Papers On Internet & Related Issues
Page 31 of 53
|
|
Microsoft Windows NT and Local Area Networks
[ send me this paper ]
This 4 page paper provides an overview of the architecture, standards and current use of the Microsoft Windows NT as it pertains to use in LANs, local area networks. This paper also considers the future application of MS Windows NT. Bibliography lists 9 sources.
Filename: MHntlan.wps
Microsoft's Palladium Initiative
[ send me this paper ]
11 pages in length. In a confident and comprehensible attempt to combine Microsoft Windows features, personal computing hardware, and software applications that provide for "greater security, personal privacy and system integrity" (Carroll et al, 2003), Microsoft's Palladium is being implemented as Windows "next-generation secure computing base" (Carroll et al, 2003) with an evolutionary features composition readily combinable with a new hardware and applications, providing groups and individuals alike with the ability to obtain the three aforementioned objectives. Bibliography lists 9 sources.
Filename: TLCPallad.rtf
Multiculturalism and the Internet
[ send me this paper ]
This 5 page paper looks at reasons why it is good to have many multicultural resources on the Internet as well as to provide many examples of what already exists. The other side is also discussed, which suggests that multicultural overload is not good. Bibliography lists 10 sources.
Filename: SA146net.rtf
Music in Postmodern Times
[ send me this paper ]
This 5 page paper takes a look at the music industry and how it has changed as a result of technological advances. Napster and Farmclub are highlighted in this paper that focuses on changes effected as a result of the computer. Bibliography lists 4 sources .
Filename: SA109Nap.wps
Napster vs. the Record Companies
[ send me this paper ]
A 10 page research paper that examines the latest legal difficulties of the online phenomenon, Napster, and how this new technology is fundamentally changing the record industry. Bibliography lists 15 sources.
Filename: khnapter.wps
Natural Language Searching
[ send me this paper ]
This5 page paper looks at the definition, use, and development of natural language searching. When compared with other search methods such as Boolean searches this has proven to be more accurate as well as more popular, the reasons for this are discussed as well as its disadvantages. The future of natural language searching is also considered. The bibliography cites 4 sources.
Filename: TEnatlan.wps
Negative Social Impacts of the Internet on Society
[ send me this paper ]
This 5 page
report discusses the many ways in which the Internet is not the
�connection point� many claim it to be and is actually eroding
many of the most fundamental aspects of social interaction.The
Internet has been praised as modern humanity�s newest channel of
meaningful communication and vilified as nothing more than the
newest commercial channel for meaningless advertising. Both
statements are relatively justifiable. Bibliography lists 5
sources.
Filename: BWintneg.wps
Network Congestion Control
[ send me this paper ]
This 10 page paper takes a look at network congestion and remedies to alleviate it. The paper is broken down into various sections such as applications, configurations and technology in order to explore these topics individually while addressing the problem of congestion as a whole. Bibliography lists 8 sources.
Filename: SA039IT.wps
Network Protocols
[ send me this paper ]
This 15 page paper provides a glossary of network protocols such as IP, TCP/IP, HTTP and 17 others. The concept of protocols is also discussed. The bulk of the paper provides specific information on the various protocols used in networking situations, mostly involving the Internet. Bibliography lists 18 sources.
Filename: SA250net.rtf
Network Security
[ send me this paper ]
This 18 page paper considers the usage of computer networks and the security threats they may face. The paper considers physical threats as well as virtual threats such as viruses and the problems of hackers with tools such as peer to peer connections are also discussed as well as the way in which these may be dealt with. The paper then ends with considers the possible future of network security. The bibliography cites 25 sources.
Filename: TEnetsec.wps
The Paper Store Enterprises, Inc. Gladly Accepts:
Request A Free
Excerpt From Any Paper Before Ordering!
|