Live chat

Research paper topics, free example research papers

Free research papers and essays on topics related to: computer system

  • 100 results found, view research papers on page:
  • 1
  • 2
  • 3
  • >>>
  • A Look At Public Key Encryption - 1,210 words
    A Look at Public Key Encryption Encryption is the process of disguising information by transforming plain text into gibberish, or ciphertext, which cannot be understood by an unauthorized person. Decryption is the process of transforming ciphertext back into plaintext that can be read by anyone. Example of encryption can be found in history, for example in the era of the Cold War, the Solviet Union and the United States would send electronic messages to one military point to another, encrypted. If the enemy intercepted the message, they would have to crack this message to get the information. Typically when governments used encryption they used a very complex method of encrypting messages. E ...
    Related: data encryption, encryption, national security, major problem, essence
  • Ai Edge Of Excellence - 1,012 words
    Ai - Edge Of Excellence Running head: The Edge of Excellence The Edge of Excellence Kathleen P. Munn Community College of Philadelphia Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing professionals? Medical facilities, police departments, and manufacturing plants have all been changed by AI but how? These questions and many others are the concern of the general public brought about ...
    Related: edge, excellence, computer system, running head, massachusetts
  • Air Traffic Strike - 4,375 words
    Air Traffic Strike The Pressures of PATCO: Strikes and Stress in the 1980s By Rebecca Pels -------------------------------------------------- ---------------------- Note on electronic format: you can access any citation by clicking on the note number. In order to leave citations and return to the main text of the document, press the Back key on your viewer. -------------------------------------------------- ---------------------- On August 3, 1981 almost 13,000 air traffic controllers went on strike after months of negotiations with the federal government. During the contract talks, Robert Poli, president of the Professional Air Traffic Controllers Association (PATCO), explained the union's th ...
    Related: strike, traffic, traffic control, traffic controllers, aviation safety
  • Aviationaerospace Psychology - 1,361 words
    Aviation/Aerospace Psychology Eastern Flight 401 What really happened! By For Aviation/Aerospace Psychology MAS 634 Embry-Riddle Aeronautical University Extended Campus Fort Rucker, Alabama Resident Center March 2000 The following National Transportation Safety Board (NTSB) abstract indicates only one of the many reasons for the actual crash. Date: December 29, 1972 Type: Lockheed L-1011 Registration: N310EA Operator: Eastern Airlines Where: Miami, FL Report No. NTSB-AAR-73-14 Report Date: June 14, 1973 Pages: 45 An Eastern Air Lines Lockheed L-1011 crashed at 2342 eastern standard time, December 29, 1972, 18.7 miles west-northwest of Miami International Airport, Miami, Florida. The aircraft ...
    Related: psychology, international airport, health problems, miami florida, faulty
  • Block Buster - 1,028 words
    Block Buster BLOCKBUSTER ENTERTAINMENT David P. Cook created the first Blockbuster Video store in October 1985 in Dallas, Texas. Mr. Cook intended to establish video superstores that would respond to the on going trends in the video industry during the 1980's because the number or households buying VCRs was increasing very much and so was the number of film titles. He wanted to create a store that would respond to the customer's needs such as: nice facilities, wide selections of videos, fast service, and convenience. A computer system was developed so that the company was able to track specific demographic data, customer's renting patterns, and the number of times a cassette has been rented, ...
    Related: block, block buster, buster, business world, executive officer
  • Business Information Systems - 2,279 words
    ... ally, you run two programs: the first program automatically attaches a vendor name to all of your items that require purchase orders in a few seconds. The second program takes all of these items, consolidates individual purchase orders by vendor, and creates purchase orders for many items almost instantly. COMPUTER REQUIREMENTS All our products are written in Visual FoxPro and are IBM compatible. At this time we do not offer Macintosh support. Macintosh products are expected to be released third quarter of this year. Absolute minimum requirements would be a Pentium class processor with the following:  32 MB RAM  VGA monitor  Mouse  Printer supported by Win ...
