Title
|
Word Count
|
Internet Rating Systems Censors by Default " Internet Rating Systems: Censors by Default"
The Internet, first designed for the military and the scientific community, has grown larger and fast
|
2470
|
Alan Turing Alan Turing was born in London on 23 June 1912. He was the son of Julius
Mathius Turing and Ethel Sara Stoney, the youngest of three children, he was
|
420
|
computer and kids
|
280
|
computer simulation Computer Simulation WARSIM 2000 is simulation software, used by the armed forces. Extensive, thorough, and tiring work has
|
2280
|
computersinternet privacy INTERNET REGULATION: POLICING CYBERSPACE
The Internet is a method of communication and a source
|
1394
|
Computing Power Unleashed This article mainly deals with the microprocessor chip, which is the computer's brain. This
computer chip is responsible for the majority of the computers
|
483
|
Contrast DOS to Unix Compare and Contrast Microsoft DOS with UNIX
|
3715
|
Cyber Porn Imagine a place where you have access to anything and everything one could want. Some would say that is only existent in a utopia, and some would say tha
|
3176
|
DESIGNING A NETWORK The college of Business (COB) server is now being used to support deliver to the
Computer Information System (CIS) de
|
3025
|
embracing the future with technology Has technology opened a Pandora's box of social alienation, or alternatively, is it bringing humans into a new era of prosperity and well being?
|
934
|
GPS The new Avionics Modernization Program (AMP) systems installed in the F-111E and EF-111A
have raised their share of questions, so I have decided to continue
|
3360
|
Hacker Computer Hacker The meaning of Hacker is one who accesses a computer which is
supposably not able to be accessed to non authorised people of the community.
|
1044
|
History of Computer Industry History of the Computer Industry in America
Only once in a lifetime will a new invention come about to touch every a
|
2691
|
How To Computerize Your Accounts THESIS: I will explain the steps that need to be taken to computerize business accounts. The steps are planning and informed selec
|
1651
|
Internet Chances are, anyone who is reading this paper has at one time, at least, surfed the net once. Don't worry if you haven't, I willexplain every
|
1478
|
Internet Rating Systems Censors by Default " Internet Rating Systems: Censors by Default"
The Internet, first designed for the military and the scientific community, has grown larger and faste
|
2470
|
internet tv ZENITH TO LAUNCH INTERNET TV PRODUCTS
BASED ON NC TECHNOLOGY FROM ORACLE
LAS VEGAS, Jan. 8, 1997 -- Zenith Electronics Corporation (NYSE:ZE) ha
|
556
|
Knowledge Manegment Systems
|
2195
|
Networking Principles One problem that I see with people today is that they are unaware what a computer network is. They might have heard of a comp
|
2672
|
No silver bullet The objectives of this essay are to examine whether or not Brook’s original scepticism that “no single new development in the next ten years w
|
1735
|
OLD AND NEW What do we usually think of when we hear the word computer? Well most of us seem to fret or run away when we hear that word bu
|
1699
|
Pentium III disturbs Privacy The recent release of the Intel Pentium III has consumers as well as businesses concerned about the privacy of
the computer world. The controversial iss
|
501
|
plus --------------------------------------------------------------------------------
Sather is an object oriented language designed to be simple
|
4092
|
robots Robot Design Engineers plan ,design and coordinate the integration of machinery and equipment such as robots, rob
|
272
|
Software and copyright Current copright and patent laws are inapropriate for computer software; their
down software development and reduces competition.
|
2844
|
The Cyber War The Internet is a wondrous place. Practically anything you could ever want is available on the Net. It’s like a big city, it has distinguished areas,
|
1318
|
microprocessors
|
4325
|
Y2K Why is the Y2K problem being overlooked? The Year 2000 is rapidly approaching! Will we be ready in time?
