Papers on Computers & Technology
Porn On The Internet
Words: 1492 - Pages: 6.... It is the computer. Although the computer is mostly used for helpful things such as school work and business work, it can be manipulated to show vulgarity. Sites that contain pornography can be linked to with ease. These sites can be seen whether or not the child is purposely or mistakenly connecting to them. This is why mothers should act immediately if they do not want their children to be exposed to demeaning pictures of complete nudity and explicit sex. They need to monitor Internet use for their children by purchasing and installing a program that filters out pornography.
Surprisingly, there is an unlimited amount of pornograp .....
Download This Paper
|
The Internet Contributes To The Process Of Globalization
Words: 895 - Pages: 4.... and an informal, non state, non economic, political zone. The increasing prominence of the Internet in the day to day lives of people across the globe and the growing reliance on information disseminated via the Internet illustrates the ability of the Internet to span the globe and in essence create a unified sense of shared memories. Furthermore it is immutable proof that the Internet is perhaps the most powerful tool of globalization
It has been argued that the opening presumption that there exists a "coercive, sometimes wholly unconscious force of American imperialism over the Net." It's a statement that depends on some obsolete notio .....
Download This Paper
|
The Internet: How It Works And How It Affects The World
Words: 1655 - Pages: 7.... Net, ARPANET started getting hard to manage, especially with many university sites on it. Therefore, it was broken into two parts: MILNET, which had all the military sites, and ARPANET, which had all the nonmilitary sites. "The two networks remained connected, however, thanks to a technical scheme called IP (Internet Protocol), which enabled traffic to be routed from one net to another as needed. All the networks connected by IP in the Internet speak IP, so they can all exchange messages." (Levine 12)
Even though there were only two networks at that time, IP was made to allow thousands of networks. The IP is designed so that every compu .....
Download This Paper
|
The Future Of Fiber Optics On The Internet
Words: 653 - Pages: 3.... and televisions. A strand of glass is thinner than a human hair, yet inch by inch is stronger than steel.
The future of fiber optics is very promising due to the simple fact of how much information they can carry. Two single fiber optics lines carry the equivalent of 24,000 telephone calls at one time. With the introduction of fiber optics into our daily lives, it will greatly improve the quality and speed of the information we receive.
With the growth of television and telephone traffic, bandwidth has become a large issue that is seemingly solved with the advent of fiber. Fiber Optics has enormous bandwidth and distance coverage .....
Download This Paper
|
Computer Viruses
Words: 729 - Pages: 3.... is a virus triggered by a certain value
appearing a certain part of the computers memory, either relevant to the viruses
purposes or at random. The Trojan horse is an innocent seeming program
deliberately infects with a virus and circulated publicly. There is a cure for
these viruses, though. These "cures" are called vaccines. A vaccine is a
program that watches for typical things viruses do, halts them, and warns the
computer operator.
"Put a kid with the chicken pox together with a bunch of healthy kids and not
all of them will get sick." But that is not the case with computer viruses.
You see when a computer virus passes on a v .....
Download This Paper
|
Internet Site Evaluations
Words: 2253 - Pages: 9.... the above source help in saving their life if a hospital was inaccessible? This would depend on the authenticity and authorship of the source. In any case, using material from an unquestionable source is not a reliable idea. Why? Because the authorship of the source, probably the most important criterion one must use in evaluating the effectiveness of a website, is sometimes debatable. The author of a website can be anyone. It can be ones next door neighbour, someone whom was met last week at a bar or a world renowned open heart surgeon who was on television just three days ago. Before beginning to delve into a site, make sure that .....
Download This Paper
|
Beam Me Up Scotty: Teleportation
Words: 418 - Pages: 2.... all the information about the atoms making you up,
With all the data collected, the machine would then vaporize your body and relay
the information to your friend's teleporter, which would rebuild you using basic
molecular elements.
Some people don't try to think of a scientific answer to it, they just
know that they can move something from point A to point B.
There are many kinds of teleportation, one kind is transferring a
picture of an image to a piece of film in a special camera called a tele-camera,
the teleporter sticks the lens of the camera to hiser fore head and thinks about
the picture as hard as they can, most of th .....
Download This Paper
|
Computer Crime In The 90's
Words: 1554 - Pages: 6.... this is where the hacking really begins, the hacker
tries to bypass this anyway he knows how to and tries to gain access to
the system. Why do they do it, well lets go to a book and see "Avid young
computer hackers in their preteens and teens are frequently involved in
computer crimes that take the form of trespassing, invasion of privacy, or
vandalism. Quite often they are mearly out for a fun and games evening,
and they get entangled in the illegal use of their machines without
realizing the full import of what they are doing" , I have a hard time
believing that so lets see what a "hacker" has to say about what he does
"Just as they .....
Download This Paper
|
The Growth Of The Internet
Words: 555 - Pages: 3.... on the Internet, it is required that you learn to operate a separate program, one for the mail, one for news groups, and several different programs for accessing databases.
This all changed in 1989. A researcher at CERN (a big European physics laboratory) named Tim Berners-Lee started to work on hypertext. By using hypertext he could link together all the different kinds of information available on the Internet.
Berners-Lee called the software pack the World Wide Web.
For the World Wide Web to work, each page has itβs own address that the web recognizes using a system called HTTP (Hypertext Transport Protocol). Each page has to be .....
Download This Paper
|
Hacking
Words: 3551 - Pages: 13.... it's in the pursuit and capture of knowledge.
To this end, let me contribute my suggestions for guidelines to follow to
ensure that not only you stay out of trouble, but you pursue your craft without
damaging the computers you hack into or the companies who own them.
I. Do not intentionally damage *any* system. II. Do not alter any system
files other than ones needed to ensure your
escape from detection and your future access (Trojan Horses, Altering
Logs, and the like are all necessary to your survival for as long as
possible.) III. Do not leave your (or anyone else's) real name, real
handle, or real
pho .....
Download This Paper
|
Navigate:
« prev
22
23
24
25
26
next »
|
|
Members |
|
|
|