    Related: business information, business solutions, computer system, information systems, operating systems
  • Canterbury Tales - 2,175 words
    Canterbury Tales Throughout history all different parts of the world have been devastated by natural disasters. Whenever something created by nature destroys a certain area of the world, people tend to group together and overcome such a tragedy. Our tale will begin in one of the busiest and diverse places in the world, New York City. The month was September and the day started off a bit chilly for an early fall day and the wind was blowing hard. Warnings had been posted for possible hurricane conditions, and the city had become a frenzy of activity. Some were busy preparing for a possible devastating hurricane and gathering supplies while others were going about their daily routine unaffecte ...
    Related: canterbury, canterbury tales, high school, more work, passing
  • Challenges Of Small Businesses - 1,152 words
    Challenges of small businesses Growth in the small and medium business in Canada and other developed countries has been very significant. This sector of the business community now represents about 40 percent of GDP and accounts more than half of total employment. Today small businesses are more diverse and more vigorous than ever, but they also faces newer and more challenges or inhibitors to their growth than their older conter parts. This research will attempt to find the answer to the following hypothetical question: What are the barrier to entry, inhibitors to growth, and detriments to the health of small business and entrepreneurship today? Access to capital and credit at various stages ...
    Related: small business, small businesses, small firms, business transactions, home depot
  • Check Proceeding - 710 words
    Check Proceeding Checks are written everyday at almost every place of business. At age 18 anyone with the adequate amount of money can open a checking account of his or her own. One aspect of checking account functions that many account owners are not familiar with is the processing of their checks after they have been written. When grocery shopping at a place such as Winn Dixie the customer many times thinks to his or herself whether he or she should pay cash, charge it, or pay for the purchase with a check. He or she may ponder this question in their mind all the way to the check out counter. When the customer makes the decision to pay for the merchandise with a check, a long process is st ...
    Related: check, proceeding, computer system, phone number, shopping
  • Cisco - 1,789 words
    Cisco Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Cisco operates in one industry segment and creates hardware and software solutions that link computer networks so that people have easy access to information without regard to differences in time, place or type of computer system. Networking is a multi-billion dollar global market whose growth is spurred by the belief that the Internet is changing the way we all work, live, play and learn. Over the last year, there has been a key shift in the role of the Internet and in how the Internet is perceived. What was once a fairly complex tool used by an elite group of highly technical individuals is now a technology d ...
    Related: cisco, cisco systems, customer service, network design, 1984
  • Computer Based Systems - 919 words
    Computer Based Systems The system Development Cycle What is it? The system development cycle is a method used to create a system where none has existed before and/or modify an existing system. It is sometimes simply called System Development. It involves a number of stages representing a standard strategy for taking a problem from start to finish. Two approaches: 1. Conservative-working systematically through the steps. 2. Radical-Cycling through the cycle several times until the final result is achieved. The Steps The above diagram shows that the system development cycle is represented by 5 broad stages: -Requirements Definition. -Analysis. -Design. -Implementation. -Operation and Evaluatio ...
    Related: based systems, computer system, system analysis, system development, analysis report
  • Computer Crime - 867 words
    Computer Crime Computer crime is a very broad term. It could mean anything from a total invasion by a hacker into the federal government or just the simple fact of one person letting another borrow a copy of his favorite flying game. Computers are defined in the dictionary as a machine that computes (WBD vol. 23). But to most people it is a machine that's helps us do a task easier. As we move into the 21th century though one thing is for sure, the computer will help crime become more prevalent. Hackers are probably one of the more common threats out there. These are the people who use modems and telephone lines to enter your computer. A teenager sits across the table yelling, "I want this an ...
    Related: computer crime, computer piracy, computer security, computer system, computer viruses, crime
  • Computer Crimes - 559 words
    Computer Crimes Computer crime is any illegal act which involves a computer system whether the computer is an object of a crime, an instrument used to commit a crime or a repository of evidence related to a crime. Telecommunication crime is the fraudulent use of any telephone, microwave, satellite or other telecommunications system. Many telecommunications systems themselves are computers and therefore in some instances, offences against a telecommunication system can also be considered a computer crime. Computers and telecommunications have become a critical part of the daily lives of Canadians, and criminals have also been able to take advantage of this technology. The Royal Canadian Mount ...
