Term Papers !
Enter YOUR
Topic:


 

Term Papers - 12,000+ Term Paper Examples & Ideas .. Term Papers .. Download A Term Paper Example Today .. More Than 12,000 Model Term Papers At 12000papers.com  - TERM PAPERS !

Papers On Computers & The Internet
Page 7 of 88

Previous 25 Items Next 25 Items

"How Computers Work": A Review of the Book by Ron White
[ send me this paper ]
A 3 page overview of this captivating book. While there are some shortcomings, White's inclusion of four-color detailed illustrations and little reliance on text is a welcome relief in aiding our understanding of computer technology. No additional sources are listed.
Filename: PPcompBk.rtf
Paper Title: "How Computers Work": A Review of the Book by Ron White

"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl
[ send me this paper ]
A 12 page discussion of the ease with which private and proprietary information can be unscrupulously gleaned from the multitude of computerized digitized files which exist in the contemporary world. The laws which exist for the purpose of protecting our privacy and the ownership of intellectual property have proven to be a little real benefit. The case law outlined by Maggs, Soma, and Sprowl is used as a springboard in this paper to discuss several independent examples of where information privacy becomes an issue and the measures that can be taken to protect that privacy. Bibliography lists 3 sources.
Filename: PPlwComp.rtf
Paper Title: "Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl

"Slaves of the Machine"
[ send me this paper ]
A 5 page summary of the book "Slaves of the Machine" by Gregory J. E. Rawlins. In this book, Rawlins argues that the computer is perhaps the one in control, the master of all of us. This is due to the fact that we designed it, yet make all these alterations to our lives in order to utilize the computer, among other reasons. Bibliography lists 4 additional sources.
Filename: RAmachine.wps
Paper Title: "Slaves of the Machine"

"Who Owns Information?: From Privacy to Public Access"
[ send me this paper ]
A 9 page discussion of the concerns presented in the book by Ann Wells Branscomb. The management of information has become considerably more complex in the last few generations. Branscomb details the topic of information ownership with a particular emphasis on the risks which currently exist in regard to information privacy. Branscomb's book supports the contention that, although laws exist to protect digitized information, those laws are inadequate. Bibliography lists 3 sources.
Filename: PPpriva3.rtf
Paper Title: "Who Owns Information?: From Privacy to Public Access"

100 Products and Services That People Don't Want to Buy on the Web:
[ send me this paper ]
This 10 page paper discusses the products and services which people don't want to buy online. Furthermore, this paper explains many reasons why certain products and services don't sell easily on the web compared to others. Bibliography lists 14 sources.
Filename: GSWebbuy.rtf
Paper Title: 100 Products and Services That People Don't Want to Buy on the Web:

2Oth Century Computer Graphic Designs
[ send me this paper ]
This 30 page paper considers the nature of graphic design in 20th century, the approaches to developing graphic design and the way the focus on design has changed in recent years through the introduction of WEB design and the use in advertising and marketing. Bibliography lists 20 sources.
Filename: MHgraphi.wps
Paper Title: 2Oth Century Computer Graphic Designs

3D Animation
[ send me this paper ]
Computer aided design has become a significant factor in such diverse occupations as architecture and toy manufacturing. This 5 page paper examines the technology, history and processes involved in 3D animation and computer simulation. Bibliography lists 6 sources.
Filename: KTanimte.rtf
Paper Title: 3D Animation

802.11 Technology
[ send me this paper ]
This 16 page paper considers the 802.11 set of protocols looking at the use of the technology in general as well as 802.11a, 802.11b and 802.11g individually looking at their relative advantages and disadvantages. The paper then considers the dangers of using these in terms of security and where the technology may lead on the future. The bibliography cites 16 sources.
Filename: TE80211g.rtf
Paper Title: 802.11 Technology

888.com
[ send me this paper ]
This 5 page paper examines the online gambling and casino company 888.com and considers the strategy of the company using Porters Five Forces model, which looks at existing competition, new entrants, customers and suppliers and substitutes. The bibliography cites 8 sources.
Filename: TE888com.rtf
Paper Title: 888.com

A Look at Congress and the Internet
[ send me this paper ]
This 3 page paper looks at the first four chapters of the book Congress and the Internet that highlights the views of various politicians. How Congress has changed as a result of the advent of the net is the focus of this paper. No additional sources cited.
Filename: SA312net.rtf
Paper Title: A Look at Congress and the Internet

