Papers on Computers & Technology
Computer - Hacking
Words: 471 - Pages: 2.... a little boy of twelve years of age, who managed to enter into the database of an important stock exchange computer. His parents will probably be fined, also if this boy did not do any real harm. As I already mentioned, hackers are in most cases only interested in the so called “cracking” of passwords without wanting to destroy anything. There is definitely also a great competition under the top-hackers of the world. Hackers often gain entrance because of a lack of security. This brings me to my second point which deals with passwords.
Very often Passwords are written down on a sheet of paper and then, fixed to the computer’s scree .....
Download This Paper
|
The V-Chip
Words: 661 - Pages: 3.... television
or that adding this little device to every set will be a first amendment
infringement. We can, however, find clues through examining the cold facts of
broadcast television and the impact of a mandatory regulation on that free
broadcast. "Utilizing the EIA's Recommended Practice for Line 21 Data
Service(EIA-608) specification, these chips decode EDS (Extended Data
Services)program ratings, compare these ratings to viewer standards, and can be
programmed to take a variety of actions, including complete blanking of
programs." Is one definition of the V-chip from Al Marquis of Zilog Technology.
The FCC or Capitol Hill has not set a .....
Download This Paper
|
Nuclear Power Plants
Words: 430 - Pages: 2.... higher because the area’s in which there would be a plant such as a big city are very densely populated. Because of these facts, I do not think that the U.S. should renew its efforts to develop more nuclear plants.
The United States should put the money which they would have used in order to renew their power plants, and use it to research others ways of receiving power. For example, if the U.S. developed solar power more and made it less costly, as well are more convenient for the average person, then there would be no more problems. In the past century many advances have been made in terms of energy. Power plants became the main source .....
Download This Paper
|
Using Frames In Web Pages
Words: 612 - Pages: 3.... . The tag specifies the html documents and whether
the frame should have a border or a scrollbar for each html document. The
tag does all the dividing. It specifies a few things regarding
how to divide them up. (Note: If using web page providers such as
angelfire and geocities, make sure the page that the frames code is going
on is set for advanced html.)
The most popular way frames are organized is by using two columns.
One is simply being used for the menu of the web site, and the other being
used as the main page to view a specific page within the web site. The
examples used will include how to create frames showing the div .....
Download This Paper
|
Technology Transfer
Words: 768 - Pages: 3.... century two major events stand out in connection to technology. First the progress and power of industrial technology, second the domination and exploitation of Africa and Asia by Europeans. In the book The Tools of Empire, Headrick the author connects theses factors through many examples in history. Leading into the twentieth century even though many would like to fast forward into the dawn of electronics, there is still a major focus on technology in Africa and Asia. However, the transfer of technology is now steering away from dominating and leaning towards local adaptation.
Africa and India experienced a deeper affect of technologic .....
Download This Paper
|
Virtual Reality - What It Is And How It Works
Words: 752 - Pages: 3.... interested in VR. This has also worried some of
the researchers who are trying to create very real applications for medical,
space, physical, chemical, and entertainment uses among other things.
In order to create this alternate reality, however, you need to find ways to
create the illusion of reality with a piece of machinery known as the computer.
This is done with several computer-user interfaces used to simulate the senses.
Among these, are stereoscopic glasses to make the simulated world look real, a
3D auditory display to give depth to sound, sensor lined gloves to simulate
tactile feedback, and head-trackers to follow the orientati .....
Download This Paper
|
Computer Crimes
Words: 657 - Pages: 3.... feel that they don't get paid as much
as they should. Therefore if they have high security clearance they are able to
capitalize from that by selling the data they have access to on the black-market.
Whether it be Ford Motor companies plan for the 1999 F-150 or spec sheets for
the military's new bomber it happens everyday. Too by left is a drawing that
illustrates the method that most Hackers use to take over your computer. Ever
since the dial-up connection was invented anyone with a modem had the ability to
wreck any one of thousands of computers.
One of the most talked about forms of computer crime is computer viruses.
A comp .....
Download This Paper
|
Biometric Systems
Words: 484 - Pages: 2.... dollar market in
this decade. There is no doubt that financial credit and debit cards are going
to be the biggest part of the biometric market. There are also many
significant niche markets which are growing rapidly. For example, biometric
identification cards are being used at a university in Georgia to allow students
to get their meals, and in a Maryland day care center to ensure that the right
person picks up the right child. In Los Angeles, they are using fingerprints to
stop welfare fraud. And they're also being used by frequent business travellers
for rapid transit through immigration and customs in Holland, and now at JFK and
New .....
Download This Paper
|
COMPUTER CRIME Hackers And Security Measures
Words: 4401 - Pages: 17.... enforcement. Hackers have raised serious issues about values and practices in an information society.
Introduction
It is true that computers and telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attracted by today’s technology. The Internet can be used for criminal purpo .....
Download This Paper
|
Computer Crime 2
Words: 2800 - Pages: 11.... for example, will eliminate most of the rewards for robbers and muggers, while computer-controlled smart houses and cars will thwart burglars and auto thieves. Implanted bodily function monitors and chemical drips (such as "sober-up" drugs and synthesized hormones) will keep most of the sexually and physically violent offenders under control.
But computer criminals--ranging in age from preteen to senior citizen--will have ample opportunities to violate citizens' rights for fun and profit, and stopping them will require much more effort. Currently, we have only primitive knowledge about these lawbreakers: Typically, they are seen only .....
Download This Paper
|
Navigate:
« prev
48
49
50
51
52
next »
|
|
Members |
|
|
|