Papers on Computers & Technology
Digital Cameras
Words: 441 - Pages: 2.... way than capturing the images directly to a digital format. Second, do away with film and processing costs, which would make up the price difference over the life of the camera. Last, since it doesn’t cost anything to take a photograph picture with a digital camera, and most models let you view and erase pictures on the spot, you save money buy getting rid of those unwanted pictures before they are processed.
For example: you could take a picture from 5 different angles, select the best one, and delete the rest.
all come with built-in memory that stores the photos you take until you can download the photos to your computer. When .....
Download This Paper
|
Computer Protection
Words: 2497 - Pages: 10.... hazard is one of the causes of destroying the data in the
computer. For example, send a flood of coffee toward a personal computer. The
hard disk of the computer could be endangered by the flood of coffee. Besides,
human caretaker of computer system can cause as much as harm as any physical
hazard. For example, a cashier in a bank can transfer some money from one of his
customer's account to his own account. Nonetheless, the most dangerous thief are
not those who work with computer every day, but youthful amateurs who experiment
at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for
classmat .....
Download This Paper
|
Communication Over The Internet, And The Effects It Will Have On Our Economy
Words: 806 - Pages: 3.... from the local phone company.
· How logging on the internet is almost like logging right onto the local
telephone company.
-It all boils down to, the local phone company approving the use of the internet
for any means.
· How phone companies are going to bring them selves down.
-I feel that because of this phone companies will be the cause to their own
downfall.
· Methods of communication over the net
-There are many ways of communicating over the net: Inter relay chat (text only)
-Video/Audio: there are many net applications which allow the user to simply
plug in a mini video camera( which can be purchased anywhere from $150+) an .....
Download This Paper
|
Protecting A Computer
Words: 2495 - Pages: 10.... Physical hazard is one of the causes of destroying the data in the computer.
For example, send a flood of coffee toward a personal computer. The hard disk
of the computer could be endangered by the flood of coffee. Besides, human
caretaker of computer system can cause as much as harm as any physical hazard.
For example, a cashier in a bank can transfer some money from one of his
customer's account to his own account. Nonetheless, the most dangerous thief
are not those who work with computer every day, but youthful amateurs who
experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as studen .....
Download This Paper
|
A Computerized World
Words: 573 - Pages: 3.... will be a safer, faster,
and more comfortable way to travel.
Another new area, called "virtual reality" is currently being tested. This
is a way to simulate reality on a monitor. In order to feel this so-called
reality you have to wear special electronic glasses and an electronic suit.
Fastened to the suit are sensors, which send information to the main
computer. This computer works with the data and displays them on the
electronic spectacles. This is a technique which use three-dimentional
views, therefore the scenery seems incredibly realistic. If you want to be
a boxer, simply change the scenery on the main computer, and you are in th .....
Download This Paper
|
All About Disk Geometry And The 1024 Cylinder Limit For Disks.
Words: 1103 - Pages: 5.... for the Linux kernel and for fdisk.
Below a rather detailed description of all relevant details.Note that I used
kernel version 2.0.8 source as a reference.Other versions may differ a bit.
2.Booting
When the system is booted, the BIOS reads sector 0 (known as the MBR - the
Master Boot Record) from the first disk (or from floppy), and jumps to the code
found there - usually some bootstrap loader.These small bootstrap programs found
there typically have no own disk drivers and use BIOS services.This means that a
Linux kernel can only be booted when it is entirely located within the first
1024 cylinders.
This problem is very easil .....
Download This Paper
|
The Telephone
Words: 317 - Pages: 2.... did the
telephone pamper to individual woes, but it provided a very useful industrial
service. It allows commercial companies to expand their horizons infinitely
easier than ever before. It became possible to set up meetings and discuss
business matters with partners thousands of miles away. Companies that posessed
a telephone had a enormous advantage over the rest. And in a time as
economically troubled as the 30's depression, everyone was looking for a
competitive edge.
The telephone wasn't invented in the thirties, nor was the first
transatlantic line built then, but the thirties represents a time in history
when the world was ch .....
Download This Paper
|
Implementing A CAD System TO Reduce Costs
Words: 1503 - Pages: 6.... of paper communication. The need to transfer large drawings
using mylars would cease to be, thus helping provide a paper less environment.
Another improvement as a result of CAD would be that of achieving much tighter
tolerances in building new products. Using a CAD system, part designs could be
received in an electronic format such as a math model. These models are
currently in use by customers such as GM, BMW and Mercedes. The effect of
having math models of all new products would enable a quicker turnaround in both
quoting and production of products. CAD Vendors & Hardware Suppliers: Upon
observing the various systems used by .....
Download This Paper
|
Architectural Designs Of Castles Vs. Modern Homes
Words: 1198 - Pages: 5.... of the castles had walls that could be as big as thirty feet thick. They also had multiple walls so that if invaders got past the outer wall they still had to get past one or two more, this made defending the castle much easier. The walls were constructed with narrow, wedge-shaped slits in them for archers to shoot arrows at invaders. The outer walls also had holes in the floors for defenders to drop rocks down on invading people who had gotten through the first wall. These holes were called murder holes. Inside the castle were many knights, archers, and soldiers prepared to defend against anyone who breaks all of the way through the .....
Download This Paper
|
Gates World
Words: 637 - Pages: 3.... to send and receive anything electronically. You can forget about having to walk to the mail box, and having to deal with that angry postal worker! Forget about writing checks for bills, with the Gates Network you can electronically transfer your funds directly from your own personal Gates Bank account to any account in the world. The Gates Computer will provide your home with digital clarity sound! And with the Gates Radio Network you can listen to any style of music any time! Forget all those annoying radio advertisements, you’ll get interesting and exciting news on up coming Microsoft products and services!
The Gates Home Network ca .....
Download This Paper
|
Navigate:
« prev
15
16
17
18
19
next »
|
|
Members |
|
|
|