Papers on Computers & Technology
Object-Oriented Database Management Systems
Words: 3198 - Pages: 12.... of the system, we can understand that the
differences between the various systems with different data models can be
big and substantial. Second is the common theoretical framework. Although
there is no standard object-oriented model, most object-oriented database
systems that are operational or under development today share a set of
fundamental object-oriented concepts. Therefore the implementation issues
in OODBMSs that arise due to these concepts are universal. The third
characteristic is that of experimental activity. Plenty of prototypes have
been implemented and some of them became commercial products. There is
really a nee .....
Download This Paper
|
Internal Combustion Engines
Words: 1397 - Pages: 6.... reciprocating
engines can be distinguished: spark-ignition engines and compression-ignition
engines. In the former, a spark ignites a combustible mixture of air and fuel;
in the latter, high compression raises the temperature of the air in the chamber
and ignites the injected fuel without a spark. The diesel engine is a
compression-ignition engine. This article emphasizes the spark-ignition engine.
The invention and early development of internal-combustion engines are
usually credited to three Germans. Nikolaus Otto patented and built (1876) the
first such engine; Karl Benz built the first automobile to be powered by such an
engine .....
Download This Paper
|
Can Machines Think On Alan Turing’s Computer Machinery And I
Words: 780 - Pages: 3.... this one. I never could write poetry.
Q: Add 34957 to 70764.
A: (Pause about 30 seconds and then give as answer) 105621.1
The interrogator addresses the players as X and Y. The challenging element to the experiment is that the man will be trying to convince the interrogator that he is in fact the woman.
Turing’s motivation for creating the Imitation Game was not in line with gender issues so, to answer the question, “Can machines think?” the man (given as A) is substituted for a machine.2
The type of machine used is limited to a digital computer. This is by no means a limitation as foreseen by Turing that “in about fifty .....
Download This Paper
|
Uses Of Networking
Words: 1843 - Pages: 7.... and hardware, they are also able to send and receive data through the network.
-Resource Sharing -Advantages & Disadvantages of networks
Advantages and disadvantages of networks
Some advantages of networks
Sharing Communication
Data E-Mail
Programs Bulletin boards
Storage Tele-computer-conferencing
Printer Information
Scanner Fax
Electronic diaries
Allows Allows
Fast information exchange Electronic funds transfer
Real time database’s Electronic data interchange
Distributed databases Electronic point of sale
Electronic links Business links
Some dis-a .....
Download This Paper
|
An Overview Of Hacking
Words: 1281 - Pages: 5.... of people's credit card numbers, social security numbers, and other private data are flying through phone lines near your house. The downside to this technological marvel that we all use, whether we know it or not, is that thieves, disgruntled network administrators, and other unsavory characters can make an easy living off of the Internet, maybe even stealing from you. How? It's all in a day's work for them. One Russian hacker spent a few years bleeding money from the Citibank corporation here in the states from his cozy little house in Russia. His labor was rewarded with $10.4 million dollars in several bank accounts around the wor .....
Download This Paper
|
Data Security
Words: 1173 - Pages: 5.... was the 1993 case in which investigators in NYC found that
three city employees had found a flaw in city's real estate tax computer
system and erased 20,000,000 dollars in overdue property taxes (Secure
Commerce on The Internet 12). The corporation Citibank also had an
incident in 1995 in which Russian hackers stole over 10,000,000 dollars in
fraudulent wire transfers by exploiting a hole in it's systems provision
for money transfers. It cost the Italian government over 225,000 to repair
a glitch in The Rome Air Force Base's system. The telecommunications giant
of the west Southwestern Bell had a problem with a hacker named
Christopher Schan .....
Download This Paper
|
Fiber Optic Cable
Words: 452 - Pages: 2.... to have demonstrated image transmission through a bundle of optical fibers was a guy by the name of Heinrich Lamm whom which was a medical student at Munich. His goal was to be able to look inside inaccessible parts of the human body, and in a 1930 paper he reported transmitting the image of a light bulb filament through a short bundle. However the unclad fibers transmitted the images poorly, and the rise of the Nazis forced Lamm, a Jew, to move to the USA and give up his dream of becoming a professor of medicine.
A lot of things have changed since then. Fiber optics has come along way, and it is being used a lot more. is now made so th .....
Download This Paper
|
Dispute Over Computers And Knowledge To Operate Them
Words: 234 - Pages: 1.... anyone dont stand a chance on the job market. Because without
education in this field there is no way to succed in life or to find ajob which
would provide decant pay for an average person. However,other people have
different opinion about this issue. In theit opinion knowledge of computers is
not required in today's job market. They also thinks that people should not
depend so much on computers but more on their own education and capibilities to
make the right decisions.
Even knowing for a fact that the computers are almost everywhere in use it's not
appropriate for people to get addicted to them and to make them solve all of our
probl .....
Download This Paper
|
Software Piracy
Words: 2448 - Pages: 9.... commitment (i.e., the
PRC). Significant piracy losses are suffered in virtually every region of the
world. In some areas (i.e., Indonesia), the rate of unauthorized copies is
believed to be in excess of 99%.
Why do People Use Pirated Software?
A major reason for the use of pirated software is the prices of the
REAL thing. Just walk into a CompUSA, Electronics Boutique, Computer City,
Egghead, etc and you will notice the expensive price tags on copies of the most
commonly used programs and the hottest games. Take the recent Midwest Micro
holiday catalogue for example and notice the prices. Microsoft Windows 95: $94,
Microsoft O .....
Download This Paper
|
Virtual Reality
Words: 1559 - Pages: 6.... objects in the scene. Change to the scene is governed by the computer simulation program or database driving the creation of the scene. Thus the visual quality of a VR experience is dependent on the speed of both the graphics-rendering hardware/software and the computer system itself. (Gump)
There are four major types of devices currently in use: the head-mounted display (HMD), the binocular omni-oriented monitor (BOOM), the workstation "desktop" model (DEERING), and the projection model (CAVE). The HMD is a tracked helmet worn by the user that provides small television screens properly placed in front of the eyes. Although modest in comp .....
Download This Paper
|
Navigate:
« prev
28
29
30
31
32
next »
|
|
Members |
|
|
|