|
1375
|
Computerization of a Company The word ubiquitous means ever present or occurring everywhere. This term could be used to describe the use of the computer in the business. The business w
|
1197
|
Computer Calamities There's nothing worst than when a machine that you depend on so much, just decides it doesn't want to work anymore. If you run a busi
|
996
|
The Rise of the Y2K Bug "The Y2K problem is the electronic equivalent of the El Niño and there will be nasty surprises around the globe."--John Hamre, Dep. Secretary of Defense
|
743
|
computing now ________________________________________________
|
359
|
Comparing and Contrasting the Internet to Print Comparing and Contrasting the Internet to Print
The differences between the Internet and Print Journalism are clear immediately upon glancing at either of
|
730
|
Asynchronous Transfer Mode
|
1112
|
Windows NT 40 Workstation year 2000 compliance Background: To determine whether or not WinNT 4.0 is within year 2000 compliance. From the outlined testing procedures found in the 'YEAR 2000 Testing me
|
1117
|
Small Company Y2K Report 3. Hardware and Software Compliance
|
1311
|
Apple vs The World In past years, Apple was on a downward spiral, but now the Mac is back on the right track. The interim CEO Steve Jobs has brought them fr
|
873
|
Internet1 To start off this project we clicked on the Explorer Icon on the desktop. Once we were online, we typed the following URL’s according to the part of th
|
440
|
Encryption PGP stands for "Pretty Good Privacy." It is an encryption program. What encryption does is hide information from people who do not know the "secret word" to re
|
2692
|
how cpu affect the lives of peole In this paper I wiil attempt to show you that computers have affected people in so many ways over the pass twenty -to twentyfive years. all by just playing a i
|
154
|
Apples G4 Marketing Snafu In fulfillment of the periodical paper assignment, I have chosen a recent story concerning Apple Computer Inc. as the topic for the first paper.
|
542
|
Year 2000 Computer Problem Y2K Bug Less than two years until the year 2000. Two seemingly small
digits may turn January 1, 2000 from a worldwide celebration into a
|
2234
|
Turbo C for dummies **************************************
WELCOME TO TURBO C++ FOR WINDOWS 4.5
*******************************
|
4142
|
Hackers Not Slackers Since the introduction of personal computers in the 1970's, the art of computer hacking has grown along with changing roles of comp
|
740
|
how to design a network The college of Business (COB) server is now being used to support deliver to the
Computer Information System (CIS) dep
|
2951
|
Website Analysis The Rhode Island Department of the Attorney General' s Website is very easily accessed through any Internet provider. The domain address for this site is Http
|
955
|
The Y2K Bug The year 2000 problem could have been completely prevented had some
early people envisioned the degree to which the microprocessor would
|
4190
|
Effects of web on business The Internet will greatly alter the structure and operation of all industries. For the management of any existing business the
|
1103
|
CMIP vs SNMP Network Management Imagine yourself as a network administrator, responsi
|
2236
|
Network Hardware Ever since the days of the Pony Express, people have looked to getting information, whether personal or business, to its intended receiver as soon as possible
|
1135
|
Telephone TV Cable Television In today's world the bounds of information technology are being pushed further and further every day. With Local Area Networks spanning into WorldWide Area
|
2101
|
Multimedia What is graphics and multimedia? First of all, graphics software pertains to any computer device or program that makes a computer capa
|
380
|
Emily DickinsonWhy she is an american poet Emily Dickinson, a creative poet during the mid-nineteenth century, wrote what many
consider to be truly American poetry. To understand why Dickinson is cons
|
2011
|
simuulation games Simulation Games- To take the appearance or form of; to pretend; to make a model of
|
520
|
Example Web Site Proposal I propose to develop a web site for anyone in the sunglass, contact lens, colored co
|
339
|
Internet Censorship Mr. Speaker, distinguished members of the house,
The opposition concedes that proctecting children and to enable adults to avoid material which offends the
|
1108
|
the year 2000 bug Do you have a home computer or a small business with a computer? You have undoubtedly read or heard information about the upcoming new century and are wonder
|
1877
|
Hackers Good or Evil Imagine this, you are driving along the road and suddenly you see something spectacular. Now imagine that you are not allowed to deviate from your course to
|
1174
|
None Provided There is a company down in Silicon Valley that seems to think it needs to produce more and more CPUs to push to the public to buy them when they are not neede
|
502
|
CFortran and others Despite having very little knowledge of the wor
|
3804
|
A System Analyst A Systems Analyst analyses, designs and implements the information gathered previously to a system, the final product which is a report of
|
423
|
Internet Regulation INTERNET REGULATION: POLICING CYBERSPACE
The Internet is a method of communication and a source of information that is
|
1103
|
Complete Computer System The new Power Mac G4 is up to twice as fast as the fastest Pentium III-based PCs. With its Pentium-cr
|
961
|
Mr Introduction When the Internet and World Wide Web were first created, they were designed a research tools and for the distribution of information t
|
2550
|
hacking Recently, the word ``hacker'' has fallen into disrepute, coming to signify in the popular media the perpetrators of various forms of computer-aided crime. But
