Title
|
Word Count
|
computer and kids
|
280
|
computer simulation Computer Simulation WARSIM 2000 is simulation software, used by the armed forces. Extensive, thorough, and tiring work has
|
2280
|
computersinternet privacy INTERNET REGULATION: POLICING CYBERSPACE
The Internet is a method of communication and a source
|
1394
|
Computing Power Unleashed This article mainly deals with the microprocessor chip, which is the computer's brain. This
computer chip is responsible for the majority of the computers
|
483
|
Contrast DOS to Unix Compare and Contrast Microsoft DOS with UNIX
|
3715
|
Cyber Porn Imagine a place where you have access to anything and everything one could want. Some would say that is only existent in a utopia, and some would say tha
|
3176
|
Computerization of a Company The word ubiquitous means ever present or occurring everywhere. This term could be used to describe the use of the computer in the business. The business w
|
1197
|
Computer Calamities There's nothing worst than when a machine that you depend on so much, just decides it doesn't want to work anymore. If you run a busi
|
996
|
computing now ________________________________________________
|
359
|
Comparing and Contrasting the Internet to Print Comparing and Contrasting the Internet to Print
The differences between the Internet and Print Journalism are clear immediately upon glancing at either of
|
730
|
CMIP vs SNMP Network Management Imagine yourself as a network administrator, responsi
|
2236
|
CFortran and others Despite having very little knowledge of the wor
|
3804
|
Complete Computer System The new Power Mac G4 is up to twice as fast as the fastest Pentium III-based PCs. With its Pentium-cr
|
961
|
Computer Viruses Introduction
In the past decad
|
1778
|
Computers Could one imagine what the world would be like today without computers? For one, I would not be typing this paper right now. Comput
|
1215
|
Censoring the Internet The internet offers a huge wealth of information both good and bad, unfortunately the vary nature of the internet makes policing th
|
2499
|
Computer Programmer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data proc
|
1836
|
Censorship The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer
|
3623
|
computer hackers REACTION PAPER FOR CASE STUDY #2, Chapter 17
This Reaction Paper represents my comments about and answers to questions concerning Case Study #2 in Chapter
|
269
|
computers in the classrooms or not Computers in the Classrooms . . . or Not?
Should computers be the sole teachers of students in the classroom? The argument is whether or not students shoul
|
1116
|
Computer Enginnering A Strong Background in Computer Technology
Computer technology has advanced dramatically over the past ten years. Tech
|
1038
|
computer fundermentals The society in which we live is complex and sophisticated. As consumers we demand a variety of goods and services to enable us to maintain the quality o
|
3444
|
Computer Addiction There once was a time when the only computers known to the average person were those the military possesse
|
645
|
cisco - No pertinent information in this chapter to note.
|
184
|
computers Computers are found in practically every household today. Everywhere you look, people have access to a Personal Computer, someway or another. As computers ge
|
407
|
Catcher in the Rye Thesis Paper The Catcher in the Rye is a story about a young man named Holden Caulfield and the experiences that he faces after bei
|
495
|
computer underground The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home comp
|
8260
|
Computer Viruses1 In the past decade, computer and networking technology has seen enormous growth. This grow
|
4580
|
Computing professional
|
688
|
Computer Viruses2 A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge
|
834
|
Computer Crimes Computer crime started in the early 1970’s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a c
|
1179
|
Computer Crime New times bring new crimes. It's a story as old as humanity and as new as the Internet. First comes cars, then car thieves follow. Telephones are followed by t
|
2684
|
Comparing operating systems Comparing Microsoft Operating Systems : 95/98/NT
This report is centered on the similarities and differences of the three major
|
321
|
Computer Viruses3 Almost every End-user in the world has heard of computer viruses and/or has had one at one point in time. Don’t worry if you haven’t heard about them, you wo
|
1261
|
Computer Ethics Computer crime has increased in resent years. The book gives several examples of past computer crimes. Before reading chapter 2 I thought that computer crim
|
1276
|
computer When thought of acid rain, some people may think of green, burning acid falling from the sky, destroying everything in sight. This may be a bit ridi
|
559
|
comparing computers At home I have Microsoft Office, not the 2000 version but I can tell you th
|
272
|
Career As a Webmaster
|
1904
|
Charles Babbage Charles Babbage is often called the "father of computing" because of his invention of the Analytical Engine. However, many people do not know the details of t
|
832
|
computer crime It's the weekend, you have nothing to do so you decide to
play around on your computer. You turn it on and then start up, you
|
1513
|
Computer hacking As the world becomes more and more reliant on computers
the computer hacking industry is greatly rising. With
people such as Kevin Mitnick, who is known as
|
1514
|
computer purchase PROF. MARTINEZ COMPUTER PURCHASE
Recently, I decided to purchase a new computer. Buying a computer can be a complic
|
2047
|
computer programer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data proc
|
1836
|
Computer Hacking Thesis Introduction: Hacking is very well-know way of "crashing" a computer system. Listed below is some information on the problems caused by hacking and some solu
|
281
|
Computer Systems Analyst A Computer Systems Analyst decides how data are collected, prepared
for computers, processed, stored, and made available for users. (“Computer
|
1089
|
Colonists and Americans From the end of the French and Indian War, there was a sense of unity brewing among the colonies. The colonies had to unite in order
|
695
|
Case about Yahoo 1. Success as a Web Search Engine
a. Why was Yahoo! such an early success on the Web?
Yahoo was an early success due to a combination of factors such
|
1560
|
Clientserver Client/server is the combination of three major technologies: Relational database management systems (RDBMSs), networks, and client interfaces. Clients execut
|
460
|
computer virus Melissa, Bubbleboy, WM Concept, Stoned, Michelangelo, …, the list goes on and on. You might ask what do all these names have in common. The
|
1567
|
Computer Crime1 Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without
|
2719
|
Computer Graphics
|
2824
|
Cyber Terrorism The face of global terrorism as we knew it to be 50 odd years ago is changing rapidly with the advancement of technology in today’s society. Be it a kid trying
|
1143
|
Computers2 This paper is about the computer. Today computers are used by hundreds of millions of people. There have been many advances in the computer. The com
|
508
|