Research paper topics, free example research papers

Free research papers and essays on topics related to: byte

  • 40 results found, view research papers on page:
  • 1
  • 2
  • Artificial Intelligence - 1,853 words
    Artificial Intelligence As we get closer to the twenty-first century, we find that soon a computer will be another common household appliance. As the television was introduced in the 1950's, it soon became an essential part of everyday life. It is now found in every home and an importance source for entertainment and for gaining information. In the next couple of years, the same will be said for computer. It is fast becoming as essential part of our everyday life. With the Internet becoming an important resource for gaining information with the touch of a button. Yet, this is just the beginning of the computer age. We now use components from computers to run other household appliances such a ...
    Related: artificial, artificial intelligence, intelligence, twenty-first century, first century
  • Asynchronous Transfer Mode - 1,094 words
    Asynchronous Transfer Mode Asynchronous Transfer Mode: Asynchronous Transfer Mode By Gene Bandy State Technical Institute Asynchronous Transfer Mode: Asynchronous Transfer Mode(ATM) is a high-speed transmission protocol in which data blocks are broken into small cells that are transmitted individually and possibly via different routes in a manner similar to packet-switching technology. In other words, it is a form of data transmission that allows voice, video and data to be sent along the same network. In the past, voice, video and data were transferred using separate networks: voice traffic over the phone, video over cable networks and data over an internetwork. ATM is a cell- switching and ...
    Related: mode, transfer, york john wiley sons, fast ethernet, customer
  • Cable Modems: Cable Tv Meets The Internet - 3,872 words
    Cable Modems: Cable Tv Meets The Internet Cable Modems: Cable TV Meets the Internet John G. Shaw IS 3348 October 2, 1999 Abstract The Telecommunications Act of 1996 opened the way for cable TV (CATV) companies to become full-fledged telecommunications companies, offering two-way voice and data communications services, in addition to television programming. After passage of the Act, the cable companies were eager to expand into the new fields of business that had been opened to them, especially the rapidly growing Internet Service Provider (ISP) business. The biggest hurdle facing the cable companies is that cable television systems were designed for one-way traffic, and must be upgraded into ...
    Related: cable, cable modems, cable television, internet access, internet connection, internet service, internet service provider
  • Cable Modems: Cable Tv Meets The Internet - 3,910 words
    ... downstream traffic travels through the cable modem's Media Access Control mechanism. The MAC mechanism's functions are fairly complex. The MAC mechanism's main purpose is to implement MAC protocols under the direction of the CMTS. MAC protocols are used to time-share the cable media among the various cable modems in a cable data network. The MAC processes can be implemented in hardware, or a combination of software and hardware. Both the CMTS and the MAC mechanism implement MAC protocols to perform ranging procedures to compensate for cable media delays and line losses. The CMTS also interfaces with the MAC mechanism in each cable modem to assign upstream frequencies and upstream time s ...
    Related: cable, cable modems, internet access, internet connection, internet protocol, internet service, internet usage
  • Challenger - 2,433 words
    Challenger It was a cold, crisp, and damp morning on the Florida Space Coast as the space shuttle Challenger raced through the sky at speeds approaching mach 2 at an altitude of 104,000 feet when something went perilously wrong. All of America watched, including the family members of the seven doomed crew members, as Challenger exploded into an expansive ball of fire, smoke and steam. An "Oh. . . no!" came as the crews final utterance from the shuttle as the orbiter broke-up. As the reality of what she was seeing became apparent, Pilot Michael John Smiths daughter, 9 year old Erin Smith, could be heard yelling, "Daddy! Daddy! I want you, Daddy! You promised nothing would happen!" Unfortunate ...
    Related: challenger, shuttle challenger, advisory committee, central florida, apollo
  • Child Pornography On Internet - 1,276 words
    Child Pornography On Internet In this new age of Information, the Internet has made all types of information readily available. Some of this information can be very useful, some can be malicious. Child pornography, also known as Paedophilia is one of these problems. Any one person can find child pornography on the internet with just a few clicks of the mouse using any search engine. Despite webmaster's and law enforcement officials' efforts to control child pornography and shut down illegal sites, new sites are posted using several ways to mask their identity. The Internet provides a new world for curious children. It offers entertainment, opportunities for education, information and communi ...
    Related: child pornography, child sexual abuse, pornography, court case, search engine
  • Computer Crime - 1,406 words
    ... s seen in the $50-million-plus losses in the MCI case, a far greater threat to businesses than hackers are disgruntled and financially struggling employees. As internal theft from retail stores has always been many times greater in volume than theft from shoplifters, robbers, and burglars, theft by employees armed with inside information and computer access is and will continue to be a much larger problem than intrusion by hackers, crackers, and terrorists combined. By the turn of the century, 80% of Americans will process information as a major part of their employment, according to a United Way study. In addition, the future portends new and brighter for-profit invasion of business com ...
