|
Help With Computer Papers
Nanotechnology: Immortality Or Total Annihilation?
... build structures to complex atomic specifications (Drexler, "Engines" 288)." The technology which Drexler speaks of will be undoubtedly small, in fact, nano- structures will only measure 100 nanometers, or a billionth of a meter (Stix 94). Being as small as they are, nanostructures require fine particles that can only be seen with the STM, or Scanning Tunneling Microscope (Dowie 4). Moreover the STM allows the scientists to not only see things at the molecular level, but it can pick up and move atoms as well (Port 128). Unfortunately the one device that is giving nanoscientists something to work with is also one of t ...
|
Internet And Censorship
... from accessing what they want to see and it inhibits people's free speech.
In this country, many activists for censorship of the Internet mainly have one thing on their minds. They want to protect children from pornography. Although I view this as a big concern, there is a greater issue at hand. Since censorship encompasses all forms of expression, censoring the Internet would hurt many people. Since the Internet is an international community, we must view it as pertaining to other countries; not just the United States. Not all countries have the privilege of living in a democracy and under the Bill of Righ ...
|
The Impact Of Computers In Accounting
... Ken is aware of the important of the computer skills in the job market, he devotes many time self-studying his PC at home. With his expertise in bookkeeping and his adequate knowledge of computers, he finds that computerized accounting is easy to work with and is very timesaving.
With computer technology changing at such fast pace, many businesses try to keep up by upgrading computer system constantly in order to stay competitive. In the example of Advance Management; the computer equipment they have is quite advances. For example, they own 3 computers of which one is solely for accounting purposes. The system ...
|
America Online: Is It For Me?
... on
how many hours you plan on using. If you are concerned that your children
will visit web pages you prefer that they don't, then you can put parental
guards on that don't allow them to visit those web pages. If you aren't
familiar with web pages, they are basically ads that you look at containing
information about the company, person, or product. Also you can sign your child
on as a child or teen which keeps them out of restricted areas. Perhaps
your main concern is people finding out things that you don't want them to.
They only know as much as you tell them. If they ask for your password, credit
card numb ...
|
Technology Of The Twenty First Century
... will not be able to get a good job unless you have had some kind of computer training. The reason the Y2K problem is so big is because our lives revolve around computers and technology. Banks use computers to keep track of money. Fast Food restaurants use computers for inventory and taking care of money also. Before long everyone will have a computer at home.
The Internet is a big part of our lives today. It is being used everywhere and every way. The Internet was first originally used in 1969 for military purposes but look around today almost every home that has a computer has the Internet. The Internet has came a ...
|
Video Games: The High Tech Threat To Our Younger Generation
... parents for the disturbing contents and the substandard themes in
some of its games. The videogame technology must be recognised for its role and
influence on the younger generation because, for better or worse, it clearly
affects their academic and social life.
Indeed, statistics are really alarming on the videogame industry. It is
a multi-million dollar business growing at 40 per cent a year from 1987 to 1993
(Palmeri 102). Tetzeli in his article "Videogames: Serious Fun" compares
videogames $ 6.5 billion--a--year business to the Hollywood film industry (110).
He continues to point out that two Japan based c ...
|
Software Piracy
... it . America has gotta wake up ,
no matter what kind of warning you put out , or whatever other restrictions you
try to enforce , there will always be another way . No matter what kind of
encryption there will always be someone out there , wether it be me or the next
guy , whose intelligence is greater then those who make the software .
According to the federal government , that by the way has no real
control over america since they can't even control themselves , software is
protected from the moment of its creation . As soon as that software hits the
store it is protected by the United States Federal Govern ...
|
Network Security And Firewalls
... which allow only authorized people to use the resources they are supposed to. These can be locks, people or physical barriers that stand in the way of a desired location or object. Computer security uses much of the same utilities. Passwords take the place of keys, security analysts take the place of guards, and firewalls take the place of physical barriers. Passwords and firewalls are the two most common ways to secure a computer system.
Passwords are the most common forms of computer and network security. They are the most common because of three main reasons. First of all, passwords are cheap to im ...
|
Computers In Math
... Evaluating an Algebraic Function
It is frequently necessary to evaluate an expression, such as the one
below, for several values of x.
y= 6x4+4x3-5x2+6x+4
First to start with developing the power's of x to perform the
necessary multiplications by the coefficients, and finally produce the sum.
The following steps are the way the computer "thinks" when it is
calculating the equation.
1.Select x
2.Multiply x by x and store x2
3.Multiply x2 by x and store x3
4.Multiply x3 by x and store x4
5.Multiply x by 6 and store 6x
6.Multiply stored x2 b ...
|
Trends In Telecommunications
... led to wide-scale use of the technology. In 1987, just
ten years after the Chicago experiment, numerous telecommunications
providers rushed to install light wave systems. The US Sprint network was
the first to use a total fiber optic network to traverse the nation. By
1990, AT&T had installed 300 million miles of interexchange light wave
networks.
The advantages of light wave systems are many and include
• freedom from electrical disturbance
• tremendous bandwidth or information-carrying capacity
• small physical size
• relative low cost
The speed at which information can be moved through the fiber op ...
|
Browse:
« prev
42
43
44
45
46
next »
|
|