|
508
|
Hackers Since the introduction of personal computers in the 1970's, the art of computer hacking has grown along with changing roles
|
2808
|
Data Encryption The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send informat
|
725
|
Internet Security Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems
|
1889
|
Interactive class How to Go From Class-Room to Web-Room as Painlessly as Possible
By Rik Hall, University of New Brunswick, Fredericton, New Brunswick
|
3099
|
Hackers1 The meaning of a hacker is one who accesses a computer that can supposably not be accessed to non authorized people of the community. Hackers may use any type
|
1039
|
Computer Viruses Introduction
In the past decad
|
1778
|
Computers Could one imagine what the world would be like today without computers? For one, I would not be typing this paper right now. Comput
|
1215
|
Benefits of the internet for your business Access to the Internet is rapidly becoming a necessity in today’s business environment. Internet access at my business enables workers to perform a wide varie
|
543
|
Domain Name Server Network software generally needs a 32-bit Internet address in order to open a connection or send a datagram. However users prefer to deal
|
759
|
Line Noise Achieving a reliable Internet connection as close to 56K as possible is something every Internet user strives to achieve. However, due to
|
1031
|
mp3s As we are approaching the 21st century communications is becoming a vital key in business and home computing. As a result we are constantly inventing new wa
|
643
|
Software Licensing In 1993 worldwide illegal copying of domestic and international software cost $12.5
billion to the software industry, with a loss of $2.2 billion in the Unit
|
3710
|
Government Intervention on the Internet During the past decade, our society has become based solely on the ability to move large amounts of information across great distances
|
2858
|
Legislation passed to address computer crimes Over the past month you could not pick up a newspaper without finding an article about the recent Denial of Service (DOS) attacks on E-commerce sites over the
|
1022
|
Operating Systems The first thing I wanted to do for this project was to determine how the computer system I chose was going to be used. I wanted to purchase a pers
|
2626
|
Windows NT Since it was first released in 1993, Microsoft Windows NT Server has established itself as the network
|
2204
|
Censoring the Internet The internet offers a huge wealth of information both good and bad, unfortunately the vary nature of the internet makes policing th
|
2499
|
web advertising Web Advertising Web advertising, not to mention the Internet itself, finds itself in a stage of relative infancy and therefore provides ma
|
5817
|
Reality Misunderstood Day by day cyberspace is becoming a more intricate part of our society. As it does, we rely on it more to manage finances, research, a
|
1331
|
Polymorphic The generation of today is growing up in a fast-growing, high-tech world which allows us to do the impossibilitie
|
1796
|
Bill Gates and Steve Jobs since 1980 In the early 80s the world so the initial boom of the computer era. The first personal computers were sold and the main players of the business were sorted ou
|
633
|
databases Large databases can contain hundreds of interrelated files. Fortunately a database management system can shield
|
695
|
Government Control of the Internet During the past decade, our society has become based solely on the ability to move large amounts of information across large distances quickly. Computerizatio
|
1822
|
education on the internet In today's society, the internet has become a very important learning tool. It is used for day to day activities, such
|
438
|
Why Microsoft is not a monopoly Is Microsoft actually a monopoly? No, they are not. They don’t force you to buy
their products, they are not the only company out there,
|
504
|
System Details Fiesta the Sun Also Rises by Hemingway The Sun Also Rises: Hemingway's depiction of the traditional hero The Hemingway Hero Prevalent among many of Ernest Hemi
|
2590
|
Computer Programmer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data proc
|
1836
|
history of computers "Man, born free, is everywhere in chains." (Pg. 328) This was the basis for William Blake's poetry. Blake may have written dreams of sunny da
|
1046
|
Technology for Disabled Technology for the disabled has made numerous advances over the recent years. The things they have been doing to help disabled people to be able to stay with
|
1087
|
government censorship on the internet Government Censorship on the Internet
Thesis: Government Censorship would damage the atmosphere of the freedom
|
986
|
history of computers1 Somewhere around 3000BC the first mechanical counting device created was the abacus. The abacus is still used today and, amazing
|
879
|
Censorship The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer
|
3623
|
Internet history volution is the cornerstone of modern biology. It unites all the fields of biology under one theoretical umbrella. It is not a difficult concept, but very few
|
1152
|
System Analyst Systems analysts solve computer problems and enable computer technology to meet individual needs of an organization. They help an organization realize the ma
|
535
|
modems and connections The issues discussed here often overlook the very basic things you need to get a modem connection - if you've never used a modem, or you are doing a new instal
|
1756
|
Bill Gates In its 23-year lifetime, Microsoft has had three distinct phases. The first, from 1975 to 1989, was characterized by both bold thrusts into new businesses.