    Related: computer crime, computer security, crime, personal values, first century
  • Computer Engineering - 1,001 words
    Computer Engineering Computer technology has advanced dramatically over the past ten years. Technology has advanced from computers the size of a room that can only perform one particular task, to personal computers (PCs) that will fit on a desk and perform multiple tasks. Understanding computers and their programs and being able to apply that knowledge is very important in todays workplace. Engineering is a field that requires an extensive background in computer technology. Future engineers will benefit dramatically from having a strong background in computer technology. In order to understand why computers are important, we have to understand what a computer is and what it does. A computer ...
    Related: computer aided design, computer engineering, computer industry, computer technology, engineering
  • Computer Viruses - 789 words
    Computer Viruses The quote "The only truly secure system is one that is powered off, cast in a lead-lined room with armed guards and even then I have my doubts."(E.H. Spafford) of this report will explain how computer viruses have affected on society and the security of personal computers. There literally hundreds of viruses circulating for personal computers and many anti-viral packages that claim to remove the code from your computer. Some viruses are polymorphic; that is, they change with each infection in an attempt to avoid detection by anti-virus programs. As quickly as someone writes an anti-virus program, someone else writes a new virus that hides more successfully than in the past. ...
    Related: computer virus, computer viruses, computer world, personal computer, viruses
  • Computers And Finance - 1,763 words
    Computers And Finance Computers And Finance Computers have made financial bookkeeping much easier, and people no longer have to spend hours tracking investments or pay someone else to do their taxes. Moreover, the advancement in technology has allowed governments to cut back on the number of big companies and employees hired to process tax returns, resulting in the saving of millions of dollars. Although these advancements are extraordinary, they are not without their shortcomings. The IRS has had increased trouble in tracking fraudulent tax returns, and has had to revamp its detection system. The most surprising part of Microsoft's current purchase of Intuit, the maker of the Quicken line o ...
    Related: computer science, computer technology, computers, finance, personal finance
  • Convergence - 1,829 words
    Convergence TABLE OF CONTENTS Executive Summary 1 Introduction 2 Part I Business Factors 3 What is Convergence? 3 Toll Bypass 3 Utilization Getting Your Moneys Worth 3 Part II Technical Overview 4 Mixed-Media Requirements 4 Problems: - Delay 4 - Packet Loss 5 - Jitter 5 Network Technology 5 Voice over ATM 5 Voice over Frame Relay 6 Voice over IP 7 Inter-Vendor Support 8 H.323 8 Part III Implementations 10 Types of VoIP Implementations VoIP through a router 10 LAN Telephones 10 IP PBX 11 VoIP Gateway 12 Conclusion 13 Appendix A Works Cited 14 Illustrations Chart 1 Cost of International Voice Calls 3 Graph 1 Long 1-Way Voice Transmission 4 Chart 2 Summary of H.32x Standards 8 Picture 1 C ...
    Related: convergence, network layer, packet switching, network architecture, upgrading
  • Development Of Computers Over The Decades - 1,476 words
    DEVELOPMENT OF COMPUTERS OVER THE DECADES A Computer is an electronic device that can receive a set of instructions, or program, and then carry out this program by performing calculations on numerical data or by compiling and correlating other forms of information. The modern world of high technology could not have come about except for the development of the computer. Different types and sizes of computers find uses throughout society in the storage and handling of data, from secret governmental files to banking transactions to private household accounts. Computers have opened up a new era in manufacturing through the techniques of automation, and they have enhanced modern communication sys ...
    Related: computer crime, computer games, computer industry, computer networks, computers
  • Ecommerce Overview - 1,176 words
    ... o with the World Wide Web. However, I have made it number seven to make it clear that I think one should consider selling things on the Internet and the World Wide Web after one has done all the things above. Why? Well, the answer is complex but the best way to put it is, does one consider the telephone the best place to sell things? Probably not. One probably considers the telephone as a tool that allows one to communicate with one's customer, which in turn helps one sell things. Well, that's how I think one should consider the WWW. The technology is different, but before people decide to become customers, they want to know about one, what one does and what one can do for them. Which on ...
    Related: ecommerce, overview, home office, make sense, stream
  • Electronic Banking - 891 words
    Electronic Banking The Electronic Banking Association (EBA) is a non-profit organization established to do one simple thing-help more people get started with electronic banking. Here's why. Who taught you how to write paper checks? Probably your parent's right? Well, who's going to teach you how to write electronic checks? Probably NOT your parents. That's where they come in. E-banking is so much more convenient and so much quicker that everyone should know about it. The EBA was established as an independent source of helpful information about electronic banking for consumers and businesses. Financial institutions, merchants, and other financial service firms actually provide financial e-com ...
