|
Help With Computer Papers
How Technology Has Hurt Us
... More people are turning the guns on themselves. Kids bring
guns to school with them for protection against people who may use a gun on them
for retaliation. Politically its divided the nation on whether private citizens
should be able to carry guns.
Disposable items have caused a big garbage problem. We use everything
from disposable pens to disposable diapers. We can stop some of the garbage
problem by recycling.
Air conditioners are using up allot of our electricity. There are times
in the summer when brown outs happen because if our excessive use of the air
conditioners. Freon gets released into our ...
|
"Computer Security" By Time Life Books
... it only possible for someone to access a computer by using a password or
by locking it up.
Computer security works by many ways of password use or by locking it up.
The password method is enforced by prompting a computer user to enter a password
before they can access any programs or information already contained within the
computer. Another password security method would be to have the computer user
carry a digital screen that fits in your pocket. This digital screen receives
an encrypted message and displays numbers that change every few minutes. These
numbers make the password one needs for the next few mi ...
|
MMX Technology
... users to take advantage of.
is Intel's most recent processor enhancement, but what is it? How does it work? What does it mean as far as performance improvements? is the first new chip architecture from Intel in ten years. From a technological standpoint, there are significant changes: MMX defines a set of 57 new computer instructions that extend the x86 instruction set of approximately 80; it has 32 KB of on-chip cache, verses the non-MMX on-chip cache of 16 KB, which enhances performance of even non-MMX applications, and it makes use of Single Instruction Multiple Data (SIMD) for more efficient data processin ...
|
Hubble Space Telescope
... the HST began in 1981 with the assembly of its' precision ground mirror. By the end of 1985, the entire spacecraft was complete with the scientific instruments, optical components, and remaining hardware intact and prepared for launch. Although scheduled for launch in 1986, the project was later postponed due to the space shuttle Challenger disaster. During this period, HST was subjected to intense tests and observation in order to prepare its duty in space. The HST was finally launched aboard the STS-31 mission of the space shuttle Discovery on April 24, 1990.
Shortly after its launch in 1990, an error was found in ...
|
Radar Detector
... Phazer makes your vehicle electronically invisible to the police speed-detecting equipment. It mixes a portion of the radar signals with background clutter and bounces it back to the squad car by way of wave guide antenna, which effectively confuses the computer inside the radar gun. Police radar takes five to ten speed measurements per second of the vehicle. The Phazer sends two different signals to the radar, so the final result is that police radar can not verify the speed of the vehicle and displays no speed at all.
The Phazer also protects your vehicle from Lidar guns which use distance over time t ...
|
The History Of The Internet And The WWW
... Board Service. A BBS is a
computer that you can ether dial into or access from the Internet. BBS's are
normally text based.
2. The Creator of the WWW-
A graduate of Oxford University, England, Tim is now with the Laboratory
for Computer Science ( LCS)at the Massachusetts Institute of Technology ( MIT).
He directs the W3 Consortium, an open forum of companies and organizations with
the mission to realize the full potential of the Web.
With a background of system design in real-time communications and text
processing software development, in 1989 he invented the World Wide Web, an
internet-based hypermedia ini ...
|
CMIP Vs. SNMP : Network Management
... program. Sitting in front of a large screen displaying a map of the
world, leaning back gently in your chair. A gentle warning tone sounds, and
looking at your display, you see that California is now glowing a soft red in
color, in place of the green glow just moments before. You select the state of
California, and it zooms in for a closer look. You see a network diagram
overview of all the computers your company has within California. Two systems
are flashing, with an X on top of them indicating that they are experiencing
problems. Tagging the two systems, you press enter, and with a flash, the screen
displ ...
|
Computer Crimes: Laws Must Be Pass To Address The Increase In Computer Crimes
... all races, age groups and
economic strata. Computer criminals tend to be relatively honest and in a
position of trust: few would do anything to harm another human, and most do not
consider their crime to be truly dishonest. Most are males: women have tended to
be accomplices, though of late they are becoming more aggressive. Computer
Criminals tend to usually be "between the ages of 14-30, they are usually bright,
eager, highly motivated, adventuresome, and willing to accept technical
challenges."(Shannon, 16:2)
"It is tempting to liken computer criminals to other criminals, ascribing
characteristics somehow ...
|
A Quantum Computer
... behave like waves, these different places are different states that an atom can exist in simultaneously.
What’s the big deal about quantum computing? Imagine you were in a large office building and you had to retrieve a briefcase left on a desk picked at random in one of hundreds of offices. In the same way that you would have to walk through the building, opening doors one at a time to find the briefcase, an ordinary computer has to make it way through long strings of 1’s and 0’s until it arrives at the answer. But what if instead of having to search by yourself, you could instantly create as many ...
|
The Production, Characteristics And Use Of Aluminium And Its
... has risen steadily over the last decade.
The reasons for the extensive use of aluminium lies in the diverse range of properties (mechanical, physical etc.) exhibited by aluminium and its alloys:
„h A key property is low density. Aluminium is only one-third the weight of steel.
„h Aluminium and most of its alloys are highly resistant to most forms of corrosion. The metal's natural coating of aluminium oxide provides a highly effective barrier to the effects of air, temperature, moisture and chemical attack.
„h Aluminium is a superb conductor of electricity. This property allied with other intrinsic qualitie ...
|
Browse:
« prev
8
9
10
11
12
next »
|
|