|
909
|
The Impact of Computers Computer technology not only has solved problems but also has created some, including a certain amount of culture shock as individu
|
632
|
computer hackers REACTION PAPER FOR CASE STUDY #2, Chapter 17
This Reaction Paper represents my comments about and answers to questions concerning Case Study #2 in Chapter
|
269
|
Internets impact on political participation Internet's Effect On Political Participation
1) The internet has become a vital tool i
|
213
|
JAVA 2 December 1999 Sun Microsystems publicly released a series of eighty mini-programs known as Java 2 Enterprise Edition (J2EE) which are designed to enhance large
|
555
|
patented algorithms Software consists of lists of instructions that a computer reads and
executes. The tasks done by a computer are largely repetitive; the same
|
956
|
Building a computer
With increasing popularity of computer games, and multimedia home PC users often
|
2298
|
The Millenium Bug The millennial sun will first rise over human civilization in the independent republic of Kirbati, a group of thirty low lying coral isla
|
883
|
computers in the classrooms or not Computers in the Classrooms . . . or Not?
Should computers be the sole teachers of students in the classroom? The argument is whether or not students shoul
|
1116
|
Iomega Zip Drives Iomega offers a wide range of zip drives which include the USB Port drives, parallel Port drives, SCSI port drives, and Internal drives. There are advantage
|
514
|
Government Censorship Thesis: Government Censorship would damage the atmosphere of the freedom to express ideas on
the Internet; therefore, government should not encourage censorsh
|
4398
|
Computer Enginnering A Strong Background in Computer Technology
Computer technology has advanced dramatically over the past ten years. Tech
|
1038
|
Windows Vs Linux Presentation Evaluate Operating Systems (OS) that could be beneficial
|
356
|
ecommerce A video case study titled “ Opportunities for investing online; Secrets to success” in Chapter # 3, page 144 of the textbook talks about the future of e-commer
|
703
|
Planning Information Systems Planning for Management Information System
Planning for Management Information System
|
1924
|
The problem of online casino In our society today, computer technology plays an important role in many forms of entertainment, especially in the field of online casino. As technology adva
|
771
|
Independent Work No1 The one website that I am adamant about visiting regularly is the video game publication Next Generation's site, located at http:
|
560
|
hotline The Hotline Connect software suite enables Server communities on
personal computers worldwide that combined, comprise the Hotline
|
617
|
brave new world characters Bernard Marx is the most important character in the first part of this book. He's a very small person (he looks like a gamma person) for being an alpha and he
|
267
|
Getting paid to hack Many of the products we buy today are no more than large collections of zeroes and ones. High-priced software, high-quality music, and valuable reference m
|
3893
|
How Can Artificial Intelligence Help Us Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances c
|
2947
|
structure Structured Design is a method to convert an ``informal specification'' including a set of data flow diagrams and process specifications into a de
|
2048
|
IT failure and dependance In Today’s Society we are so Dependent on I.T that the Consequences of its Failure May be Catastrophic. Discuss the Threats and Causes of Failure, and Steps Ta
|
898
|
the pc
|
539
|
Basic Computer construction This report will tell you the 10 basic steps to constructing a high powered home computer in under 2 hours.
Most people believe that you have to be a
|
477
|
computer fundermentals The society in which we live is complex and sophisticated. As consumers we demand a variety of goods and services to enable us to maintain the quality o
|
3444
|
Computer Addiction There once was a time when the only computers known to the average person were those the military possesse
|
645
|
cisco - No pertinent information in this chapter to note.
|
184
|
None Provided1 In today's fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younge
|
1355
|
Hacking a Art In today's fast-paced world, the high-tech computer industry offers a unique opportunity for high-paying jobs. Many people start their careers much younger th
|
1622
|
Dvorak keyboard The Dvorak keyboard layout has been slow to catch on due to lack of scientifically conclusive evidence that it is superior to the QWERTY sequence. The major
|
317
|
Superhighway or Road to Nowhere What impact, if any, is the use of computers and other digital technologies having on the
learning process of today’s student? To what extent or de
|
2431
|
computers Computers are found in practically every household today. Everywhere you look, people have access to a Personal Computer, someway or another. As computers ge
|
407
|
LeadersManagers effective on organizations Leaders/Managers effective on organizations.
