Papers on Computers & Technology
Video Cards
Words: 2882 - Pages: 11.... video cards have been introduced to the market recently. In
the past, the video card could only deliver two dimensional graphics which were
only in low resolution. However, there has now emerged as a result of high
resolution three dimensional graphics technology. This paper will discuss why
the video card nowadays can process high resolution three dimensional graphics,
but why the video card in the past could only process low resolution two
dimensional graphics. The explanation will be based on some recently developed
video cards such like Matrox Millenium. This paper will also discuss how the 3D
graphic displays on a 2D monitor. La .....
Download This Paper
|
Freedom Of Speech & Censorship On The Internet
Words: 2293 - Pages: 9.... is not the only material to be found on the net which can raise questions of censorship and control: discussion of racial, political, religious and sexual topics all run the risk of offending someone, somewhere, leading to demands for control of the Internet. The question of censorship may also be raised in some unexpected places: one newsgroup is the rec.humor list, which is a collection of jokes submitted to subscribers. There are straightforwardly rude jokes but others are politically incorrect, focusing on sexual stereotypes, mothers-in-law, women and so on. It has been suggested (Interpersonal Computing and Technology, 1994) that discr .....
Download This Paper
|
The Origins Of The Computer
Words: 993 - Pages: 4.... architectural revolution brought about by the Romans required two
innovations: the invention of a new building method called concrete vaulting and
the organization of labor and capital on a large scale so that huge projects
could be executed quickly after the plans of a single master architect.
Roman concrete was a fluid mixture of lime and small stones poured into
the hollow centers of walls faced with brick or stone and over curved wooden
molds, or forms, to span spaces as vaults. The Mediterranean is an active
volcanic region, and a spongy, light, tightly adhering stone called pozzolana
was used to produce a concrete that was both light .....
Download This Paper
|
The Future Of Security
Words: 368 - Pages: 2.... institution as long as the creditor has the account number.
Purchases will be made by debiting the account upon comparing the customer’s retina scan with the one in the database of the account owner and making sure the funds are available to cover the entire purchase. If the purchase is approved the account will be debited in real-time. Transactions can be denied for lack of funds, retina scans not matching, the person has missed a court date or is wanted by the government for questioning or committing a crime. If the transaction is denied, the reason is displayed on the cashier’s screen and security is immediately notified i .....
Download This Paper
|
Linux Operating System
Words: 998 - Pages: 4.... this Linux has the potential to be more attractive to a larger number of users and a larger variety of users. (Linux.com)
Linux has a powerful security system. It is almost impossible to write a virus for Linux because it must be 30-40 MB. Also, it has firewall system to protect the network from hackers. This minimizes the number of viruses capable of affecting a Linux system. If we think about it, there are many viruses for Windows that can harm your system. Linux is a stable Operating System. You can kill an individual process that is not replying with kill command vs. shutting down your system in Windows. Linux has true multitaski .....
Download This Paper
|
Battle Of Computer Bytes
Words: 1008 - Pages: 4.... on it.
Some improvements are the ability to work with folder icons that represent directories and subdirectories in DOS. Windows 95, unlike the Mac, logically groups data and resources. A Taskbar menu lets you call up and switch between any software application at any time. Thus feature is better than the Mac's because its use is more obvious. It clearly shows what is running and allows you to switch programs with a single click of the mouse. Control panels have been added so you can configure your hardware. There is easy access to frequently used files. You can make very long file names on Windows 95 instead of short and strange names th .....
Download This Paper
|
The Computer And Mass Communication
Words: 4603 - Pages: 17.... There are more than 500 million phones in the world, and if I knew the number and were willing to pay the bill, I could reach any of them. And as I do my work, I almost always have the radio on, picking a station from dozens of possibilities of broadcast entertainment and news. There is an astonishing electronic information infrastructure surrounding me - surrounding us all.
But the electronic part of the information infrastructure is only a tiny fraction of what's available to me. Every morning the newspaper is thrown into the driveway. The paper is an amazing achievement, more than one hundred pages of news, data, photographs, and advertis .....
Download This Paper
|
Interactive Television
Words: 1410 - Pages: 6.... individual
viewer without distractions. It also requires the user to remain indoors
for long periods of time which people don't like to do. Human beings are
social animals. It is this fact that will keep them from being glued to
their television sets. Clearly these factors will not allow interactive
television to overtake the American home.
So what exactly is interactive television and what does it do?
Interactive television is the ability literally to interact with the
television set just like we do with a home computer on the Internet. With
the advent of fiber optics and satellite communications, the communications
industry will be .....
Download This Paper
|
Hacking To Peaces
Words: 1293 - Pages: 5.... tackle this question, people have to know what a hacker is. The
connotation of the word 'hacker' is a person that does mischief to computer
systems, like computer viruses and cybercrimes. "There is no single widely-used
definition of computer-related crime, [so] computer network users and law
enforcement officials must distinguish between illegal or deliberate network
abuse versus behavior that is merely annoying. Legal systems everywhere are
busily studying ways of dealing with crimes and criminals on the Internet"
(Voss, 1996, p. 2).
There are ultimately three different views on the hacker controversy. The
first is that hacking .....
Download This Paper
|
The Internet
Words: 457 - Pages: 2.... charge for membership. In my opinion a good company
to subscribe to is one that offers a flat rate.
In order to access the internet you require a good computer and a
powerful modem . If you have these it is much easier and faster to "Surf the
Net". I would recommend a 28.8 kbs modem manufactured by U.S Robotics.
The Internet can give you access to both legal & illegal sites on the
net. There is pirated software e.g. full version of games that you can access
without actually paying for them.
The internet can only be accessed with a browser. There are a few web
browsers but two main ones are Netscape Navigator and Internet Explorer. .....
Download This Paper
|
Navigate:
« prev
4
5
6
7
8
next »
|
|
Members |
|
|
|