    Related: banking, personal financial, personal finance, financial management, commerce
  • Evolution Vs Creation - 756 words
    Evolution vs. Creation Evolution versus Creationism is a hot topic that is in constant debate among scientists and Christians. Held in high regard to the world of science, Evolution, is the theory that groups of organisms change with passage of time, mainly as a result of natural selection, so that descendants differ morphologically and physiologically from their ancestors. On the other hand, faith of millions of Christians hold the truth that, the act of GOD by which the whole entire world was brought into existence is where the basis of everything in existence today came from. In regards to the two arguments above, my entire ballot is supporting the views and ideas of the Creation theory. ...
    Related: creation theory, evolution, theory of evolution, natural selection, defense mechanism
  • Faustus: Renaissance Martyr Or Tragic Hero Faustus Died A Death That Few - 1,608 words
    ... re] hung up like monuments / Whereby whole cities have escaped the plague (1.1.20-21). He is bored with the study of law for this study fits a mercenary drudge / Who aims at nothing but external trash, / Too servile and illiberal to me (1.1.34-36). With theology, Faustus claims that he is dumbfounded by the loose translation of the quote from Romans 6:23, For the wages of sin is death. This final area is where the irony is greatly seen in the play. Throughout the play, Faustus is given the option to repent for these sins and turn back towards God. When the Good Angel and the Bad Angel appear to him throughout the play, both sides try to persuade Faustus that they are right. The Bad Angel ...
    Related: doctor faustus, dr. faustus, faustus, renaissance, tragic, tragic hero
  • File Sharing Systems - 4,218 words
    File Sharing Systems Universitt St. Gallen Hochschule fr Wirtschafts- Rechts- und Sozialwissenschaften ITM / MCM Wahlteil Neue Medien / Medienarchitektur Prof. Dr. Beat Schmid FILE SHARING SYSTEME P2P Von Philipp Brunner Hans Geiser Roman Hgg Stefan Kress Beat Meier Olivier Salamin Abgabetermin: 5. Dezember 2000 Inhaltsverzeichnis Einfhrung Seite 3 1. Theoretische Grundlagen 3 1.1. Netzarchitekturen 3 1.1.1. Client Server 3 1.1.2. Peer to Peer 4 1.1.3. Verzeichnisserver 4 1.2. Netzwerkprotokolle / TCP/IP 4 1.2.1. Transmission Internet Protocoll 4 1.2.2. Internet Protocoll 5 1.2.3. TCP/IP ist das Internet 6 1.2.4. IP Adressierung 6 1.3. Proxyserver 7 2. Fallbeispiele 8 2.1. MP3 8 2.1.1. Allg ...
    Related: file, file sharing, sharing, information center, local area network
  • History Of The Coputer - 2,118 words
    History Of The Coputer COMPUTER Generally, a computer is any device that can perform numerical Calculations --even an adding machine, an abacus, or a slide rule. Currently, however, the term usually refers to an electronic device that can use a list of instructions, called a program, to perform calculations or to store, manipulate, and retrieve information. Today's computers are marvels of miniaturization. Machines that once weighed 30 tons and occupied warehouse-size rooms now may weigh as little as three pounds (1.4 kilograms) and can be carried in a suit pocket. The heart of today's computers are integrated circuits (ICs), sometimes called microchips, or simply chips. These tiny silicon w ...
    Related: history, different types, military training, personal computer, byte
  • Java Vs C - 1,235 words
    Java vs. C++ subject = Freshman title = Java vs. C++ Since their inception, computers have played an increasingly important role in todays society. Advancements in technology have enabled computers to become faster and cheaper. Today, the majority of families own a home computer that is vastly more powerful than giant mainframes of years gone by. Computer hardware has been evolving rapidly with no end in sight, and with all of the advancements in computer hardware come advancements in computer software; gone are the days when FORTRAN and COBOL were the languages of choice. Today,vvv two hot new object oriented programming languages have entered the computer programming arena, Java and C++, t ...
    Related: java, important role, program design, programming language, circle
  • Network Management - 1,167 words
    ... etwork). (Stallings, 213) The largest problem with SNMP, ironically enough, is the same thing that made it great; its simple design. Because it is so simple, the information it deals with is neither detailed, nor well organized enough to deal with the growing networks of the 1990s. This is mainly due to the quick creation of SNMP, because it was never designed to be the network management protocol of the 1990s. Like the previous flaw, this one too has been corrected with the new version, SNMPv2. This new version allows for more in-detail specification of variables, including the use of the table data structure for easier data retrieval. Also added are two new PDUs that are used to manipu ...
    Related: management, management information, network, network management, security measures
  • 40 results found, view research papers on page:
  • 1
  • 2