I have so many ideas of what an effective leader should be that I often feel overwhelmed and cannot imagine ho
|
1128
|
interracial children Proposal: Would there be a benefit for interracial children having a multiracial box on any application as means of identifying interracial children.
|
1777
|
How Will We Use Tomorrows PCs Tomorrow's PCs are going to be different in many ways; they will be more powerful, they will include more facilities for mul
|
2772
|
Catcher in the Rye Thesis Paper The Catcher in the Rye is a story about a young man named Holden Caulfield and the experiences that he faces after bei
|
495
|
computer underground The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home comp
|
8260
|
pbx hybrid networks PBX and Key systems are the wave of communication for business everywhere. The key difference between PBX and Key/Hybrid system
|
515
|
Networking Written in 1940 and published in 1947, “The Pearl” is another of Steinbeck’s novels, which tells the great American dream. Th
|
972
|
Macromedia Electronic End-User Software License Agreement
THIS AGREEMENT IS A LEGAL DOCUMENT. READ IT CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS
|
1471
|
Y2K Less than two years until the year 2000. Two seemingly small digits may turn January 1, 2000 from a worldwide celebration into a universal nightmare. With com
|
2233
|
Why Computers are Important in my Life As each us of look at our lives, do we realize the importance of these electronic mechanisms we call computers? I shall now endeavor to elaborate upon how thes
|
500
|
To Hack or Not to Hack Look at them, sitting there unscathed like small children. The poor unsuspecting file server and its accompanying network of computers are just inviting the l
|
503
|
The wave of the future The wave of the future is drowning out very quickly. All the technology we have created will bit the dust before the systems really are used. At the end of t
|
1695
|
Computer Viruses1 In the past decade, computer and networking technology has seen enormous growth. This grow
|
4580
|
zzzzzzztest TEST TEST peaceof one path at the expense of another; 8.Right meditation: to quiet the mind and present true pictures to the mind of any hindrances to the Midd
|
907
|
Networking1 Design and Installation of Internal Network for the
Air Force Base Computer Training Center
The Air Force Base Network Standardiza
|
2294
|
Internet2 For well over a decade, experts in office automation have predicted the demise of the
typewriter. In their view the computer is today's choice because of
|
403
|
OSI Layers of a Network During the past two decades there has been a tremendous increase in the numbers and sizes of
networks. Many of the networks, however, were built using dif
|
776
|
Networking and Telecommunication Management Networking and Telecommunication Management
“The AT&T long-distance networks crashes and millions of calls go unanswered. A computer hacker reprog
|
1377
|
Using NetIQ s AppManager J. Banks, J. Brown, E. Kimble, J. Sachsel
Enterprise Network Management Solution
|
5347
|
Semiconductors The Silicon Chip Silicon is the raw material most often used in integrated circuit (IC)
fabrication. It is the second most abundant
|
1462
|
Internet3 Negotiation is a common word that always appears in our personal and professional lives. Business is also negotiating. From the day you s
|
2492
|
Computing professional
|
688
|
Lan Proposal Barrett & Barrett Advertising NJ is the newly established satellite office of Barrett & Barrett Advertising CA. Due to their increasing number of East Coast c
|
1201
|
how to make a web page Have you ever sat down at your computer and wondered how web pages are made? Web pages appear as though they would be hard to make, but they are actually quick
|
625
|
Storage Technologies Innovations in Magnetic and Optical storage systems.
Using Nanotechnology scientists ar Rice University have been able to sto
|
255
|
PCs are Better than Macs for Home Users For years, Macs and PCs have been competing for home users. Apple has recently released the new iMac, and the notebook version of the iMac – the iBook. Even th
|
1989
|
PCs are Better than Macs for Home Users1 For years, Macs and PCs have been competing for home users. Apple has recently released the new iMac, and the notebook version of the iMac – the iBook. Even th
|
1989
|
DOS DOS (Disk Operating System) was developed by the Microsoft Corporation, as the standard operating system for use with IBM personal computers. It controls the
|
466
|
Computer Viruses2 A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge
|
834
|
Dos DOS (Disk Operating System) was developed by the Microsoft Corporation, as the standard operating system for use with IBM personal computers. It controls the
|
466
|
Computer Crimes Computer crime started in the early 1970’s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a c
|
1179
|
oppertunities and challenges of the internet Opportunities and Challenges of the Internet
In a world of light-speed data transmission, any individual with little training and expertise can make a for
|
1397
|
Internet Security1 The Internet has become a greater medium of communication, data exchange, and entertainment over the past 5 years. With this widespre
|
1852
|
NT Server How do you move a PDC or a BDC to a new domain? Change the Domain Name
System Policy Editor will allow you to restrict logon times
|
10611
|
I love you virus ILOVEYOU (VBS.LoveLetter.A) is a Melissa-like worm that spreads through email and infects certain files.
