|
Help With Computer Papers
Computer Integrated Manufacturing
... is Computer-Integrated Manufacturing?
Utilizing the computer to integrate the fragmented operations of manufacturing into a single, smoothly operating, manufacturing system with reduced total manufacturing costs and turnaround times, and improved quality is generally termed Computer-Integrated Manufacturing (CIM). Another definition that is more precise might be the utilization of computers to control the integration and flow of information between design, engineering, manufacturing, logistics, warehousing and distribution, customers and suppliers, sales and marketing activities, financial management and the overall ...
|
Computer Crime In The 90's
... dials numbers any generating tones
or carriers are recorded. These numbers are looked at by hackers and then
used again, when the hacker calls up the number and gets on he's presented
with a logon prompt, this is where the hacking really begins, the hacker
tries to bypass this anyway he knows how to and tries to gain access to
the system. Why do they do it, well lets go to a book and see "Avid young
computer hackers in their preteens and teens are frequently involved in
computer crimes that take the form of trespassing, invasion of privacy, or
vandalism. Quite often they are mearly out for a fun and games evening,
a ...
|
The Y2K Problem
... used. Hindsight is always
20/20 however, and this was almost never the case.
Regardless where you address the problem from, the year 2000 problem is a
huge, expensive and international one. In many cases it is a problem lined
with doubt as to it's effects. This paper will analyze the various aspects
to the year 2000 problem, classical and software solutions to the problem,
and present the author's ideas on how a systematic approach to the
"millennia virus" can prevent doomsday from becoming a reality for many
information technology managers and their corporations.
What, specifically, _is_ this "millennia virus" t ...
|
Airplanes
... usually has a small baggage compartment and may
include additional seats for passengers.
When air flows around the wings of an airplane, it generates a force
called "lift" that helps the airplane fly. Wings are contoured to take
maximum advantage of this force. Wings may be attached at the top, middle,
or lower portion of the fuselage. These designs are referred to as high-,
mid-, and low-wing, respectively. The number of wings can also vary.
Airplanes with a single set of wings are referred to as monoplanes, while
those with two sets are called biplanes.
To help fly the airplane, the wings have ...
|
Production Planning
... management the plant still might be running.
Modern production management or operation management (OM) systems first
came to prominence in the early half of the twentieth century. Frederick W.
Taylor is considered the father of operations management and is credited in the
development of the following principles.
a. Scientific laws govern how much a worker can produce in a day. b. It is the
function of management to discover and use these laws in operation of productive
systems. c. It is the function of the worker to carry out management's wishes
without question.
Many of today's method's of operatio ...
|
The Arrival Of Email
... letters and
tape recorded conversations-for example President Nixon's Watergate related
tapes-that have sometimes been used by external parties to take companies
to task in court. With the digital communication methods of the Information
Age, organizational managers are finding that E-mail archives and files are
telling sources of information about an organization's policies and actions.
In the antitrust case against Microsoft "E-mail messages dashed off years
ago by the Microsoft Corp. chairman and his top lieutenants now figure
prominently as digital "smoking guns" . . . Trustbusters say electronic
messages, ...
|
The Motor And How It Works
... and the coils are the same on both sides of the motor. I also know that the fields are opposite because the current travels through solenoid 1 in an opposite direction of solenoid 4. The parts that make the motor spin are solenoids 2 and 3. When the current travels through the motor, it goes through the two metal pieces that send the current into whichever solenoid is touching it (solenoid 2 or 3). When part 5 spins, the direction of the current through 2 and 3 are reversed every time the motor spins half way around. The metal pieces touch the solenoids in just the right places to give solenoids 2 and 3 a ma ...
|
Virtual Reality Technology And Society
... 3
Audio Output Devices. . . . . . . . . . . . . . . . . . . . . . . . 4
Tactile Response Devices. . . . . . . . . . . . . . . . . . . . . . 5
Interactive Input Devices . . . . . . . . . . . . . . . . . . . . . 5
Computers and Software. . . . . . . . . . . . . . . . . . . . . . . 6
THE HISTORY OF VIRTUAL REALITY . . . . . . . . . . . . . . . . . . . . . 7
Virtual Reality in the Past . . . . . . . . . . . . . . . . . . . . 7
Virtual Reality in the Present. . . . . . . . . . . . . . . . . . . 9
Virtual Reality in the Future . . . . . . . . . . . . . . . . . . . 10
THE SOCIAL IMP ...
|
Computer Crime Is Increasing
... electronic environment in which
frauds are programmed and executed; an example is the transfer of money
balances in accounts to perpetrators' accounts for withdrawal. Computers are
instruments of crime when they are used to plan or control such criminal acts.
Examples of these types of crimes are complex embezzlements that might occur
over long periods of time, or when a computer operator uses a computer to steal
or alter valuable information from an employer.
Variety and Extent
Since the first cases were reported in 1958, computers have been used for most
kinds of crime, including fraud, theft, embezzlement, bur ...
|
Parity/Non-parity Check
... this from happening, a parity check system was developed.
Each character is represented by a byte consisting of a combination of
intelligence bits (seven bits in ASCII and eight bits in EBCDIC) and an
additional bit called a check or parity bit.
Even parity codes place a check bit with each byte that contains an
uneven number of 1 bits. (Remember that a bit is either 1 or o). Because
the check bit is transmitted only with characters composed of an uneven
number of 1 bits,all characters transmitted will have n even number of 1
bits. The check bit is transmitted to and from the computer along with
character ...
|
Browse:
« prev
29
30
31
32
33
next »
|
|