Javascript is disabled. Please enable it for better working experience.

Term Papers on Computer

High school and undergraduate students in computer sciences are often required to submit term papers for each subject. In order to assist these students, Researchomatic provides one of the biggest consumer bases in the online library market with its term papers on computer sciences and related fields to support and assist students in getting quality literature. Computer students from all around the world can access these term papers for inspiration.

Computers In The Future
Computers in the Future Computers in the Future Introduction The use of computers in various areas of life has been continuously evolving, and is expected to evolve further in future. This paper focuses on the area of mind reading. Mind reading technologies have become an interesting area of interest over the period ...
Thin Client Computing
Thin Client Computing Thin Client Computing Introduction In this paper we present and make known the Thin Client technology (Thin client computing) giving an overall view. The Client computing is a concept used daily in business and this concept are based on the client / server however it needs to centrally manage ...
Web Accessibility
WEB ACCESSIBILITY Web Accessibility Web Accessibility Introduction The Web Accessibility is the issue of access to online content and services for disabled and elderly . Defined by standards techniques established by the Web Accessibility Initiative (WAI) World Wide Web Consortium (W3C), it requires treatment throughout the lifecycle of a website , for ...
PROGRAMMING Data structures and algorithms Table of Contents Data Structure4 Array4 Heap4 Stack5 Queue5 Deque6 Ring Buffer6 Linked List7 Double Linked List7 Graph8 Hash Table9 Binary Tree10 Red-Black Tree10 Priority Queue10 B-Tree11 Directed Graph11 Weighted Graph12 Algorithms:12 Depth-first search,12 Breadth-first ,12 Dijkstra's algorithm,13 Floyd-Warshall algorithm,14 Ford-Fulkerson,14 Heap Sort,14 Basics15 Example:15 Shell Sort,15 Quick Sort,16 Radix Sort,16 Bucket Sort,17 Selection Sort,17 Merge Sort,18 Bubble Sort,18 Binary Search,19 Greedy Algorithm,19 Brute Force Algorithm,19 Divide and Conquer,20 Fibonacci search technique,20 Monte Carlo methods,20 Alpha-beta pruning21 Data structures and algorithms Data Structure Array It is a linear ...
Dos Prevention
DoS PREVENTION Denial of Service Attacks and Their Prevention Abstract Denial of Service (DoS) attack is made on networks, organizations, and systems on the internet. DoS attacks are a serious threat to internet security as they use the valuable information from the client's IP, which has been used in attacking packets. This ...
Virtualization Introduction The driving force behind the service oriented architecture approach is that organizations do not want to give up the functions they have already used for decades from the legacy systems. Instead of developing these already well-defined and deployed functions again from scratch for the new platform, they are transitioning to, ...
Forensic Tool- Sleuth Kit
FORENSIC TOOL- SLEUTH KIT Forensic Tool- Sleuth Kit Forensic Tool- Sleuth Kit Tool Definition The Sleuth Kit (TSK) is a library and collection of command line tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can ...
1 - 7 of 7 Go To Page 1