|
966
|
None Provided2 As we get closer to the twenty-first century, we find that soon a computer will be another common household appliance. As the television was introduced in the
|
1868
|
EVISION THE FUTURE As the 21st century dawns ahead of us, the future holds what seems to be the best advancements of our civilization. Man has come a long way since the first com
|
554
|
Personality Working with computers is a great pleasure for anyone who ever has really discovered how they work. Maintaining computers can broken into a ver
|
462
|
Unix File System The Unix File System has the job of maintain all the data which is stored in the
computer. The data which is maintained includes programs
|
584
|
Microsot Word 2000 -The creator of the popular Windows operating system
|
641
|
Instruction Set It has become increasingly popular to build one's own computer. In many cases, it saves money, and guarantees that you get what you want. Building your own
|
1488
|
Types of Computer Viruses A computer virus is a program that is designed to damage your computer, programs, and files. Like a virus in a living thing, a computer virus can spread if
|
1440
|
System Analysts Ok, I know you are wondering what is a systems analysts and what do they do. Well in this paper not only am I going to tell what they do but I will also tell
|
716
|
Computer Crime New times bring new crimes. It's a story as old as humanity and as new as the Internet. First comes cars, then car thieves follow. Telephones are followed by t
|
2684
|
A Brief History Of The Internet By default, any definitive history of the Internet must be short, since the Internet (in one form or another) has only been in existence for less than
|
1028
|
Comparing operating systems Comparing Microsoft Operating Systems : 95/98/NT
This report is centered on the similarities and differences of the three major
|
321
|
Computer Viruses3 Almost every End-user in the world has heard of computer viruses and/or has had one at one point in time. Don’t worry if you haven’t heard about them, you wo
|
1261
|
Voyager System This report contents information about the Voyager System used by the Access Services Department of Harvey A. Andruss Library. The computerized syst
|
3211
|
java Java is the substance whose aroma is awakening the Internet community.
It is a new programming language developed by Sun Microsystems that has
|
1046
|
EMail Etiquette This document is intended to offer guidance to users of electronic mail (e-mail) systems, whether it's a twelve-year old comp
|
3908
|
None Provided3 ______________________________________________________________________
Untold Windows Tips and Secrets By Ankit Fadia ankit@bol.net.in
|
5507
|
ATT Breakup Our book talks about managing strategy and strategic planning. I chose to write my paper on AT&T’s recent breakup into four satellite compa
|
803
|
Dna Computing The Future or the End The future of computers is in the hands of the next
century. The evolution of the Computer Age has become a
|
1731
|
History of Computers The earliest existence of a modern day computer's ancestor was the abacus. These date back to almost 2000 years ago. It is simply a wooden rack holding paralle
|
1346
|
Artificial Intelligence Current neural network technology is the most progressive of the artificial intelligence
systems today. Applications of neural networks have made
|
2712
|
Hiding behind a Computer Are computers and the Internet redefining human identity as people explore the boundaries of their personalities, adopt multiple selves, and form onlin
|
1383
|
internet and travel In the past ten to twenty years the internet has opened up a world one could have never have imagined. It has made the inconvenience of everyday life convenie
|
1188
|
Systems Development Lifecycle XYZ Ceramic Supply is a growing company in the arts and craft supply industry,
|
1178
|
Computer Ethics Computer crime has increased in resent years. The book gives several examples of past computer crimes. Before reading chapter 2 I thought that computer crim
|
1276
|
computer When thought of acid rain, some people may think of green, burning acid falling from the sky, destroying everything in sight. This may be a bit ridi
|
559
|
HACKERS In the article that I read was about Hackers. It talked about the aspects of how the youths of today commit this crime. Hacking overall requires the utmost i
|
418
|
Disk Defragmentation Fast, reliable disk performance is mandatory in today’s complex information technology world, because system response and virtual memory performance depend
|
990
|
MP3 Two years ago, MP3 was just another audio compression format. Today, it's a Net phenomenon that's at the center of an enormous controversy.
