Papers on Computers & Technology
Technology: Friend Or Foe?
Words: 638 - Pages: 3.... financial markets, security surveillance, and as well as everyday life. There is little we can do with a computer interface device that will preserve our identity. Governments acting as a global police force protecting us from ourselves can easily monitor the electronic trail of commands and transactions.
Perhaps the Luddites could see farther into the future than anyone suspected. With regards to the downfall of technology and the role it would play on people's lives, as they became dependent upon technology for survival. Let's take for example the huge technological dilemma of the fast approaching twenty-first century; the is .....
Download This Paper
|
How The Internet Got Started
Words: 887 - Pages: 4.... simple . The network
itself would be assumed to be unreliable at all times . It would be designed
from the get-go to tyranscend its all times . It would be designed from the
get-go to transcend its own unrreliability. All the nodes from computers in
the network would be equal in status to all other nodes , each node with its
own authority to originate , pass , and recieve messages. The messages would be
divided into packets, each packet seperatly addressed. Each packet would begin
at some specified source node , and end at some other specified destination node
. Each packet would wind its way through the network on an individual
basis.In .....
Download This Paper
|
Computer Crime In The 1990's
Words: 2399 - Pages: 9.... to be sure of but in North America alone phone fraud
committed by computer hackers costs three, four maybe even up to five billion
dollars every year. Making an unwitting company pay for long distance calls is
the most popular form of phone fraud today. The first step is to gain access to
a private automated branch exchange known as a "PABX" or "PBX". One of these can
be found in any company with twenty or more employees. A "PABX" is a computer
that manages the phone system including it's voice mail. Once inside a "PABX" a
hacker looks for a phone whose voice mail has not yet been programmed, then the
hacker cracks it's access code and p .....
Download This Paper
|
Censorship On The Internet
Words: 3158 - Pages: 12.... and talk dirty to each other. Usenet groups took control of porn after the Internet came about. They did not charge people to down load picture and to interact with others. In result, Internet porn grew (Rosen 16). Things have changed drastically since then with over a million different sites available to access porn. Now it is not just for adults. Children are accessing the obscene materials. This brings rise to issues of how to protect them from problems that can arise. The materials they view, could influence children. They could also be subjected to cybersex in a chat room full of people that could be three times their age. Worst of all .....
Download This Paper
|
The Computer Underground
Words: 15764 - Pages: 58.... roles have frequently been
ignored or confused in media and other accounts of CU activity. By
utilizing a data set culled from CU channels of communication this paper
provides an ethnographic account of computer underground organization. It
is concluded that despite the widespread social network of the computer
underground, it is organized primarily on the level of colleagues, with
only small groups approaching peer relationships.
Certification: In accordance with departmental and Graduate
School policies, this thesis
is accepted in partial fulfillment of degree
requirements.
___ .....
Download This Paper
|
Year 2000: Fiction, Fantasy, And Fact
Words: 682 - Pages: 3.... that 60 to 80 million home and small business users doing math or
accounting etc. on Windows 3.1 or older software, are just as susceptible to
this "bug." Can this be repaired in time? For some, it is already too late. A
system that is devised to cut an annual federal deficit to 0 by the year 2002 is
already in "hot water." Data will become erroneous as the numbers "just don't
add up" anymore. Some PC owners can upgrade their computer's BIOS (or complete
operating system) and upgrade the OS (operating system) to Windows 95, this
will set them up for another 99 years. Older software however, may very well
have to be replaced or at th .....
Download This Paper
|
The Invention Of The Computer
Words: 2440 - Pages: 9.... When these beads are moved along the wire according to "programming" rules that the user must memorize, all ordinary arithmetic operations can be performed (Soma, 14). The next innovation in computers took place in 1694 when Blaise Pascal invented the first digital calculating machine. It could only add numbers and they had to be entered by turning dials. It was designed to help Pascal’s father who was a tax collector (Soma, 32).
In the early 1800’s, a mathematics professor named Charles Babbage designed an automatic calculation machine. It was steam powered and could store up to 1000 50-digit numbers. Built in to his machine were operat .....
Download This Paper
|
The Computer Revolution
Words: 1190 - Pages: 5.... workforce occupied in completing these tasks.
It had been shown through its usefulness in payroll applications that computing had the potential of larger cost savings in both those employed and what they did with their time. Menial, repetitive tasks could easily be carried out by computers with no loss of efficiency of effectiveness however long the tasks took. The only problem was the expense of the machines. This was solved by the introduction of large Scale Integration (LSI), newly invented components and improving manufacturing techniques, which made the devices in these machines cheaper to build. Due to these advances IBM unveil .....
Download This Paper
|
Advancement Of The Computer
Words: 604 - Pages: 3.... use, and not many people knew about them. These computers ran on vacuum tubes. They were very large, slow, and produced a lot of heat. The vacuum tubes that the computer ran on failed frequently. They were down and not running for most of the time. But these new machines were big news to the public. The media became very interested in them. They wrote about them in newspapers and magazines calling them “electronic brains” That will change the world. In 1953 IBM realized that a market existed for business computers. They introduced a total of 19 of these computers for businesses. The computers were very large, expensive, and needed a la .....
Download This Paper
|
Parts Of A Computer And What They Do
Words: 2549 - Pages: 10.... this will scan
the keyboard once every millisecond to check for changes in the current
when the key is pressed the processor finds that the current has increased
and reacts accordingly and the same when the current is depressed and the
current decreases.
Over the years many new types of keyboard have been thought up
these are mostly more ergonomically designed than there older counter parts
this is done in order to reduce R.S.I a problem that effects a lot of
typists
One of the most interesting keyboard is a device called a data hand
this will take a combination of hand movement and clicks and convert them
in to working co .....
Download This Paper
|
Navigate:
« prev
30
31
32
33
34
next »
|
|
Members |
|
|
|