
|
Search Papers |
|
|
 |
|
Find Computers Term Papers
The Birth Of Fiber Optics-To It's Popularity
Number of pages: 4 | Number of words: 1034.... a system of bent glass rods for guiding light images in an attempt at early television.
In 1898, American David Smith applied for a patent on a bent glass rod device to be used as a surgical lamp.
In the 1920's, Englishmen John Logie Baird and American Clarence W. Hansell patented the idea of using arrays of transparent rods to transmit images for television and facsimiles respectively.
In 1930, German medical student, Heinrich Lamm was the first person to assemble a bundle of optical fibers to carry an image. Lamm's goal was to look inside inaccessible parts of the body .....
|
Year 2000 Fiction, Fantasy, And Fact
Number of pages: 3 | Number of words: 682.... "bug." Can this be repaired in time? For some, it is already too late. A
system that is devised to cut an annual federal deficit to 0 by the year 2002 is
already in "hot water." Data will become erroneous as the numbers "just don't
add up" anymore. Some PC owners can upgrade their computer's BIOS (or complete
operating system) and upgrade the OS (operating system) to Windows 95, this
will set them up for another 99 years. Older software however, may very well
have to be replaced or at the very least, upgraded.
The year 2000 has become a two-fold problem. One is th .....
|
GPS: The Future Of Navigation And Technology
Number of pages: 15 | Number of words: 3914.... revolutionary developments, and new uses for it are constantly being discovered. But before I go any farther it's important to understand a bit more about navigation.
Since prehistoric times, people have been trying to figure out a reliable way to tell where they are, to help guide them to where they are going, and to get them back home again. Cavemen probably used stones and twigs to mark a trail when they set out hunting for food. The earliest mariners followed the coast closely to keep from getting lost. When navigators first sailed into the open ocean, they discov .....
|
Economic Consequences Of Software Crime
Number of pages: 15 | Number of words: 3879.... computer, or lend,
copy or distribute software for any reason without the prior written
consent of the software manufacturer. Many software managers are
concerned with the legal compliance, along with asset management and costs
to their organizations. Many firms involve their legal departments and
human resources in regards to software distribution and licensing.
Information can qualify to be property in two ways; patent law and
copyright laws which are creations of federal statutes, which are subject
to Constitutional authority. In order for the government to prosecute .....
|
New Weapons And Technology In World War I
Number of pages: 8 | Number of words: 1966.... counteracted this by digging trenches across the roads of Germany. Some of the first armored vehicles were just normal cars converted in a tank. In 1915, Wolseley developed a thirty-cwt. lorry chassis with armored sides and a revolving turret with a Vickers-maxim machine gun. The first design of a tank known as “Little Willie” designed by Lieutenant W.G. Wilson and William Tritton. It consisted of an armored box encircled by caterpillar tracks. The first vehicle to be designed and completed as a tank was not very effective. It was too short to cross a German trench .....
|
Computer Crime: The Crime Of The Future
Number of pages: 5 | Number of words: 1120.... for the United States (Sussman
66).
Other "small time" hackers affect people just as much by stealing or
giving away copyrighted software, which causes the prices of software to
increase, thus increasing the price the public must pay for the programs.
Companies reason that if they have a program that can be copied onto a
disc then they will lose a certain amount of their profit. People will copy it
and give to friends or pass it around on the Internet. To compensate, they will
raise the price of disc programs. CD Rom programs cost more to make but are
about the sam .....
|
Computer Security
Number of pages: 10 | Number of words: 2496.... personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in the computer .....
|
Computer Crime 3
Number of pages: 4 | Number of words: 897.... criminal activities such as theft, fraud, forgery and mischief, all which are easily defined and subject to criminal sanctions. The computer has also brought along with it a host of potentially new misuses or abuses that may, or should be criminal as well.
The problem with today’s computer crimes are that the criminal justice
systems have not been able to keep up with the technological change. Only a few
countries have adequate laws to address the problem, and of these, not one has
addressed all the legal, enforcement and prevention problems. The problem with
the l .....
|
|