|
1235
|
Micro Chips The impression that I have gotten from the latest magazines and websites about microchips is that the chip is definitely the mile stone in computer hardware
|
1160
|
ObjectOriented Programming vs Procedural Programming It was way back in the 1970’s when Kernighan and Ritchie were working on creating a new programming language they would soon call C. It was called this becaus
|
814
|
Artificial IntelligenceCognitive Ability of Information Proc Artificial Intelligence: Cognitive Ability or Information Processing
Computers have become an integral part of our everyday lives. We rely upon these
|
1955
|
Pircay is still a crim Software Piracy is the most common computer crime, it is the illegal
|
498
|
comparing computers At home I have Microsoft Office, not the 2000 version but I can tell you th
|
272
|
Resistance to Technology Technology. What would we do without it? Probably have a lot less fun and have a lot shorter life span. Think about it, you
|
1041
|
What do you know about computers Prior to attending this class I thought I knew a lot about computers. What I’ve learned is that all I really knew was "buzz" words: megahertz, gigabyte, ram,
|
2525
|
Career As a Webmaster
|
1904
|
java project public class scroll extends java.applet.Applet implements Runnable {
|
161
|
MICROSOFTS LEGAL ISSUES Recently, Microsoft started having legal problems. It was one legal battle after another. It was taking too much time away from what Microsoft does best. Pe
|
495
|
Microsofts Legal Troubles Recently, Microsoft started having legal problems. It was one legal battle after another. It was taking too much time away from what Microsoft does best. P
|
496
|
Smart Houses The world of computer technology is continuously advancing each and every day. We look back at what we had 5 years ago and are amazed to see how far we ha
|
993
|
Advancements in Peripherals A Peripheral device is any external device attached to a computer. Without Peripherals a computer is just a box full of w
|
346
|
Advancements in Peripherals1 Recent Developments in Computer Peripherals
Including an in-depth look at Multimedia Input Devices
|
3564
|
Charles Babbage Charles Babbage is often called the "father of computing" because of his invention of the Analytical Engine. However, many people do not know the details of t
|
832
|
computer crime It's the weekend, you have nothing to do so you decide to
play around on your computer. You turn it on and then start up, you
|
1513
|
What is the internet Sometime in the mid 1960's, during the Cold War, it
became apparent that there was a need for a bombproof communications
|
735
|
Smart Houses1 The world of computer technology is continuously advancing each and every day. We look back at what we had 5 years ago and are amazed to see how far we ha
|
993
|
Ergonomics Ergonomics is the science of fitting the job to the worker. When there is a mismatch between the physical requirements of the job and th
|
1234
|
SUB SEVEN VIRUS Imagine this, you’re at home playing on the computer when suddenly your cd drive opens. You brush it off as it were nothing unusual but then a few minutes go
|
1072
|
final exam 1. To format a high-density diskette to use on my PC, I would first click on “My Computer”,
|
724
|
IT related terms A high-level programming language developed by Dennis Ritchie at Bell Labs in the mid 1970s. Although originally designed as a syst
|
3844
|
ecommerce1 An e-commerce solution for a business is the incorporation of all aspects of the business operation into an electronic format. Many well-es
|
208
|
ecommerce2 An e-commerce solution for a business is the incorporation of all aspects of the business operation into an electronic format. Many well-es
|
2838
|
ecommerce3 An e-commerce solution for a business is the incorporation of all aspects of the business operation into an electronic format. Many well-es
|
2838
|
Computer hacking As the world becomes more and more reliant on computers
the computer hacking industry is greatly rising. With
people such as Kevin Mitnick, who is known as
|
1514
|
computer purchase PROF. MARTINEZ COMPUTER PURCHASE
Recently, I decided to purchase a new computer. Buying a computer can be a complic
|
2047
|
computer programer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data proc
|
1836
|
Multimedia1 1.1 ALGUNAS CONCEPCIONES DE MULTIMEDIA
Es una nueva plataforma donde se integran componentes
|
4425
|
ECommerce THE IMPORTANCE OF IMPLEMENTING AN E-COMMERCE SOLUTION FOR AN EXISTING BUSINESS:
|
2891
|
Networking2 There are many kinds of networks, however this paper will be about networking computers. As we move further and further into the paperless society, the need fo
|
861
|
Graphics Graphics is a word used for all the different types of artwork, such as photographs, graphs, charts etc.
|
707
|
Buying A Computer Buying a Computer today is much more complicated then it was ten years ago. The choices we have are abundant, and the information we must gather to make those
|
1772
|
Are You Certified The impact of technology in our lives has grown exponentially over recent years. The demand for better, faster, more productive software and hardware equipmen
|
1022
|
Computer Hacking Thesis Introduction: Hacking is very well-know way of "crashing" a computer system. Listed below is some information on the problems caused by hacking and some solu
|
281
|
Pornography in the Media It started by way of messengers and scribes, evolved through the
presentation of newspapers and radio, brought us together with
|
1194
|
tcpip TCP/IP already supports over 4.8 million hosts with up to 45-MBPS
transit facilities and a wide variety of access links. Its architecture is
|
129
|
ADSL ADSL has been of interest to me for the past couple of years because it enables high-speed data on a single pair of local copper loop. It is phenomenal how it
|
300
|
Electronic Commerce Introduction…………………………………………………………………2
History of E-commerce……………………………………………………..4
Economic Impact……………………………………………………………5
|
2779
|
Computer Systems Analyst A Computer Systems Analyst decides how data are collected, prepared
for computers, processed, stored, and made available for users. (“Computer
|
1089
|
UNIX “UNIX was the first operating system designed to run on ‘dissimilar’ computers by converting most hardware specific commands in machine language into an inde
|
1561
|
Internet Access in the World Albrecht, Kirk. "Cybersurfers of Arabia." Business Week (1996): 108.
