|
Essays on Computers
Title: Is Your Information Safe?
Details: Words: 1521, Pages: 6... in today's technologically oriented
world could function without computers. Personal computers are linked to
business computers and financial networks, and all are linked together via the
Internet or other networks. More than a hundred million electronic messages
travel through cyberspace every day, and every piece of information stored in a
computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank
robbers have become today's computer hackers. They can walk away from a computer
crime with millions of virtual dollars (in the form of information they can use
or sell for an enormous profit). Walking away is precisely what they do. The
National C ...
|
Title: Ultrasonic Radar For A Home PC System
Details: Words: 2068, Pages: 8... a computer with microsoft's
quick basic, or a Macintosh, and space (equivalent to that of a coffee-pot)
to spare. Ultrasonic radar is now a small component for your computer,
giving computer operators a chance to see low flying objects, household
furniture, and even themselves on their PC screen. Just to impress a
neighbour or friend is reason enough to build your own ultrasonic radar
station.
Similar to that of a Polaroid, ultrasonic transducers are used in this
type of radar. A rangefinder emits a brief pulse of high frequency sound
that produces an echo when it hits an object. This echo returns to the
emitter where the time delay is measured and thus the ...
|
Title: What Is A GDSS?
Details: Words: 788, Pages: 3... basic configurations; the single-computer, software only, the single-computer and keypad response system, and the multiple computer / workstation network system (Donelan, 1993). Each with its corresponding unique architecture provides solutions to existing problems within the group dynamic at varying costs.
To provide a better view of what each of the three architectures of GDSS's can provide, a brief description of each follows:
The single-computer, software only system is the simplest and cheapest form of a GDSS. The system consists of a single computer running specialized GDSS software. The group involved in the decision making process can view all that is dis ...
|
Title: Software And High School
Details: Words: 609, Pages: 3... First and foremost is the fact that computer software is a very
important educational tool. Students in high schools experience computers for
the first time through games and other entertaining software. These help develop
youth's mental pathway in the way of logic, reflexes and the ability to make
quick and concrete decisions [Lipcomb, 66]. The next step requires them to think
more seriously about the machines. Secondary students learn the first steps in
computer programming by creating simple programs. Here, the assistance of useful
software is necessary. The computer software has many applications in the real
world and is found virtually everywhere. ...
|
Title: Setting Up A Computer Network
Details: Words: 1042, Pages: 4... is sufficient because you don’t necessarily need a fast network. If you are not going to be connected to the Internet and your network is only going to be used for office work, coax is fine. The two types of coax that we will be using are RG-8 (thick) and RG-58 (thin). The RG-8 will be used as a backbone cable of the network this backbone cable is necessary because we will be using a bus topology on this network, which physically consist of a single cable (backbone) with multiple nodes attached to it. The RG-58 will not be attached to the backbone directly because there are too many computers to be attached to each other. We also understand that you have 40 comput ...
|
Title: Essay On Hacking
Details: Words: 580, Pages: 3... why when you want to go to a website you have to
type http://name of site.com? well I have been wondering for ages but still
can't figure out, but sometimes you type ftp:// before the name of the site.
This simply means File transfer protocol. You use this when download image
files or any other files. Now, onto hacking. Most people stereotype people
simply as "HACKERS," but what they don't know is that there are three different
types of computer whizzes.
First, there are hackers. Hackers simply make viruses and fool around
on the internet and try to bug people. They make viruses so simple. The get
a program called a virus creation kit. This program ...
|
Title: Linux Operating System
Details: Words: 998, Pages: 4... to a larger number of users and a larger variety of users. (Linux.com)
Linux has a powerful security system. It is almost impossible to write a virus for Linux because it must be 30-40 MB. Also, it has firewall system to protect the network from hackers. This minimizes the number of viruses capable of affecting a Linux system. If we think about it, there are many viruses for Windows that can harm your system. Linux is a stable Operating System. You can kill an individual process that is not replying with kill command vs. shutting down your system in Windows. Linux has true multitasking properties. You can run up to twelve processes at the same time with no ...
|
Title: Artificial Intelligence
Details: Words: 2749, Pages: 10... to determine additional areas where artificial
intelligence technology may be applied for positive identifications of
individuals during financial transactions, such as automated banking
transactions, telephone transactions , and home banking activities. This study
focuses on academic research in neural network technology . This study was
funded by the Banking Commission in its effort to deter fraud.
Overview
Recently, the thrust of studies into practical applications for artificial
intelligence have focused on exploiting the expectations of both expert systems
and neural network computers. In the artificial intelligence community, the
proponents of expert syst ...
|
Title: Even From It's Humble Beginnings, The Internet Has Always Been A Battlefield Between Phreaks And Administrators
Details: Words: 1773, Pages: 7... sex-ridden slums. It has the upstanding
citizens, and it has the criminals. On the Net, crime is more abundant
than in a large city, though, mainly because of the difficulties in
tracking and prosecuting offenders. Even from its beginnings, the Internet
has always been a battlefield between phreaks and administrators.
The Internet hasn't always been a public forum. In fact, the Internet has
been around for years. The Internet is just a new fad ("The More I Learn"
A1). The Internet originally began as DARPANET, a government-created
network, which was designed for defense communications. The Net structure
is such that it could survive a nuclear war ("Intern ...
|
Title: Virtual Reality: What It Is And How It Works
Details: Words: 3163, Pages: 12... Leary became interested in VR. This has also
worried some of the researchers who are trying to create very real
applications for medical, space, physical, chemical, and entertainment
uses among other things.
In order to create this alternate reality, however, you need to find
ways to create the illusion of reality with a piece of machinery known as
the computer. This is done with several computer-user interfaces used
to simulate the senses. Among these, are stereoscopic glasses to make
the simulated world look real, a 3D auditory display to give depth to
sound, sensor lined gloves to simulate tactile feedback, and head-
tracke ...
|
Browse:
« prev
32
33
34
35
36
37
38
39
40
41
next »
|