Papers on Computers & Technology
The Internet
Words: 1187 - Pages: 5.... could US authorities talk to each other in the aftermath of a nuclear attack? Communication networks of that time were chained point-to-point, with each place on the network dependent on the link before it. If one point in the network were blown up, the whole network would become useless. Paul Baran, one of the Rand thinkers on the project, conceived the idea for a new kind of communications network that wasn't organized point-to-point, but instead was set up more like a fishnet. He believed this structure could allow information to find its own path through the network even if a section had been destroyed. His eleven-volume report for the P .....
Download This Paper
|
Computer Security
Words: 2496 - Pages: 10.... of the computer?
Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers.
The term "hacker "may have origina .....
Download This Paper
|
The History Of The Airship
Words: 1098 - Pages: 4.... dirigere, "to direct, to steer") balloons. Equipped with a bag
containing a gas such as helium or hydrogen which is elongated or streamlined to
enable easy passage through the air, these Airships could reach speeds up to
10mph with a 5hp steam engine propeller.
The first successful airship was that of the French engineer and inventor Henri
Giffard, who constructed in 1852 a cigar-shaped, non-rigid gas bag 44 m (143 ft)
long, driven by a screw propeller rotated by a 2.2-kw (3-hp) steam engine. He
flew over Paris at a speed of about 10 km/hr (about 6 mph). Giffard's airship
could be steered only in calm or nearly calm weather. The first .....
Download This Paper
|
Internet Security
Words: 1849 - Pages: 7.... its users, but there are also many
problems with the Internet security, especially when dealing with personal
security, business security, and the government involvement to protect the users.
The Internet is a new, barely regulated frontier, and there are many
reasons to be concerned with security. The same features that make the Internet
so appealing such as interactivity, versatile communication, and customizability
also make it an ideal way for someone to keep a careful watch on the user
without them being aware of it (Lemmons 1). It may not seem like it but it is
completely possible to build a personal profile on someone just by t .....
Download This Paper
|
Computers And Society
Words: 3172 - Pages: 12.... made of wheels and cogs. The concept of the modern computer was
first outlined in 1833 by the British mathematician Charles Babbage. His design
of an analytical engine contained all of the necessary components of a modern
computer: input devices, a memory, a control unit, and output devices. Most of
the actions of the analytical engine were to be done through the use of punched
cards. Even though Babbage worked on the analytical engine for nearly 40 years,
he never actually made a working machine.
In 1889 Herman Hollerith, an American inventor, patented a calculating
machine that counted, collated, and sorted information stored on punch .....
Download This Paper
|
The Torpedoes
Words: 356 - Pages: 2.... minor success only to be countered by the allied Foxer noise-making decoy. It was scoring hits against escort and merchants to the end of the war though.
The weapon was designed to lock onto the loudest noise after a run of 400m from its launch. This often proved to be the U-boat itself and standard issue-orders were to dive immediately to depth of 60m after launch from a bow tube while a stern shot was to be followed by a complete silence in the boat. Two U-boats were almost certainly lost when hit by one of their own T5 torpedoes, U-972 in Dec 1943 and U-377 in Jan 1944.
Variants
All the German U-boat torpedoes were 53.3cm (21 inch) .....
Download This Paper
|
The Future Of Computer Crime In America
Words: 916 - Pages: 4.... private nature on anything from IRS Tax returns, to Top Secret NASA payload
launch information. Piled on top of that many times the individuals accessing
these information sources are doing so by illegal means and are often motivated
by deviant and illegal means. It is said that at any given time the average
American has his name on an active file in over 550 computer information
databases of which nearly 90% are online, and of the 550 databases the number
comes no where close to how many time your personal information is listed in
some database in an unactive file. The "Average American" could simply sit in
his/her home doing nearly not .....
Download This Paper
|
Government Censorship Would Damage The Atmosphere Of The Freedom To Express Ideas On The Internet; Therefore, Government Should Not Encourage Censorship
Words: 4435 - Pages: 17.... archival and retrieval medium, somewhat analogous to
traditional libraries.
4. The world-wide web (WWW), which is another component of the Net, can be
used to "publish" material that would traditionally appear in journals,
magazines, posters, books, television and even on film.
2. It is also essential to give a brief history on the internet.
3.The U.S. government is now trying to pass bills to prevent misuse of the
Net.
II. In order to understand the need for the ever-growing body of
legislation, it is important to explore the controversy, and the current
problems involved with the Net as it exists must be introduced.
1. The probl .....
Download This Paper
|
Computers: Nonverbal Communications
Words: 4524 - Pages: 17.... for many with
visions of fancy headgear and million dollar gloves, MUDs require no such
hardware. They are, however, a form of virtual reality, "because they construct
enduring places, objects, and user identities. These objects have
characteristics that define and constrain how users can interact with them,"
(Holmes & Dishman, 1994, p. 6). Having been created in their most rudimentary
form nearly two decades ago, the technology that supports MUD interaction is
well developed and has spawned a new variety of communicative environment, one
that thousands if not millions of users have found fiercely compelling.
Since MUDs are generally restr .....
Download This Paper
|
Power Generation In The Future What We Should Do In Australi
Words: 319 - Pages: 2.... the atmosphere. Coal power is also reliable.
Solar
Solar should only generate 15% because it is not a reliable power source: the sun does not shine 24 hours a day, 7 days a week in one spot. If the weather does change and the panels can’t generate the power required the nuclear plant/s can fluctuate to cope with the power needs of the general population. Solar power uses an infinite resource so it is worthwhile making use of.
Wind
Wind “farms” should be used in conjunction with Solar plants as more power will be generated with the wind and sun combined. It is an environmentally friendly power source however it is very costly .....
Download This Paper
|
Navigate:
« prev
41
42
43
44
45
next »
|
|
Members |
|
|
|