
|
Search Papers |
|
|
 |
|
Find Computers Term Papers
The Year 2000 Bug
Number of pages: 8 | Number of words: 1942.... For example, if a train is running on a track and the power cuts out, then the gates wont go down and people will be in a lot of trouble. (Also, what happens if the power goes out in a hospital? (Also see “WHAT IS Y2K” later on)
Food is one essential thing that is crucial to survival and many people think that we may need lots of canned and dry goods. As in any crisis situation, some believe that the worst will happen: We will all die, go to war, or the world will explode, etc. Then again, others think that maybe we should be prepared just in case all of our electricity g .....
|
The Future Of Computer Crime In America
Number of pages: 4 | Number of words: 916.... information sources are doing so by illegal means and are often motivated
by deviant and illegal means. It is said that at any given time the average
American has his name on an active file in over 550 computer information
databases of which nearly 90% are online, and of the 550 databases the number
comes no where close to how many time your personal information is listed in
some database in an unactive file. The "Average American" could simply sit in
his/her home doing nearly nothing all day long and still have his/her name go
through over 1,000 computers a day. .....
|
The Utilities Confront Y2K
Number of pages: 6 | Number of words: 1524.... Each of these utilities have a high dependency on devices that have a high probability for not being Y2K compliant. These devices very nearlyd waste) are very much affected by Y2K. Problemed areas are found throughout the water infrastructure. Most obviously water utilities' computer systems will be affected by Y2K unless compliance is fulfilled. If the computers fail, the main areas affected would include customer service, accounts payable and receivable, databases, and management systems. Problems of this type are usually easily fixed, however the computer systems th .....
|
Media Influence
Number of pages: 2 | Number of words: 382.... giving the information about the position of Albanians and the NATO's attack. (Johanna Mcgeary, Standoff in Kosovo,Time weekly news magazine, March 29,1999)
A person who doesn't know anything about the Kosovo events and read Johanna Mcgeary will hate from Yugoslav President Slobodan Milosevic . Most of the people who read this media item may feel hostility to the Serbs and may try to help Muslims. And also support the NATO's attacked. As a result this article can be very effective article for the Muslims.
Nowadays Kosovo events have a big place on the mass media. CNN shows .....
|
Technology Transfer
Number of pages: 3 | Number of words: 768.... exploitation of Africa and Asia by Europeans. In the book The Tools of Empire, Headrick the author connects theses factors through many examples in history. Leading into the twentieth century even though many would like to fast forward into the dawn of electronics, there is still a major focus on technology in Africa and Asia. However, the transfer of technology is now steering away from dominating and leaning towards local adaptation.
Africa and India experienced a deeper affect of technological transfer because they were conquered and colonized by Europe. The steamboat with i .....
|
Cryptography
Number of pages: 5 | Number of words: 1227.... rushing to judge my character, it is important to first understand what a hacker does and what a cracker does. A hacker likes to work with computers and tries hard to figure out how they work. A Cracker has malicious intent, a hacker may or may not intend to commit an act of fraud. It is possible to be a hacker and a cracker at the same time. Crackers like to break into systems for the pure joy of destroying. Some hackers have decided to help system administrators either make their system more secure or catch a person who has committed a computer crime. This is where I fit in .....
|
The History And Future Of Computers
Number of pages: 4 | Number of words: 953.... Blaise Pascal. In 1642 he made the device to aid his
father, who was a tax collector. In 1694 Gottfried Leibniz improved the machine
so that with the rearrangement of a few parts it could be used to multiply. The
next logical advance came from Thomas of Colmar in 1890, who produced a machine
that could perform all of the four basic operations, addition, subtraction,
multiplication and division. With the added versatility this device was in
operation up until the First World War.
Thomas of Colmar made the common calculator, but the real start of
computers as they are kn .....
|
Green Architecture
Number of pages: 3 | Number of words: 656.... land use, and waste reduction.
Green buildings are not only designed for present use, but consideration is also been given to future uses as well. An adaptable structure can be "recycled" many times over the course of its useful life. If specific technical issues prevent use of the building for a new function, then the materials used in its construction are designed to facilitate ease of recycling and reprocessing of materials.
Buildings consume a variety of materials in their construction. Green design reduces the dependence on resource intensive products and materials .....
|
|