
861
Graphics
Graphics is a word used for all the different types of artwork, such as photographs, graphs, charts etc.
707
Buying A Computer
Buying a Computer today is much more complicated then it was ten years ago. The choices we have are abundant, and the information we must gather to make those
1772
Are You Certified
The impact of technology in our lives has grown exponentially over recent years. The demand for better, faster, more productive software and hardware equipmen
1022
Computer Hacking Thesis
Introduction: Hacking is very well-know way of "crashing" a computer system. Listed below is some information on the problems caused by hacking and some solu
281
Pornography in the Media
It started by way of messengers and scribes, evolved through the presentation of newspapers and radio, brought us together with
1194
tcpip
TCP/IP already supports over 4.8 million hosts with up to 45-MBPS transit facilities and a wide variety of access links. Its architecture is
129
ADSL
ADSL has been of interest to me for the past couple of years because it enables high-speed data on a single pair of local copper loop. It is phenomenal how it
300
Electronic Commerce
Introduction…………………………………………………………………2 History of E-commerce……………………………………………………..4 Economic Impact……………………………………………………………5
2779
Computer Systems Analyst
A Computer Systems Analyst decides how data are collected, prepared for computers, processed, stored, and made available for users. (“Computer
1089
UNIX
“UNIX was the first operating system designed to run on ‘dissimilar’ computers by converting most hardware specific commands in machine language into an inde
1561
Internet Access in the World
Albrecht, Kirk. "Cybersurfers of Arabia." Business Week (1996): 108. Bogert, Carroll. "Chat rooms and chadors." Newswe
332
Colonists and Americans
From the end of the French and Indian War, there was a sense of unity brewing among the colonies. The colonies had to unite in order
695
Ergonomics1
Ergonomics is the science of fitting the job to the worker. When there is a mismatch between the physical requirements of the job and th
2476
intro to ecommerce
In the broadest sense, electronic commerce (e-commerce), is the buying and selling of products and services over the Internet. It h
4239
The First Chapter of computer Languages
The Tortuous Path of Early Programming. In the perpetual darkness more than two miles below the surface of the North Atlantic, a submersible sled slowly
3643
Case about Yahoo
1. Success as a Web Search Engine a. Why was Yahoo! such an early success on the Web? Yahoo was an early success due to a combination of factors such
1560
Clientserver
Client/server is the combination of three major technologies: Relational database management systems (RDBMSs), networks, and client interfaces. Clients execut
460
this is retarded
James Fenimore Cooper: Frontier Legend
216
Programming Languaguages
A programming language is a set of English-like instructions that includes a set of rules for putting the instructions together to
1162
Influences of Personal Computers Today
Since the beginning of the Industrial Revolution, people wanted and needed an easier way of calculating and measuring. Through the dreams of C
2216
The Internet
The Internet is, literally, a network of networks. It is made of thousands of interconnected networks spanning the globe. The computers that form the Internet
1981
UNIX1
“UNIX was the first operating system designed to run on ‘dissimilar’ computers by converting most hardware specific commands in machine language into an indep
1560
I want my MP3
Music is something that can be listened to almost anywhere due to modern technology. When it comes to listening to music while sitting at a co
628
Ergonomics2
Ergonomics is the science of fitting the job to the worker. When there is a mismatch between the physical requirements of the job and th
2476
Windows Evolution
It wouldn’t be fair to talk about the Windows Operating System without first looking at the origins of the company that develo
1381
Microsoft Vs Justice Department
In late October 1997, the Justice Department was again interrogating Microsoft. They have been at this since 1993, when they took over from the frustrated Fed
783
internet security
Internet Security Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems the
1806
Y2K1
What is Y2K and What Effect Did It Present On Modern Culture? Two seemingly small digits may turn January 1, 2000 from a worldwide celebration into a unive
3001
computer virus
Melissa, Bubbleboy, WM Concept, Stoned, Michelangelo, …, the list goes on and on. You might ask what do all these names have in common. The
1567
Brave new world vs Matrix
Since the begging of humanity, mankind tries to predict the soon to be future. Many scientific books and movies thrilled readers and viewers with visions of th
1202
Computer Crime1
Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without
2719
Network Degn
1.2. Strategic Recommendation 3 1.3. Implementation Consideration
6422
Computer Graphics
2824
Cyber Terrorism
The face of global terrorism as we knew it to be 50 odd years ago is changing rapidly with the advancement of technology in today’s society. Be it a kid trying
1143
Computers2
This paper is about the computer. Today computers are used by hundreds of millions of people. There have been many advances in the computer. The com
508
A Certification Requirements
THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL
298
TCPIP Security
The TCP/IP protocols, the basis for today's Internet, lack even the most basic mechanisms for security, such as authentication or encrypti
11199
a certification
THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL
298
Yahoo Vs Lycos
When searching on the Internet, one may find it difficult sometimes to know where to start. With the seemingly limitless amount of informa
665
Artificial Intelligence1
Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advance
2826


Please choose the letter your topic begins with...
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ALL




 

HOME
Custom Term Papers
Free Term Papers
Free Essays
Free Book Reports
Free Cliff Notes
Plagiarism?
Citing Sources
 
 
  50,000 Professionally Written
Papers @ Lots Of Essays.com

Search 101,000 Papers
@ Example Essays.com


 
 
  Free College Essays
College Term Papers
 
 
  Term Paper Sites
College Links
 
 
  Dorm Check list

 
 
 What would you like to see at ChuckIII's College Resources? Contact Us  
 
 
Free Essays
Free Essays Home
 



Copyright © 1998-2014 ChuckIII's College Resources Inc., All Rights Reserved DMCA Notifications and Requests