    Related: computer communications, computer crime, computer security, computer system, computer systems, crime investigation, organized crime
  • Computer Crimes - 1,159 words
    Computer Crimes Computer crime started in the early 1970s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a computer system. These are the people that usually steal data and cause data loss by vandalism. The most common kind of computer crime is espionage committed by people who work for a company, but this is also the one that you rarely hear about. They usually enter false data that will end up making money for them. Hackers are the worlds new bread of criminals and will soon pose a major threat to the U.S. Because America has become largely a computer society everyone is at risk, experts say, and should protect information ab ...
    Related: computer crime, computer system, computer virus, crime data, exchange commission
  • Computer Engineering - 530 words
    Computer Engineering Computer Engineering Andrew Winegarner Ms. Lee English 3-4, Block 2 2/11/99 Andrew Winegarner Ms. Lee English 3-4, Block 2 11 November 1999 Computer Engineering Computer engineering is a relatively new field of engineering and is one of the fastest growing fields today. Computer engineering is one of todays most technologically based jobs (Basta 71).The field of computer engineering combines the knowledge of electrical engineering and computer science to create advanced computer systems. Computer engineering involves the process of designing and manufacturing computer chips processors, memory systems, central processing units, and of peripheral devices . Computer enginee ...
    Related: computer aided design, computer company, computer engineering, computer games, computer industry, computer languages, computer science
  • Computer Fundermentals - 1,723 words
    ... from the inside, as there are less sectors. When it is reading from the outside there are more sectors so the disk does not have to spin as fast. The storage and retrieval of data interacts in many ways. In most instances computerised data is obtained from paper based information. An example of this is the wages system. On a daily basis, a member of the management team would verify that staff has attended work and take note of the hours, unless there is a clocking in machine. At the end of the week, the total hours worked by each employee would be calculated along with any overtime and bonus. This information is then entered into the organisations computer system. When this task is compl ...
    Related: computer crime, computer skills, computer system, computer systems, computer viruses, personal computer
  • Computer Hacker - 1,626 words
    Computer Hacker Laws must be passed to address the increase in the number and types of computer crimes. Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today's society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office. People commit computer crimes because of society's declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today's non-professional thi ...
    Related: computer crime, computer games, computer program, computer security, computer system, computer world, hacker
  • Computer Hackers In Todays World Are Becoming More Intelligent They Are Realizing That People Are Developing More Hackproof S - 1,373 words
    Computer hackers in today's world are becoming more intelligent. They are realizing that people are developing more hack-proof systems. This presents the hackers with a bigger challenge, which brings out more fun for them. The government is realizing this and needs to make harsher laws to scare the hackers more. With the increase in hacking and hacker intelligence, governmental regulation of cyberspace hasn't abolished the fact that it's nearly impossible to bring a hacker to justice. Kevin Mitnick, a hacker who has yet to have a harsh punishment when caught, can somehow lower his punishment for his hacking crimes down to a couple months probation. When Kevin was seventeen, he was caught for ...
    Related: computer applications, computer fraud, computer skills, computer system, intelligent, realizing
  • Computer Hacking - 1,606 words
    Computer Hacking As the world becomes more and more reliant on computers the computer hacking industry is greatly rising. With people such as Kevin Mitnick, who is known as a computer terrorist (Kjochaiche 1), computerized information isn't safe any more. Kevin is known as the most high-profiled computer criminal and responsible for more havoc in the computer world today.(1) He considered this a fun and easy task. He got caught and thrown into prison, but once he got out nothing changed. Kevin stated that as long as the technology is there it just calls to people to break into it. Computer hackers usually start off young, thinking that it is nothing but a little harmless fun. But as they get ...
    Related: computer hacking, computer system, computer viruses, computer world, hacking
  • Computer Hacking Thesis - 288 words
    Computer Hacking Thesis Introduction: Hacking is very well-know way of crashing a computer system. Listed below is some information on the problems caused by hacking and some solutions of how to stop hacking. Thesis: Hacking has become such a problem in today's computer dependent society that stronger measures must be implemented to stop hackers, and if hackers are still successful, they should be severely punished. I. Hackers are a problem because... A. With the amount of businesses and corporations we depend on every day, we can't have hackers breaking in our systems because it causes so many problems with peoples jobs, and sometimes can cost us lots of money. B. So many people rely on com ...
    Related: computer hacking, computer system, hacking, thesis, problems caused
  • 100 results found, view research papers on page:
  • 1
  • 2
  • 3
  • >>>