|
Help With Computer Papers
Speeding Up Windows 95
... while
others simply rewrites or bug fixes. One advantage Windows 95 has over its
competitors is the user interface feature that comes built in with the operating
system. User interface is a program within Windows 95 that allows customization
of certain interface settings based on personal preference. About a year ago
Microsoft released a small program called TweakUI that actually adds more
flexibility and functionality to the already current user-friendly interface.
TweakUI is actually a rewrite (bug fix) program that edits certain data files
from the Windows 95 registry. With TweakUI running on your machine you can ...
|
Anti-government Censorship On The Internet
... the Exxon bill. The bill focuses on the word "indecent." Problems arise because the term is so vague. It could be applied to virtually any site on the Internet. This federal law was recently ruled unconstitutional by a panel of federal judges, who blocked this law with 3-0 decision (Associated Press, CNN Homepage).
Time Magazine gave national attention to the issue of Cyberporn. The title "On a screen near you: Cyberporn" was on Times July 3rd cover issue. this in a sense sent Washington into an uproar. Thinking that young children could get uncensored porn pictures off the Internet created chaos among th ...
|
The Telephone
... telephone service became economically feasible and also
reliable.
Men and women alike were captivated by the intrique and fascination of
talking to relatives and friends, miles and miles away. Not only did the
telephone pamper to individual woes, but it provided a very useful industrial
service. It allows commercial companies to expand their horizons infinitely
easier than ever before. It became possible to set up meetings and discuss
business matters with partners thousands of miles away. Companies that posessed
a telephone had a enormous advantage over the rest. And in a time as
economically troubled as the 3 ...
|
Is Your Information Safe?
... through which thieves crawl" (Erickson 1). There seems to be an
unlimited potential for theft of credit card numbers, bank statements and other
financial and personal information transmitted over the Internet.
It's hard to imagine that anyone in today's technologically oriented
world could function without computers. Personal computers are linked to
business computers and financial networks, and all are linked together via the
Internet or other networks. More than a hundred million electronic messages
travel through cyberspace every day, and every piece of information stored in a
computer is vulnerable to ...
|
A Hacker
... description of Hackers: Bright young men of disheveled
apperance,Often with sunken, glowing eyes.Seen sitting at computer consoles,
their arms tense and waitingTo fire their fingers which are already posed to
strike at the buttons and keys on which their attention seems to dice.They work
until they nearly drop,twenty or thirty hours at a time if possible.They sleep
on cots near the computer,but only a few hours-then back to the console, or
printouts.Their crumpled clothes, their unwashed, unsheven faces, and uncombed
hair, testify that they are oblivious to their bodies and to the word in which
they move. They e ...
|
Internet Censorship
... negatively by the regulations and
censorship that some countries are intent on establishing. Laws that are meant
for other types of communication will not necessarily apply in this medium.
There are no physical locations where communications take place, making it
difficult to determine where violations of the law should be prosecuted. There
is anonymity on the Internet and so ages and identities are not known this makes
it hard to determine if illegal activities are taking place in regards to people
under the legal age. As well, it is difficult to completely delete speech once
it has been posted, Meaning that ...
|
Radio: A Form Of Communication
... the original
information contained in the radio waves is retrieved and presented in an
understandable form. This form may be sound from a loudspeaker, a picture on a
television, or a printed page from a teletype machine.
HISTORY
Early Experimenters
The principles of radio had been demonstrated in the early 1800s by such
scientists as Michael Faraday and Joseph Henry. They had individually developed
the theory that a current flowing in one wire could induce (produce) a current
in another wire that was not physically connected to the first.
Hans Christian Oersted had shown in 1820 that a current flowing in ...
|
Airbags - Pop Em' Or Keep Em'
... with the airbag saved her
from any serious harm. She is still dazed as she looks over to her two
year old, expecting more screaming. Nothing. Nothing happens. She shakes
her little girl and realizes that something is drastically wrong. Mica is
dead.
At last count, this scenario has happened 31 times. How many more
times does it have to happen before the automotive industry does something
about it? Children are not the only victims, though. Small women and the
elderly have also been killed as a result of airbags. The time has come to
ask ourselves, "Do airbags really work?"
First off, most people feel th ...
|
Aeronautics: Aviation Powerplants
... relatively low number of revolutions per minute (2500 RPM redline). There was little need for new engine development at this time because aircraft design progressed slowly. Rotary engines became popular around 1910 and powered many fighters and bombers in The First World War. These engines are placed in a radial pattern around the crankshaft. These produced respectable horsepower numbers in the category of up to 185+. They were used in such famous aircraft as the Sopwith Camel and Moth. A variation of the rotary engine was used in the most famous aircraft of the war: The Fokker Dr.1 Triplane flown by Baron Von Richto ...
|
Computer Crime: The Crime Of The Future
... case involving a notorious hacker named Kevin Mitnick did just that.
Mitnick is a very intelligent man. He is 31 and pending trial for computer
fraud. When he was a teenager, he used his knowledge of computers to break into
the North American Defense Command computer. Had he not been stopped, he could
have caused some real national defense problems for the United States (Sussman
66).
Other "small time" hackers affect people just as much by stealing or
giving away copyrighted software, which causes the prices of software to
increase, thus increasing the price the public must pay for the programs.
Companies r ...
|
Browse:
« prev
55
56
57
58
59
next »
|
|