Bogert, Carroll. "Chat rooms and chadors." Newswe
|
332
|
Colonists and Americans From the end of the French and Indian War, there was a sense of unity brewing among the colonies. The colonies had to unite in order
|
695
|
Ergonomics1 Ergonomics is the science of fitting the job to the worker. When there is a mismatch between the physical requirements of the job and th
|
2476
|
intro to ecommerce In the broadest sense, electronic commerce (e-commerce), is the buying and selling of products and services over the Internet. It h
|
4239
|
The First Chapter of computer Languages The Tortuous Path of Early Programming.
In the perpetual darkness more than two miles below the surface of the North Atlantic, a submersible sled slowly
|
3643
|
Case about Yahoo 1. Success as a Web Search Engine
a. Why was Yahoo! such an early success on the Web?
Yahoo was an early success due to a combination of factors such
|
1560
|
Clientserver Client/server is the combination of three major technologies: Relational database management systems (RDBMSs), networks, and client interfaces. Clients execut
|
460
|
this is retarded James Fenimore Cooper: Frontier Legend
|
216
|
Programming Languaguages A programming language is a set of English-like instructions that includes a set of rules for putting the instructions together to
|
1162
|
Influences of Personal Computers Today Since the beginning of the Industrial Revolution, people wanted and needed an easier way of calculating and measuring. Through the dreams of C
|
2216
|
The Internet The Internet is, literally, a network of networks. It is made of thousands of interconnected networks spanning the globe. The computers that form the Internet
|
1981
|
UNIX1 “UNIX was the first operating system designed to run on ‘dissimilar’ computers by converting most hardware specific commands in machine language into an indep
|
1560
|
I want my MP3 Music is something that can be listened to almost anywhere due to modern technology. When it comes to listening to music while sitting at a co
|
628
|
Ergonomics2 Ergonomics is the science of fitting the job to the worker. When there is a mismatch between the physical requirements of the job and th
|
2476
|
Windows Evolution It wouldn’t be fair to talk about the Windows Operating System without first looking at the origins of the company that develo
|
1381
|
Microsoft Vs Justice Department In late October 1997, the Justice Department was again interrogating Microsoft. They have been at this since 1993, when they took over from the frustrated Fed
|
783
|
internet security Internet Security Many people today are familiar with the Internet and its use. A large number of its users however, are not aware of the security problems the
|
1806
|
Y2K1 What is Y2K and What Effect Did It Present On Modern Culture?
Two seemingly small digits may turn January 1, 2000 from a worldwide celebration into a unive
|
3001
|
computer virus Melissa, Bubbleboy, WM Concept, Stoned, Michelangelo, …, the list goes on and on. You might ask what do all these names have in common. The
|
1567
|
Brave new world vs Matrix Since the begging of humanity, mankind tries to predict the soon to be future. Many scientific books and movies thrilled readers and viewers with visions of th
|
1202
|
Computer Crime1 Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without
|
2719
|
Network Degn 1.2. Strategic Recommendation 3
1.3. Implementation Consideration
|
6422
|
Computer Graphics
|
2824
|
Cyber Terrorism The face of global terrorism as we knew it to be 50 odd years ago is changing rapidly with the advancement of technology in today’s society. Be it a kid trying
|
1143
|
Computers2 This paper is about the computer. Today computers are used by hundreds of millions of people. There have been many advances in the computer. The com
|
508
|
A Certification Requirements THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL
|
298
|
TCPIP Security The TCP/IP protocols, the basis for today's Internet, lack even the most basic mechanisms for security, such as authentication or encrypti
|
11199
|
a certification THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL
|
298
|
Yahoo Vs Lycos When searching on the Internet, one may find it difficult sometimes to know where to start. With the seemingly limitless amount of informa
|
665
|
Artificial Intelligence1 Recently, the media has spent an increasing amount of broadcast time on new technology.
The focus of high-tech media has been aimed at the flurry of advance
|
2826
|