Papers On Computers & The Internet
Page 14 of 208
|
|
3D Animation
[ send me this paper ]
Computer aided design has become a significant factor in such
diverse occupations as architecture and toy manufacturing. This 5 page paper
examines the technology, history and processes involved in 3D animation and
computer simulation. Bibliography lists 6 sources.
Filename: KTanimte.rtf
802.11 Technology
[ send me this paper ]
This 16 page paper considers the 802.11 set of protocols looking at the use of the technology in general as well as 802.11a, 802.11b and 802.11g individually looking at their relative advantages and disadvantages. The paper then considers the dangers of using these in terms of security and where the technology may lead on the future. The bibliography cites 16 sources.
Filename: TE80211g.rtf
888.com
[ send me this paper ]
This 5 page paper examines the online gambling and casino company 888.com and considers the strategy of the company using Porters Five Forces model, which looks at existing competition, new entrants, customers and suppliers and substitutes. The bibliography cites 8 sources.
Filename: TE888com.rtf
A Look at Congress and the Internet
[ send me this paper ]
This 3 page paper looks at the first four chapters of the book Congress and the Internet that highlights the views of various politicians. How Congress has changed as a result of the advent of the net is the focus of this paper. No additional sources cited.
Filename: SA312net.rtf
A Brief Outline of the Evolution of Computer Technology
[ send me this paper ]
A 10 page outline of the changes which have overtaken the computer industry since the invention of the first analog computer. This paper concentrates on changes in storage mediums such as tape drives, floppy disks, and CDs as well as changes in CPU technology. Bibliography lists 9 sources.
Filename: PPcmpGui.rtf
A Career as a Network Administrator
[ send me this paper ]
5 pages. This paper will cover the many facets of being a network administrator. Some of the topics included are what type and how much of an education would one need, what the career outlook is for this particular job market, the approximate starting salary and the type of work that is typically done in this job. Bibliography lists 5 sources.
Filename: JAnetadm.rtf
A Career in Computer Support: Data Replication
[ send me this paper ]
5 pages. The computer industry is always in need of technical support personnel and one of the most interesting vocations to be had is in that of data replication. This is a high profile and extremely important job in that the files of many organizations are kept up to date in case of any type of disaster that could destroy computer records. Trouble shooting in this career is a constant priority to assure that all systems are working. Additionally there are many instances of 'dry runs' in which tests are made to see how quickly a business can be up and running if all of their computer records are destroyed. This is a very interesting and important job and this paper goes into detail about it. Bibliography lists 5 sources.
Filename: JGAtrbsh.rtf
A Case for Installation of Information System
[ send me this paper ]
5 pages in length.
As a consultant to Wilco Construction, a software technology must
be found that will help this company grow out of the dark ages.
Originally employing a bookkeeper and 2 employees with a backhoe,
this large construction company found itself in dire need of a
computer system. Find out which system was chosen and why.
Filename: JGAbfnbr.wps
A Case for Outlawing Virtual Pornography
[ send me this paper ]
An 8 page discussion of the impacts of virtual pornography on society. The writer emphasizes that while the issue of Internet regulation is highly controversial, pornography on the World Wide Web should definitely be outlawed if for no other reason than its impacts on the most vulnerable members of our society, our children. Bibliography lists 13 sources.
Filename: PPpornRg.rtf
A Case Study Concerning Data Protection
[ send me this paper ]
This 3 page study examines various ways to protect data in a stand alone computer. Authentication is discussed. Bibliography lists 3 sources.
Filename: SA813aut.rtf
The Paper Store Enterprises, Inc. Gladly Accepts:
l
Request A
Free
Excerpt From Any Paper Before Ordering!
Be
sure to also visit:
Term Paper Help On
File, 12000 Papers,
Research Papers Dot Net,
Essay Site, Paper
Geeks, Paper or Essay
Finder, The Essay Page,
Reports and Papers,
Report Finders, 12000
Papers, Real Papers, E
- Coursework, Choose
a Paper,
Pick a Paper, Paper
Download, & Expert
Term Paper Advice
(Click Here For MORE Term Paper &
Research Paper Help Sites!)