A Brief History of Wireless Networking
[ send me this paper ]
This 5 page paper gives an outline of the history of wireless networking, starting with the developments of Marconi, and the first wireless network at the University of Hawaii up to the development and use of 802.11g. The bibliography cites 6 sources.
Filename: TEwirehist.rtf
Paper Title: A Brief History of Wireless Networking

A Brief Outline of the Evolution of Computer Technology
[ send me this paper ]
A 10 page outline of the changes which have overtaken the computer industry since the invention of the first analog computer. This paper concentrates on changes in storage mediums such as tape drives, floppy disks, and CDs as well as changes in CPU technology. Bibliography lists 9 sources.
Filename: PPcmpGui.rtf
Paper Title: A Brief Outline of the Evolution of Computer Technology

A Career as a Network Administrator
[ send me this paper ]
5 pages. This paper will cover the many facets of being a network administrator. Some of the topics included are what type and how much of an education would one need, what the career outlook is for this particular job market, the approximate starting salary and the type of work that is typically done in this job. Bibliography lists 5 sources.
Filename: JAnetadm.rtf
Paper Title: A Career as a Network Administrator

A Career in Computer Support: Data Replication
[ send me this paper ]
5 pages. The computer industry is always in need of technical support personnel and one of the most interesting vocations to be had is in that of data replication. This is a high profile and extremely important job in that the files of many organizations are kept up to date in case of any type of disaster that could destroy computer records. Trouble shooting in this career is a constant priority to assure that all systems are working. Additionally there are many instances of 'dry runs' in which tests are made to see how quickly a business can be up and running if all of their computer records are destroyed. This is a very interesting and important job and this paper goes into detail about it. Bibliography lists 5 sources.
Filename: JGAtrbsh.rtf
Paper Title: A Career in Computer Support: Data Replication

A Case for Installation of Information System
[ send me this paper ]
5 pages in length. As a consultant to Wilco Construction, a software technology must be found that will help this company grow out of the dark ages. Originally employing a bookkeeper and 2 employees with a backhoe, this large construction company found itself in dire need of a computer system. Find out which system was chosen and why.
Filename: JGAbfnbr.wps
Paper Title: A Case for Installation of Information System

A Case for Outlawing Virtual Pornography
[ send me this paper ]
An 8 page discussion of the impacts of virtual pornography on society. The writer emphasizes that while the issue of Internet regulation is highly controversial, pornography on the World Wide Web should definitely be outlawed if for no other reason than its impacts on the most vulnerable members of our society, our children. Bibliography lists 13 sources.
Filename: PPpornRg.rtf
Paper Title: A Case for Outlawing Virtual Pornography

A Case Study Concerning Data Protection
[ send me this paper ]
This 3 page study examines various ways to protect data in a stand alone computer. Authentication is discussed. Bibliography lists 3 sources.
Filename: SA813aut.rtf
Paper Title: A Case Study Concerning Data Protection

A Case Study in Database Management
[ send me this paper ]
This 5 page paper uses a case study submitted by a student as a springboard for discussion. The case study involves a firm that utilizes various software programs with a UNIX and LINUX based administration. A sample memorandum is created to inform staff as to necessary changes and problems at this fictitious firm. Bibliography lists 2 sources.
Filename: SA435DBA.rtf
Paper Title: A Case Study in Database Management

A Case Study in LAN Network Choices
[ send me this paper ]
This 3 page paper is based on a case study provided by the student. It answer 5 specific questions regarding what type of LAN should be installed between to conflicting departments. The bibliography cites 2 sources.
Filename: TEshorta.rtf
Paper Title: A Case Study in LAN Network Choices

A Communication Solution for the Travelling Executive
[ send me this paper ]
This 6 page paper considers different communication solutions for a travelling manager who needs to stay in touch with the office as well as clients. Mobile telephones, WAP access, and wide area networks (WAN's) are all discussed with consideration of the advantages and constraints of the system, along with an estimation of approximate costs. The bibliography cites 4 sources.
Filename: TEcomunc.wps
Paper Title: A Communication Solution for the Travelling Executive

A Comparison between Three Personal Firewalls
[ send me this paper ]
This 5 page paper considers three easily available firewalls; BlackICE Defender, Zone Alarm and Sygate Personal Firewall. The writer compares aspects such as price, features, ease of use and general strengths and weaknesses. The writer then makes a preference choice and outlines how it may be installed on a small network. The bibliography cites 8 sources.
Filename: TEfirewl.wps
Paper Title: A Comparison between Three Personal Firewalls

