Search
  HOME
  JOIN NOW
  QUESTIONS
  CONTACT US
ESSAY TOPICS
:: Arts & Movies
:: Biographies
:: Book Reports
:: Computers
:: Creative Writing
:: Economics
:: Education
:: English
:: Geography
:: Health
:: Legal
:: Miscellaneous
:: Music
:: Politics
:: Religion
:: Sciences
:: Society
:: US History
:: World History
MEMBER LOGIN
Username: 
Password: 

Forgot Password



Computers Essay Writing Help

Speeding Up Windows 95
Words: 806 / Pages: 3

.... operating system. User interface is a program within Windows 95 that allows customization of certain interface settings based on personal preference. About a year ago Microsoft released a small program called TweakUI that actually adds more flexibility and functionality to the already current user-friendly interface. TweakUI is actually a rewrite (bug fix) program that edits certain data files from the Windows 95 registry. With TweakUI running on your machine you can disable the following options which in turn will speed up your access time: windows animation, reboot start up, GUI interface, and last log on settings. TweakUI also adds a few nifty e .....


Isdn For Small Business
Words: 2271 / Pages: 9

.... and alternatives to ISDN. This can range form regular phone connections to a digital satellite dish. The article is offers a worthy discussion for anyone contemplating a higher speed internet connection in the near future. ABSTRACT ii LIST OF ILLUSTRATIONS iv INTRODUCTION 1 ISDN DEVELOPMENT 2 INTENTION OF ISDN 2 USES OF ISDN 2 TYPES OF ISDN 3 INTERFACES 3 Usage of PRI 3 How BRI Works 4 USAGE CONFIGURATION 4 EQUIPMENT NEEDED 4 RATES AND CHARGES 6 EXPLANATION OF CHARGES 6 CONFIGURATION CONSIDERATIONS 6 USAGE CONSIDERATIONS 7 AVAILABILITY OF SERVICE 7 ALTERNATIVES 8 SUMMARY 9 WORKS CITED 10 List of Illustrations Figure .....


Artificial Intelligence
Words: 2749 / Pages: 10

.... Recommendations 10 Bibiography 11 INTRODUCTION Purpose The purpose of this study is to determine additional areas where artificial intelligence technology may be applied for positive identifications of individuals during financial transactions, such as automated banking transactions, telephone transactions , and home banking activities. This study focuses on academic research in neural network technology . This study was funded by the Banking Commission in its effort to deter fraud. Overview Recently, the thrust of studies into practical applications for artificial intelligence have focused on exploiting the expectations of both ex .....


Computers Not The Greatest Invention Of The 20 Th Century
Words: 3455 / Pages: 13

.... in Asia Minor and is still in use today, may be considered the first computer. This device allows users to make computations using a system of sliding beads arranged on a rack. Early merchants used the abacus to keep trading transactions. But as the use of paper and pencil spread, particularly in Europe, the abacus lost its importance. It took nearly 12 centuries, however, for the next significant advance in computing devices to emerge. In 1642, Blaise Pascal, the 18-year-old son of a French tax collector invented what he called a numerical wheel calculator to help his father with his duties. This brass rectangular box, also called a Pascaline, .....


Object Oriented Analysis
Words: 666 / Pages: 3

.... because of its strict sequence, nothing of substance could be demonstrated to the end user until the final stage of the waterfall cycle was completed. During the 1970’s, a new approach was developed. Tom Demarco, is his book, Structured Analysis and System Specification, introduced model-based software engineering. Demarco thought that complex software systems should be built like any large, complex engineering system, by first building working paper models of the system before committing the resources for implementation. This allowed the user to visualize the future system. Most modern approaches have integrated some form of Demarco’s philoso .....


Telecommunications Device For The Deaf (TDD)
Words: 360 / Pages: 2

.... the telephone and put the receiver on their TDD's cradle. A bright flashing light, at their residence alerts the person receiving the call. This light serves as a signal that they have a telephone call. The receiving person puts his telephone receiver on the cradle of his TDD machine and both parties begin communicating. While one party types the other party reads. Unfortunately, TDD machines only have half-duplex capabilities. This means that only one person at a time can type. On that account, people who use TDD machines use letters that represent word-signals, which aid in the process of keeping the conversation flowing. For instance, .....


Computer Viruses
Words: 1615 / Pages: 6

.... routine. There is also a set of programs that are related to viruses by virtue of their intentions, appearances, or users likely reactions. For example: ¨ Droppers ¨ Failed viruses ¨ Packagers ¨ Trojans ¨ Jokes ¨ Test files THE DAMAGE ROUTINE Damage is defined as something that you would prefer not to have happened. It is measured by the amount of time it takes to reverse the damage. Trivial damage happens when all you have to do is get rid of the virus. There may be some audio or visual effect; often there is no effect at all. Minor damage occurs when you have to replace some or all of your executable files from clean backups, or by re .....


How To Make A Webpage
Words: 478 / Pages: 2

.... of your web browser, and the other neat moving things that you may find in web pages around the net. Another code to spice up your web page would be cgi. Cgi stands for: Common Gateway Interface, it is used to submit information on the internet. You can get a book at your local library that contains how to use html, java, and cgi. You now need to select one of the many programs that allow you to make a web page, using html, java, and cgi. Once you find this program, you may now start to enter your html, java, and cgi coordinates. After long hours of work you may now test your web page, depending on the program you are using, there is usually a bu .....


Computer Viruses: Past, Present And Future
Words: 4592 / Pages: 17

.... The real numbers behind the growth of viruses and their costs · How viruses work - and how virus protection can stop them What, Exactly, Is A Computer Virus? A computer virus is a program designed to replicate and spread, generally with the victim being oblivious to its existence. Computer viruses spread by attaching themselves to other programs (e.g., word processors or spreadsheets application files) or to the boot sector of a disk. When an infected file is activated - or executed - or when the computer is started from an infected disk, the virus itself is also executed. Often, it lurks in computer memory, waiting to infect the next pro .....


Essay On Hacking
Words: 580 / Pages: 3

.... web page and then there are some browsers that can play videos and sounds. Have you ever wondered why when you want to go to a website you have to type http://name of site.com? well I have been wondering for ages but still can't figure out, but sometimes you type ftp:// before the name of the site. This simply means File transfer protocol. You use this when download image files or any other files. Now, onto hacking. Most people stereotype people simply as "HACKERS," but what they don't know is that there are three different types of computer whizzes. First, there are hackers. Hackers simply make viruses and fool around on the internet an .....



« prev  31  32  33  34  35  36  37  38  39  40  next »

   Copyright © 2024 EssayInn.com
   All Rights Reserved.
> Home Page > Join Now > Questions > Cancel > Contact Us