Papers on Computers & Technology
Radar: A Silent Eye In The Sky
Words: 948 - Pages: 4.... combat as well as air-to-ground attacks.
Radar works on a relatively simple theory. It's one that everybody has
experienced in their lifetime. Radar works much like an echo. In an echo, a
sound is sent out in all directions. When the sound waves find an object, such
as a cliff face, they will bounce back to the source of the echo. If you count
the number of seconds from when the sound was made to when the sound was heard,
you can figure out the distance the sound had to travel. The formula is:
(S/2) X 1100 = D (Half of the total time times 1100 feet
per second equals the distance from the origin to the reflection point)
Of .....
Download This Paper
|
Computer Piracy
Words: 1959 - Pages: 8.... Association defines computer/software piracy as “the unauthorized use or illegal copying of a software product. It occurs in a number of forms, from the sharing of floppy disks to mismanagement of network software licenses and the production of counterfeit CD-ROMs, including “compilation CDs” that can contain thousands of dollars worth of products.” There are many ways that an individual can commit computer/software piracy. There are six different methods that you can pirate software. The first method of software piracy is called End User Copying. This is the most common method of software/. In order to do this, the indiv .....
Download This Paper
|
Virtual Reality
Words: 551 - Pages: 3.... known as the pilot maker, or more
affectionately, the blue box. Students often find themselves sitting at the end
of a runway waiting for takeoff clearance on a busy day, with the engine turning
and burning expensive gas. This is not a very effective way for students to
spend money. Most students do not have access to expensive flight simulators.
Most have to travel hundreds of miles to take advantage of these amazing
simulators. Flight simulators are much better than an airplane for the simple
reason that in a simulator the learning environment is much safer. Students
are able to avoid the overriding need to keep the airplane flying .....
Download This Paper
|
Computer Fraud And Crimes
Words: 993 - Pages: 4.... in a company on the network. The program monitors memory and
file usage. A qualified system administrator should be able to tell by the
amounts of memory being used and the file usage if something is going on that
should not be. If a virus is found, system administrators can pinpoint the user
who put the virus into the network and investigate whether or not there was any
malice intended.
One computer application that is becoming more widely used and, therefore, more
widely abused, is the use of electronic mail or email. In the present day,
illegal hackers can read email going through a server fairly easily. Email
consists of not .....
Download This Paper
|
Intranets
Words: 1511 - Pages: 6.... type of network.
Intranets have just started to be implemented throughout the world and already a
big change is being noticed. Companies are keeping track of all of their
important information on web sites, which are restricted to users, unless they
have the security code to access them. Thanks to Internet technology, companies
and other types of organizations are able to keep all of their information
organized and easily accessible with a click of a button.
The Internet, how has it changed the world around us? Government, education,
business is all wrapping around it. Is this because of all of the information
on it, simplicity or is .....
Download This Paper
|
The Computer Revolution
Words: 588 - Pages: 3.... system was called BASIC. BASIC was a major development in the computer
industry, because it made computers accessible to the average American. This
helped greatly in proving that computers were no longer just toys and they had a
very useful purpose. Most people still felt the cost was too great for a
glorified typewriter.
Several years after they introduction of the BASIC system, Apple
introduced a new line of computers called the Macintosh. These Macintosh
computers were extreme easy to use, and were about the same price of a computer
that used BASIC. Apple's business exploded with the Mac, Macintosh were put in
schools and millio .....
Download This Paper
|
High And Low Displacement Engines
Words: 369 - Pages: 2.... faster than the Mustang but the Mustang has a larger and stronger engine, which makes it possible for the car to maintain a high speed. In other words, the Integra would win in a 1/4-mile drag race but the Mustang would win in a race that’s longer than a 1/4 of a mile. They can also be made to produce as much power as a large engine but the engine life would be reduced due to the stress.
The advantage of small displacement engines is that they are fuel efficiency and weigh less than larger engines. The small displacement engine can also be modified to gain more power but the engine life is also reduced. The larger displacement is stronge .....
Download This Paper
|
Investigative Report Of Internet Addiction
Words: 3525 - Pages: 13.... ..........................................................10
LIST OF ILLUSTRATIONS
Figures
1. The number of networks connected to the Internet vs. Time.
2. The percentage of the Internet domains
3. Will the equation people = Internet Users be true in 2001?
ABSTRACT
The problem of Internet addiction is not very noticeable now and that's why not
many people are taking it seriously, but what these people are failing to see is
the connection between the very rapid growth of the Internet and the addiction
problem. It is really simple logic the bigger the Internet get the more users
will be whic .....
Download This Paper
|
Computer Multimedia
Words: 1359 - Pages: 5.... are two main ways of digitizing a picture. One is by vector graphics.
Here the information in the picture is stored as mathematical equations.
Engineering drawing applications such as CAD (computer assisted device) use
this method. The other method is by bit mapped graphics. Here the computer
actually keeps track of every point in the picture and its description. Paint
programs use this technique. Drawing programs are usually vector mapped
programs and paint programs are usually bit mapped.
Computer sound is handled in two different ways. The sound can be described
digitally and stored as an image (wave format) of the ac .....
Download This Paper
|
Green Architecture
Words: 656 - Pages: 3.... The concepts about can generally be organized into several areas of application. These areas include sustainability, materials, energy efficiency, land use, and waste reduction.
Green buildings are not only designed for present use, but consideration is also been given to future uses as well. An adaptable structure can be "recycled" many times over the course of its useful life. If specific technical issues prevent use of the building for a new function, then the materials used in its construction are designed to facilitate ease of recycling and reprocessing of materials.
Buildings consume a variety of materials in their construct .....
Download This Paper
|
Navigate:
« prev
57
58
59
60
61
next »
|
|
Members |
|
|
|