A Comparison In The Development Of East And West Technology
[ send me this paper ]
Science and technology make up a great portion of the way the world is able to function today. For every decision made to incorporate a technological innovation an ethical decision must also be made - whether the technology fits within the society's definition of ethical development, or has man crossed the line into "playing God"? A world culture is emerging that must be willing to negotiate the different cultural and religious differences in an ethical analysis of technodecision making that must include specialized experts as well as be expanded to include all citizens in a high-science, high-technology society. The rate of technological development is to a great extent, a reflection of societal beliefs and norms. The Eastern world has lagged behind in developing technology for a myriad of complex reasons. This 30 page paper proposes a three tiered approach to understanding the differences between the rate of technological development between Western and Eastern cultures, focusing on Eastern, development - India, and Hindu philosophy, in particular. Bibliography lists 20 sources.
Filename: KTeawetech.wps
Paper Title: A Comparison In The Development Of East And West Technology

A Comparison of B2B, B2C and C2C
[ send me this paper ]
This 7 page paper examines these three prototypes with the use of companies as examples. Intel, Eddie Bauer and eBay web sites are the ones used. Bibliography lists 5 sources.
Filename: SA5052C.rtf
Paper Title: A Comparison of B2B, B2C and C2C

A Comparison Of Dell And Gateway Computer Companies
[ send me this paper ]
A 32 page research paper that investigates the similarities and differences between Dell Computer and Gateway, Inc. The paper begins with a one-page summary, followed by an introduction to the topic. The writer provides an overview of each company, including a description of how each was established. Each company's mission, visions and goals are then outlined. Market share and marketing strategies of each company are described and discussed. Current data, information and problems are then discussed, which is followed by a section on inventory control and the strengths of each company. Selected data included. Bibliography lists 30 sources.
Filename: PGgatdel.wps
Paper Title: A Comparison Of Dell And Gateway Computer Companies

A Comparison of Dell and Gateway Computers
[ send me this paper ]
5 pages. When searching for that new personal home computer, which brand would you choose? By comparing information on Dell and Gateway computers, as well as the companies that manufacture them, we find there are many things to take into consideration. Bibliography lists 4 sources.
Filename: JGAgatew.wps
Paper Title: A Comparison of Dell and Gateway Computers


Page 7 of 88
1  2  3  4  5  6  7  8  9  10  more >>

Previous 25 Items Next 25 Items


ordernow.gif (2082 bytes)

If this paper is not what YOU want,
CLICK HERE
to return to the subject list
-or-
SEARCH FOR YOUR PAPER TOPIC BY KEYWORD:

WHAT'S YOUR PAPER ON?

Rather Just Have Us Write Something NEW?
Something That....
More Closely Matches YOUR Topic?


TERM PAPERS - CUSTOM RESEARCH ASSISTANCE - CLICK HERE !

 

Need More Options First?

term papers -- choose an option to help you w/ your term paper
Term Papers - Assistance w/ Term Papers - MORE HELP OPTIONS !

 

TERM PAPER WARNINGS !
Every example term paper described on this website is owned, 
authored, & published globally for resale by The Paper Store 
Enterprises, Inc.  It is both policy and commonsense that any 
concepts or ideas taken from these highly-visible works must be 
properly-cited in a student's own term paper  as originating from 
our company.. The organization's rights to research topics, 
to critique sources, and to publish research worldwide constitute 
protected, free speech of the highest order and shall continue 
unabated and uncensored. Students who are not sure how to 
properly cite our work should CLICK HERE... Students who are 
unclear as to whether or not using our term paper(s) as (a) 
source(s) will be acceptable for credit ....are strongly urged to 
consult withtheir instructor(s) before  making (a) purchase(s) with us... 
The Paper Store, Inc. is committed to doing all we possibly can to 
upholdhigh standards of academic integrity worldwide. Pertinent 
suggestions fromacademic personnel are carefully evaluated and 
often implemented
....... .......

Visit More Great Sites Like This One!:
Term Papers - Help On-File | Buy Help With Term Papers | Reports-and-Papers
Papers 24-7 | Paper Store | Research Papers | History Papers | Health Papers
Psychology Papers
| Essay and Paper Finder | 15000 Papers
| More Term Paper Help Sites...



Save 10% On Your Next Paper By Linking To Us ! 
Click HERE
For Instructions !