|
» Technology Essays and Papers
Computer Crime
<view this essay>.... such as researchers, journalists, and others
involved in the field.
Computer crimes are often heard a lot about in the news. When you ask someone
why he/she robbed banks, they world replied, "Because that's where the money
is." Today's criminals have learned where the money is. Instead of settling
for a few thousand dollars in a bank robbery, those with enough computer
knowledge can walk away from a computer crime with many millions. The National
Computer Crimes Squad estimates that between 85 and 97 percent of computer
crimes are not even detected. Fewer than 10 percent of all computer crimes are
reported this is mainly because organizations fear that .....
Number of words: 1318 | Number of pages: 5 |
|
The Necessity Of Computer Security
<view this essay>.... are not only here to stay, but they have a
profound effect on society as well. As John McCarthy, Professor of Computer
Science at Stanford University, speculated in 1966: "The computer gives signs of
becoming the contemporary counterpart of the steam engine that brought on the
industrial revolution - one that is still gathering momentum and whose true
nature had yet to be seen."
Today's applications of computers are vast. They are used to run ordinary
household appliances such as televisions and microwaves, to being tools in the
workplaces through word processing, spreadsheets, and graphics software, to
running monumental tasks such as being the heart a .....
Number of words: 1815 | Number of pages: 7 |
|
Anti-government Censorship On The Internet
<view this essay>.... sponsored the bill. The bill is sometimes called the Exxon bill. The bill focuses on the word "indecent." Problems arise because the term is so vague. It could be applied to virtually any site on the Internet. This federal law was recently ruled unconstitutional by a panel of federal judges, who blocked this law with 3-0 decision (Associated Press, CNN Homepage).
Time Magazine gave national attention to the issue of Cyberporn. The title "On a screen near you: Cyberporn" was on Times July 3rd cover issue. this in a sense sent Washington into an uproar. Thinking that young children could get uncensored porn pictures off the Internet created chaos amo .....
Number of words: 1301 | Number of pages: 5 |
|
Othello: Game Strategy
<view this essay>.... of the game. Keep yourself to making
short moves, and NEVER put a stone where the computer has another one on
the end. Example:You see a row of 5 black stones, with a white stone on the
end, and beside that white stone a black. You of course, would put a white
stone at the end with the 5 black stones, but that is a bad mistake. Go to
the side with the one black (a setup move so the computer cannot capitalize
when you turn 5 black stones white, and the computer your seven whites
black.
Always play within your set "square". If you had on the bottom row 3
white, and on the second row 2 blacks, you would only play within that
designated square, whi .....
Number of words: 695 | Number of pages: 3 |
|
Networks
<view this essay>.... for the application to be used only by one person
at a time, hence, several people could not use it simentinsouly. This type
of setup improves the use ratio of certain applications which are expensive.
Licensing agreements can often be purchased for additional users for less
than the cost of additional full copies.
Physical Resources Printers and backup systems are two examples of
special hardware which often have low use rates. By setting up several
computers to share these resources, money is saved from having to provide
(for example) each user with their own printer. Fewer peripherals also can
translate into lower maintenance costs and lower cap .....
Number of words: 3725 | Number of pages: 14 |
|
Fifth Generation Computers
<view this essay>.... ago when a 386 DX2 processor was the fastest and most powerful CPU in the market. This processor could do a plethora of small tasks and still not be working to hard. Around 2-3 years ago, the Pentium came out, paving the way for new and faster computers. Intel was the most proficient in this area and came out with a range of processors from 66 MHz-166 Mhz. These processors are also now starting to become obsolete. Todays computers come equipped with 400-600 Mhz processors that can multi-task at an alarming rate. Intel has just started the release phase of it’s new Pentium III-800MHz processor. Glenn Henry is
quoted to say “Megahertz is all people care .....
Number of words: 1255 | Number of pages: 5 |
|
The Involvement Of Computers In Future Jobs
<view this essay>.... television is
computerized. Soon we will have true three dimensional television. We
will be able to watch television like we never have watched it before. We
will be able to touch the characters, and feel the characters like they
were in the room with you. For people who don't know much about computers,
you will be lost in the future. You should learn what you can while you
still have the chance, because things will develop to quickly for you and
you will not be able to cope with new technological events. Computer
consulting is a job, I have chosen long before the advances of technology.
And now it has paid off. I now have a business of my own, working .....
Number of words: 1330 | Number of pages: 5 |
|
Computer Viruses: Past, Present And Future
<view this essay>.... anti-virus strategies can minimize your exposure to
computer viruses.
· A history of computer viruses
· Who writes viruses - and how they can reach you
· The early warning symptoms of virus infection
· The real numbers behind the growth of viruses and their costs
· How viruses work - and how virus protection can stop them
What, Exactly, Is A Computer Virus?
A computer virus is a program designed to replicate and spread, generally with
the victim being oblivious to its existence. Computer viruses spread by
attaching themselves to other programs (e.g., word processors or spreadsheets
application files) or to the boot sector of a disk. When an infected file .....
Number of words: 4592 | Number of pages: 17 |
|
|