Make
Your Selection Below:
Papers On Computer Technology
Page 13 of 69
|
|
Compilers
[ send me this paper ]
A 3 page research paper that, first of all, explains what compilers are and the function they serve in computer programming. Then the various features of compilers are explained and discussed. Bibliography lists 8 sources.
Filename: khcompil.rtf
Compilers
[ send me this paper ]
A 3 page research paper that, first of all, explains what compilers are and the function they serve in computer programming. Then the various features of compilers are explained and discussed. Bibliography lists 8 sources.
Filename: khcomp2.rtf
Component Based Software Development and its’ Maintenance
[ send me this paper ]
This 8 page paper examines the use of Component Based Software Development (CBSD), what it is, how it works, the advantages and disadvantages of the system and the implications n terms of managing the system when it is up and running. The bibliography cites 8 sources.
Filename: TEcombsd.rtf
Computer Aided Process Planning
[ send me this paper ]
A 5 page paper discussing retrieval and generative computer-aided process planning (CAPP), which can be seen as CAD applied to processes. CAPP enables virtual design of the processes that will be used to produce the physical product. It is a great time- and cost-saving device that contributes to organizations’ ability to further reduce product introduction time, thereby positively affecting their relative advantage in their industries. Bibliography lists 6 sources.
Filename: KS-CAPPr.rtf
Computer Aided Process Planning
[ send me this paper ]
This 7 page report discusses Computer Aided Process Planning or CAPP. Such software systems have the ability to gather and verify production data and then transmit it to the appropriate manufacturing or design entity. Such a process both simplifies and expedites the exchange of information and allows for the elimination of wasted time and energy in shuffling through the mountains of paper that have always accompanied production processes. Bibliography lists 8 sources.
Filename: BWcapp.rtf
Computer Crime
[ send me this paper ]
12 pages in length. That hacking was present in the phone system over one hundred years ago speaks to a problem that has experienced a slow but steady evolution. The 1960s, however, is where the timeline of contemporary hacking gets its start, continuing on into the 1970s with John Draper – aka Captain Crunch – hacking the phone company by mimicking the tone that opens a line. By the 1980s, hacking had become much more sophisticated as a vast new entity called 'cyberspace' was introduced to the world. Bibliography lists 15 sources.
Filename: TLCCompCrm.rtf
Computer Crime And Forensics
[ send me this paper ]
12 pages in length. Policing of computer crimes is considerably more difficult than regulating criminal activity in real life, inasmuch as the perpetrator can move about in complete anonymity for long periods of time before officials can ever connect him or her to a particular white collar crime. Indeed, policing tactics have vastly improved over the years to include such aspects as firewalls, backups and other security providers; however, the extent to which IT forensics strategies must go in relation to existing problems reflects a perpetual and worsening dilemma. Bibliography lists 14 sources.
Filename: TLCCmpCrmFr.rtf
Computer Crime and the Law
[ send me this paper ]
A 5 page examination of the problem of computer crime and the various state and federal laws which are in place to combat it. Bibliography lists 5 sources.
Filename: Cclaw.wps
COMPUTER CRIME: A CASE STUDY
[ send me this paper ]
This 6-page paper focuses on a case study detailing a disgruntled employee who set a time bomb in a company's computer. The paper answers questions such as whether the employee's act was criminal, how it could have been prevented, and how the database could be restored. Bibliography lists 3 sources.
Filename: MTcomcri.rtf
Computer Crimes & Tactics for Minimizing Them
[ send me this paper ]
A 6 page overview of 'hacking' and 'cracking', the unauthorized access to computer systems. Discusses the costs of such activity and identifies current tactics for minimizing such access. Bibliography lists 8 sources.
Filename: Compcri3.wps
The Paper Store Enterprises, Inc. Gladly Accepts:
Request A Free
Excerpt From Any Paper Before Ordering!
Be
sure to also visit:
Term Paper Help On
File, 12000 Papers,
Research Papers Dot Net,
Essay Site, Paper
Geeks, Paper or Essay
Finder, The Essay Page,
Reports and Papers,
Report Finders, 12000
Papers, Real Papers, E
- Coursework, Choose
a Paper,
Pick a Paper, Paper
Download, & Expert
Term Paper Advice
(Click Here For MORE Term Paper &
Research Paper Help Sites!)
|