Papers on Computers & Technology
The Internal Combustion Engine
Words: 1509 - Pages: 6.... inside the cylinder igniting the compressed air/fuel mixture causing the piston to fire downward at a very high speed. And finally, the exhaust stroke. This is when the piston moves up and pushes the burnt gas through a one-way valve, which then goes back into the cylinder head and then through the exhaust manifold and exhaust tubes and the leads out of the car. At 2200 RPM the entire four-stroke cycle is completed 18 times per second in each cylinder. The term V8 L6 and V6 refer to the number and configuration of engines cylinders. While the V8 is more popular for hot-rodding and for fast sports cars. The in-line six is common found .....
Download This Paper
|
Viruses
Words: 3001 - Pages: 11.... this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are doing", I have a hard time believing that so lets see what a "hacker" has to say about what he does "Just as they wer .....
Download This Paper
|
Dell Computer Corporation
Words: 1036 - Pages: 4.... individuals purchasing them, and sells an extensive selection of peripheral hardware and computing software through its DellWare program.
Nearly two-thirds of Dell’s sales are to large corporations, government agencies and educational institutions. Dell also serves medium and small business and home-PC users.
Dell’s award-winning customer service, industry-leading growth and financial performance continue to differentiate the company from competitors. At the heart of that performance is Dell’s unique direct-to-customer business model. “Direct” refers to the company’s relationships with its customers, from home-PC users t .....
Download This Paper
|
Internet Censorship And The Communications Decency Act
Words: 676 - Pages: 3.... laws to protect children that would be
much less invasive.
The bills for laws aimed at regulating the Internet for the sake of
child safety are, in my opinion, extremely vague and broadsided. They
give absolutely no definition of what should be considered "obscene" or
"harmful to minors." Definitions annexed on to them are extremely
broadsided and could not only ban pornography but also things like
information on AIDS and other sexually transmitted diseases, birth control,
breast cancer, certain forms of artwork, and many other things that should
never be considered "obscene." However Internet censorship laws could
potentially .....
Download This Paper
|
Dna Identification System
Words: 448 - Pages: 2.... you were allergic to the anaesthetic or if you were a private patient or not. This would also help in the crime department, as it would store the whole of the Australian population of individuals over the age of 18. This would have all the information about each individual these would include their DNA, and other vital statistics. At the scene of the crime there is usually fingerprints or some kind of DNA trail left behind. The police would use this DNA to log into the database to track down the criminal. It would also tell the location of where that criminal is to make it easier to find them.
The system also has its problems, Lets say that .....
Download This Paper
|
The Internet
Words: 710 - Pages: 3.... brings a unique perception into the way of
communication. Although, it did not replace the traditional means of
communication such as letters and telephone calls, it has created a new method
of transmitting information in a more efficient way. E-mail saves time between
the interval of sending and receiving a message. Sending an e-mail message
halfway around the world can arrive at its destination within a minute or two.
In comparison, a letter can take from a few days to a couple of weeks, according
to the distance it travels. Furthermore, e-mail is inexpensive. The cost of
connection to the Internet is relatively cheaper than that of .....
Download This Paper
|
What Is ISDN?
Words: 5167 - Pages: 19.... sent across the
wires over time. Digital signals are represented and transmitted by pulses with
a limited number of discrete voltage levels. [Hopkins]
The modem was certainly a big breakthrough in computer technology. It allowed
computers to communicate with each other by converting their digital
communications into an analog format to travel through the public phone network.
However, there is a limit to the amount of information that a common analog
telephone line can hold. Currently, it is about 28.8 kbit/s. [Hopkins] ISDN
allows multiple digital channels to be operated simultaneously through the same
regular phone jack in a home or off .....
Download This Paper
|
Internet Orientation Project
Words: 475 - Pages: 2.... as well as technical advice. The unfamiliarity of the product they are dealing with is a big drawback. Their inability to recognize their products pricing and margin structure deteriorates the ability of the representative to offer other low cost substitute items.
The new purchasing environment consists of trying to have the parts on the floor when needed, not too early, and never late. Extra stock ends up in inventory, and although labeled as an asset in the books, it is actually a liability. This drives the agent to search for creative ways to control materials. One key way to accomplish this is to utilize distributors that are “c .....
Download This Paper
|
A Look Into The Computer Virus
Words: 720 - Pages: 3.... and so on. Viruses often have
damaging side effects, sometimes intentionally, sometimes not. (Microsoft
Encarta 1996)
Most viruses are created out of curiosity. Viruses have always been viewed as a
well written, creative product of software engineering. I admit there are many
out there who create them out of malice, but far more people are just meeting a
challenge in software design. The people who make anti-virus software have much
more to benefit from the creation of new virii. This is not a slam, just an
observation. A common type of virus would be a Trojan Horse, or a destructive
program disguised as a game, a utility, or an applicat .....
Download This Paper
|
The Involvement Of Computers In Future Jobs
Words: 1330 - Pages: 5.... with you. For people who don't know much about computers,
you will be lost in the future. You should learn what you can while you
still have the chance, because things will develop to quickly for you and
you will not be able to cope with new technological events. Computer
consulting is a job, I have chosen long before the advances of technology.
And now it has paid off. I now have a business of my own, working as a
computer consultant. I assist others in learning about computers to be
able to operate more efficently in their everyday jobs. Computers will
fall into careers and our everyday life more rapidly then you think.
Perhaps you .....
Download This Paper
|
Navigate:
« prev
61
62
63
64
65
next »
|
|
Members |
|
|
|