
|
Search Papers |
|
|
 |
|
Find Computers Term Papers
The Vast Cyber-frontier Is Being Threatend With Censorship From The Government
Number of pages: 10 | Number of words: 2556.... enforced crime of distributing knowingly to children under 18.
The congress overwhelmingly passed the bill with a landslide 414-16 House
vote and a 91-5 Senate vote.2 It seems now that the wide bill might not be
what it cracked up to be, as it stands now, anyone who might upload James
Joyce's Ulysses could be placed in jail for two years and have up to a
$250,000 fine.3 Representatives of on-line services industries were
concerned about the bill, and feared they could be held criminally
responsible for Internet conversations.4
"We face a unique disturbing and urgent circ .....
|
Radio - Making Waves In America
Number of pages: 6 | Number of words: 1502.... father, but plenty from his mother, Marconi improved upon the experiments and equipment of Hertz and others working on radio transmission. He created a better radio wave detector or cohere and connected it to an early type of antenna. With the help of his brothers and some of the neighborhood boys he was able to send wireless telegraph messages over short distances. By 1899 he had established a wireless communications link between England and France that had the ability to operate under any weather conditions. He had sent trans-Atlantic messages by late 1901, and later won t .....
|
Transfers Of Technology From The Developing World
Number of pages: 6 | Number of words: 1560.... these countries will fall further into poverty and economic ruin, with little hope for survival.
For most people of the developed world, the developing world is not something they concern themselves with; they do not see it everyday and therefore it does not exist. This could not be farther from the truth. The developing world is in need of help but the developed world constantly turns a blind eye. Our current love affair with technology may provide the answer for underdeveloped nations problems. The standard of living is so low in these countries that our everyday conven .....
|
Is Your Information Safe?
Number of pages: 6 | Number of words: 1521.... linked to
business computers and financial networks, and all are linked together via the
Internet or other networks. More than a hundred million electronic messages
travel through cyberspace every day, and every piece of information stored in a
computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank
robbers have become today's computer hackers. They can walk away from a computer
crime with millions of virtual dollars (in the form of information they can use
or sell for an enormous profit). Walking away is precisely what they do. The
National Computer Cr .....
|
Parity/Non-parity Check
Number of pages: 1 | Number of words: 236.... the
lime was incorrect.
To Prevent this from happening, a parity check system was developed.
Each character is represented by a byte consisting of a combination of
intelligence bits (seven bits in ASCII and eight bits in EBCDIC) and an
additional bit called a check or parity bit.
Even parity codes place a check bit with each byte that contains an
uneven number of 1 bits. (Remember that a bit is either 1 or o). Because
the check bit is transmitted only with characters composed of an uneven
number of 1 bits,all characters transmitted will have n even number of 1
bits. .....
|
Hackers: Information Warefare
Number of pages: 9 | Number of words: 2218.... box with wires coming out of it sitting on the sidewalk
where there had been none.
Many people won't even notice. Others might say, "Oh, a box on the street.". A
few might wonder what it does and then move on. The hacker, the true hacker,
will see the box, stop, examine it, wonder about it, and spend mental time
trying to figure it out. Given the proper circumstances, he might come back
later to look closely at the wiring, or even be so bold as to open the box. Not
maliciously, just out of curiosity. The hacker wants to know how things
work.(8)
Hackers truly are "Americ .....
|
Advancement Of The Computer
Number of pages: 3 | Number of words: 604.... the computer ran on failed frequently. They were down and not running for most of the time. But these new machines were big news to the public. The media became very interested in them. They wrote about them in newspapers and magazines calling them “electronic brains” That will change the world. In 1953 IBM realized that a market existed for business computers. They introduced a total of 19 of these computers for businesses. The computers were very large, expensive, and needed a large staff of professional people just to run them. Punch cards were used to give the first gen .....
|
Ultrasonic Radar For A Home PC System
Number of pages: 8 | Number of words: 2068.... spare. Ultrasonic radar is now a small component for your computer,
giving computer operators a chance to see low flying objects, household
furniture, and even themselves on their PC screen. Just to impress a
neighbour or friend is reason enough to build your own ultrasonic radar
station.
Similar to that of a Polaroid, ultrasonic transducers are used in this
type of radar. A rangefinder emits a brief pulse of high frequency sound
that produces an echo when it hits an object. This echo returns to the
emitter where the time delay is measured and thus the result is .....
|
|