Search
  HOME
  JOIN NOW
  QUESTIONS
  CONTACT US
ESSAY TOPICS
:: Arts & Movies
:: Biographies
:: Book Reports
:: Computers
:: Creative Writing
:: Economics
:: Education
:: English
:: Geography
:: Health
:: Legal
:: Miscellaneous
:: Music
:: Politics
:: Religion
:: Sciences
:: Society
:: US History
:: World History
MEMBER LOGIN
Username: 
Password: 

Forgot Password



Computers Essay Writing Help

Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection
Words: 548 / Pages: 2

.... Local Area Network: a LAN allows multiple computers to share the same data, and programs. However, this data sharing can allow a virus to spread rapidly to computers that have otherwise been protected from external contamination. 3. Telecommunications: also known as a Wide Area Network, this entails the connection of computer systems to each other via modems, and telephone lines. This is the vector most feared by computer users, with infected files being rapidly passed along the emerging information super-highway, then downloaded from public services and then used, th .....


Technology And The Stock Market
Words: 1260 / Pages: 5

.... growing stock market in the United States. It alo ranks second among the world’s securities in terms of dollar value. By constantly evolving to meet the changing needs of investors and public companies, NASDAQ has achieved more than almost any other market, in a shorter period of time. Technology has also helped investors buy stocks in other markets. Markets used to open at standard local times. This would cause an American trader to sleep through the majority of a Japanese trading day. With more online and afterhours trading, investors have more access to markets so that American traders can still trade Japanese stocks. This is also helped by .....


How To Surf The Internet
Words: 1265 / Pages: 5

.... First of all, for a person to even consider doing research on the Internet privately they must own a computer. A computer that is fast, reliable, and one that has a great deal of memory is greatly beneficial. A person also needs a modem (a device that transmits data from a network on the Internet to the user's computer). A modem's quality and speed are measured as something called a baud rate (how fast the modem transmits data in bits and kilobits - similar to grams and kilograms). A kilobit is a term simply used to describe the speed of a modem. For example, if somebody was to go out and purchase a 2400 baud modem, they would be buying a m .....


Windows 95
Words: 569 / Pages: 3

.... first start an application, a corresponding button appears on the task bar. If after opening other windows you need to return to the original window, all you need do is click on the application's button on the task bar and the appropriate window will come to the fore. According to Aley, "the most gratifying, and overdue, improvement is Windows 95's tolerance for file names in plain English" (29-30). Traditionally, users had to think of file names that summed up their work in eight letters or less. This was a constant problem because frequently a user would look at a list of files to retrieve and think "now what did I save that as?". Those days are o .....


Telecommunications
Words: 3010 / Pages: 11

.... book, a mailing list, a bank statement, or a computer program. The devices used can be computers, terminals (devices that transmit and receive information), and peripheral equipment such as printers (see Computer; Office Systems). The transmission line used can be a normal or a specially purchased telephone line called a leased, or private, line (see Telephone). It can also take the form of a microwave or a communications-satellite linkage, or some combination of any of these various systems. Hardware and Software Each telecommunications device uses hardware, which connects a device to the transmission line; and software, which makes it possible for .....


How The Internet Got Started
Words: 887 / Pages: 4

.... a daring solution made in 1964.The principles were simple . The network itself would be assumed to be unreliable at all times . It would be designed from the get-go to tyranscend its all times . It would be designed from the get-go to transcend its own unrreliability. All the nodes from computers in the network would be equal in status to all other nodes , each node with its own authority to originate , pass , and recieve messages. The messages would be divided into packets, each packet seperatly addressed. Each packet would begin at some specified source node , and end at some other specified destination node . Each packet would wind its way throug .....


Classification Analysis
Words: 565 / Pages: 3

.... see them. Many people can easily understand why the monitor is a form of output device since it is the screen that tells them what the computer is actually doing. Simply put, without a monitor, the computer itself is basically useless. Another form of output, which is rarely noticed by many computer users however, is the printer. Many people have probably used a printer before, but it is just that they never realize it is also a form of output. As opposed to 'output', 'input' consists of components that take in information from the users themselves so that the computer will know the tasks it is supposed to perform and accomplish. The key .....


Computers In Math
Words: 1114 / Pages: 5

.... x. y= 6x4+4x3-5x2+6x+4 First to start with developing the power's of x to perform the necessary multiplications by the coefficients, and finally produce the sum. The following steps are the way the computer "thinks" when it is calculating the equation. 1.Select x 2.Multiply x by x and store x2 3.Multiply x2 by x and store x3 4.Multiply x3 by x and store x4 5.Multiply x by 6 and store 6x 6.Multiply stored x2 by 5 and store 5x2 7.Multiply stored x3 by 4 and store 4x3 8.Multiply stored x4 by 6 and store 6x4 9.Add 6x4 10.Add 4x3 11.Subtract 5x3 12.Add 6x 13.Ad .....


Internet Censorship
Words: 1990 / Pages: 8

.... will not necessarily apply in this medium. There are no physical locations where communications take place, making it difficult to determine where violations of the law should be prosecuted. There is anonymity on the Internet and so ages and identities are not known this makes it hard to determine if illegal activities are taking place in regards to people under the legal age. As well, it is difficult to completely delete speech once it has been posted, Meaning that distributing materials that are obscene are banned becomes easy The American Library Association (ALA) has a definition that states censorship is “the change in the access status o .....


“Technology And The Library Perfect Together”
Words: 305 / Pages: 2

.... able to find the information in the card catolog because computers do go down. It is a nice combination. I’m glad we have a choice. Computers in the library are good for families who do not have computers at home. They can go online to do research, get help with homework, even send e-mail to family and friends you don’t get to see very often. It also helps people who are not comfortable with computers become aware of how easy and helpful they really are. You can do virtually anything on the computer. I can’t remember when we didn’t have a computer at home. A computer is a part of our everyday lives, but it s also nice to turn it off .....



« prev  33  34  35  36  37  38  39  40  41  42  next »

   Copyright 2024 EssayInn.com
   All Rights Reserved.
> Home Page > Join Now > Questions > Cancel > Contact Us