|
» Technology Essays and Papers
Masters Of Deception (MoD)
<view this essay>.... It was more than what he could ever ask for.
This was how Paul, a middle class boy from New York, got started
with computers. Almost the same story goes for Mark, Eli, John, Julio, and
Allen. These are the boys who would come to be known as the "MOD BOYS"
(Masters of Deception). They were the hacker gang who dominated the hacking
underworld back in the late 1980s.
They all met through the phone lines. Back then there was no
Internet or AOL yet people could still communicate through computers. All
they needed was a modem and some phone #'s of other modems and they were in
business.
Paul met Eli first. They learned to hack together. Aft .....
Number of words: 1215 | Number of pages: 5 |
|
Telecomuting And Us
<view this essay>.... a low (R1, or R2) readiness level to telecommute is not likely to result in a positive manner. When an employee has a high readiness level and a definite desire to attempt working in the home, for some reason or another, many factors should be considered. What kind of schedule does the employee feel constitutes telecommuting? Generally speaking, telecommuting is defined as spending at least one day out of a five day work week working in the home. Is one day home enough for the employee? Or, too little? How does the employer decide how many days to allow? Does the employee's job lend itself well to telecommuting? Some jobs, obviously, can't be accomplished usin .....
Number of words: 1088 | Number of pages: 4 |
|
Information About Viruses
<view this essay>.... computer. Computers can also be infected when a disk
that is infected with a virus is used to boot the computer. When this computer
is infected, every one who writes a floppy disk on this computer gets their
floppy disk contaminated, and risks getting this virus on their computer, which
may not have good virus protection. On IBM-Compatible PCs, viruses will only
infect executable programs, such as the .EXE and .COM files. On a Macintosh, any
file can be contaminated. A disk can also be infected even without any files on
it. These viruses are called BOOT SECTOR viruses. These viruses reside on the
part of the floppy disk, or hard disk that store the inform .....
Number of words: 326 | Number of pages: 2 |
|
Teletubbies
<view this essay>.... development of young children. Since the are very responsive to sound, children are encouraged to imitate and, in turn they are also inclined to listen.
Research has shown that young children need to enjoy repetition in order to learn. The deliberate and frequent repetition used in the Interactive doll reassures, comforts and delights a child and sets an effective stage for learning. ' liberal use of repetition, large movement, bright colors, and deliberate pace nurtures and reinforces the development of children's listening and thinking skills.
The pacing and repetition of encourages children to practice fundamental skills and concepts again a .....
Number of words: 540 | Number of pages: 2 |
|
How The Internet Got Started
<view this essay>.... be
an obvious and immediate target for man enemy missle. The center of the network
would be the very first place to go.
RAND mulled over this grim puzzle in deep military secrecy, and arrived
at a daring solution made in 1964.The principles were simple . The network
itself would be assumed to be unreliable at all times . It would be designed
from the get-go to tyranscend its all times . It would be designed from the
get-go to transcend its own unrreliability. All the nodes from computers in
the network would be equal in status to all other nodes , each node with its
own authority to originate , pass , and recieve messages. The messages would be
divided i .....
Number of words: 887 | Number of pages: 4 |
|
What Is ISDN?
<view this essay>.... machines. All information
stored on them is represented by a bit, representing a zero or a one. Multiple
bits are used to represent characters, which then can represent words, numbers,
programs, etc. The analog signals are just varying voltages sent across the
wires over time. Digital signals are represented and transmitted by pulses with
a limited number of discrete voltage levels. [Hopkins]
The modem was certainly a big breakthrough in computer technology. It allowed
computers to communicate with each other by converting their digital
communications into an analog format to travel through the public phone network.
However, there is a limit to the amou .....
Number of words: 5167 | Number of pages: 19 |
|
"Computer Security" By Time Life Books
<view this essay>.... security is meant to do. It is done by
making it only possible for someone to access a computer by using a password or
by locking it up.
Computer security works by many ways of password use or by locking it up.
The password method is enforced by prompting a computer user to enter a password
before they can access any programs or information already contained within the
computer. Another password security method would be to have the computer user
carry a digital screen that fits in your pocket. This digital screen receives
an encrypted message and displays numbers that change every few minutes. These
numbers make the password one needs for the next f .....
Number of words: 528 | Number of pages: 2 |
|
Data Warehousing
<view this essay>.... that frequently come up in
data warehousing projects. People often get blind sided by these issues. My
hope is that this paper might give readers some advance warning of these
issues. Though what is done about these issues varies by organization, I
believe the best advice to data warehouse implementers is to do your best
to spot these issues early and then pick your battles wisely.
I recommend that you read Marc Demarest's The Politics of Data
Warehousing in conjunction with this paper. In his June 1997 paper, Marc
comments on how little extended discussion of politics there is in the data
warehousing literature. As of the writing of this paper, to the be .....
Number of words: 2756 | Number of pages: 11 |
|
|