Papers on Computers & Technology
Technology Advances
Words: 289 - Pages: 2.... resulting in computer games.
In the beginning there were games like "Pong", single pixel tennis. On each
end of the screen there were two bars and the object was to hit a square pixel
back and forth in an attempt to score.
These types of games were good, but as technology advanced , graphics and sound
were in demand. From the ATARI came NINTENDO ( I am skipping a few minute
advances in technology like the ODDESY) Then Nintendo, which dominated the
market at the time, soon had competition with SEGA. Both of these systems were
16 bit. Theses machines still weren't enough to satisfy consumers for a while so
thay came out with the most sign .....
Download This Paper
|
Internet And Internet Security
Words: 1171 - Pages: 5.... things that you can get through it.
Even though it looks like it has sprung up overnight, the vision of
free-minded hackers, it was born in the ‘Defense Department Cold War’ projects
of the 1950s. The US Government owns the Internet and has the responsibility
and right to decide who uses it and how it is used. The government HAS to have control on what information people are able to get from its agencies. This
information is not lawfully available through the mail OR over the telephone, so
there is absolutely no reason why they should be available otherwise. Since the
idea a network of computers, the industry has wonderful .....
Download This Paper
|
Hacking
Words: 996 - Pages: 4.... threatened by me.. Or thinks I'm a smart
ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does
is play games. They're all alike. And then it happened... a door opened to a
world... rushing through the phone line like heroin through an addict's veins,
an electronic pulse is sent out, a refuge from the day-to-day incompetencies is
sought... a board is found. "This is it... this is where I belong... "I know
everyone here... even if I've never met them, never talked to them, may never
hear from them again... I know you all... Damn kid. Tying up the phone line
again. They're all alike... you bet you ass we're all alike.. .....
Download This Paper
|
Noise Reduction In Hearing Aids
Words: 2400 - Pages: 9.... sensorineural loss might need the speech signal to be 15 or more decibels greater than the ambient noise. The hearing aid’s task is to acoustically or electronically compensate for both the neurological shortcomings of the hearing impaired person and the wide band increase inherent in any basic amplifier.
Acoustic compensation can be carried out in a hearing aid microphone. Most hearing aids today utilize omnidirectional microphones, which pick up sound equally from all directions. This may be beneficial and practical in some cases, as in the completely in the canal (CIC) aid. The CIC aid uses the natural funneling of the auricle .....
Download This Paper
|
BBS Piracy And The Copyright
Words: 1083 - Pages: 4.... Copyright Act. The RCMP
acted in response to concern from the users who stated that they were not
sure whether this software could be distributed electronically.
Yves Roy, sergeant of RCMP stated that charges will be laid in early
December under paragraph 42 of The Copyright Act. Conviction under this
act carries a maximum punishment of a fine of $1 million dollars, and/or 5
years imprisonment.
Because newspaper articles are very biased in one point-of- view, it
is difficult to look at both sides of this situation. But let us discuss
piracy in a more general manner. Software piracy is the act in which
someone takes a co .....
Download This Paper
|
Computer Crime
Words: 3398 - Pages: 13.... in accounts to
perpetrators' accounts for withdrawal. Computers are instruments of crime when
used to plan or control such criminal acts as complex embezzlements that might
occur over long periods of time, or when a computer operator uses a computer to
steal valuable information from an employer.
Computers have been used for most kinds of crime, including fraud, theft,
larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since
the first cases were reported in 1958. One study of 1,500 computer crimes
established that most of them were committed by trusted computer users within
businesses; persons with the requisi .....
Download This Paper
|
Will Computers Control Humans In The Future?
Words: 865 - Pages: 4.... the Profession story people would no longer
read books to learn and improve their knowledge. People would rely on the
computers rather than "try to memorize enough to match someone else who knows"
(Nine Tomorrows, Profession 55). People would not chose to study, they would
only want to be educated by computer tapes. Putting in knowledge would take
less time than reading books and memorizing something that would take almost no
time using a computer in the futuristic world that Asimov describes. Humans
might began to rely on computers and allow them to control themselves by letting
computers educate people. Computers would start teaching hu .....
Download This Paper
|
Lasers
Words: 757 - Pages: 3.... if the light is of a single frequency that statement would also be true. A
laser is useful because it produces light that is not only of essentially a
single frequency but also coherent, with the light waves all moving along in
unison.
Lasers consist of several components. A few of the many things that the
so-called active medium might consist of are, atoms of a gas, molecules in a
liquid, and ions in a crystal. Another component consists of some method of
introducing energy into the active medium, such as a flash lamp for example.
Another component is the pair of mirrors on either side of the active medium
which consists of one that .....
Download This Paper
|
The Office Of Tomorrow
Words: 3802 - Pages: 14.... ordinary corporate environment. Smith
doesn't have a permanent desk or workspace, nor his own telephone. When he
enters the ad agency's building, he checks out a portable Macintosh computer and
a cordless phone and heads off to whatever nook or cranny he chooses. It might
be the company library, or a common area under a bright window. It could even be
the dining room or Student Union, which houses punching bags, televisions and a
pool table. Wherever he goes, a network forwards mail and phone pages to him and
a computer routes calls, faxes and E-mail messages to his assigned extension. He
simply logs onto the firm's computer system and ac .....
Download This Paper
|
The Internet Beyond Human Control
Words: 958 - Pages: 4.... out
ways to police the Internet so this will not happen. The problem with that is
it is a very hard task to do. It is almost guaranteed this will not happen for
another five to ten years.
Being hooked up online helps make high school easy to slide through. There is a
student at Chichester Senior High School that has a home computer hooked online
with the Internet system. So when he has a term paper due all he does is down
load a term paper on the system with the same topic. He just puts his name on
the paper, hands it in, and receives an A. In return when he hits college life
he will not know how to write a term paper. This wil .....
Download This Paper
|
Navigate:
« prev
53
54
55
56
57
next »
|
|
Members |
|
|
|