
|
Search Papers |
|
|
 |
|
Find Computers Term Papers
An Insight Into Virtual Reality
Number of pages: 5 | Number of words: 1218.... with 15 sensors that monitor finger flexion, extension, hand position and
orientation. Connected to a computer through fiber optic cables. Sensor inputs
enable the computer to generate an on screen image of the hand that follows the
operator's hand movements. The glove also has miniature vibrators in the finger
tips to provide feedback to the operator from grasped virtual objects.
Therefore, driven by the proper software, the system allows the operator to
interact by grabbing and moving a virtual object within a simulated room, while
experiencing the "feel" of the object. .....
|
“Sin In The Global Village”: Privacy In Cyberspace
Number of pages: 4 | Number of words: 970.... address) back to its origin. In short, people’s visions about a totally anonymous Internet are false because of the electronic trail that is left for others to find.
Linda Tripp, who taped her conversations with the former White House intern Monica Lewinsky, exposed President Clinton’s recent oral sex scandal by means of surveillance. Wright is suggesting that this could happen to anyone. Computer surveillance isn’t all that uncommon these days so people should look out for what they write and where they go on the Internet because someday it might be used against them.
Disi .....
|
Amd Vs. Intel
Number of pages: 3 | Number of words: 783.... as Intel chips. It needed a different motherboard, a socket-7 motherboard. This hurt AMD’s chances at the beginning, but in early 1998 they unveiled their mighty K6-2 processor. The K6-2 Processor was “bigger, better, and cheaper.” The processor ran on a 100mhz bus, while Intel’s chips still ran on a 66mhz bus, this made AMD’s chip faster. It also was nearly 16% cheaper than any Intel based Pentium!! computer.
The gaming community accepted the k6-2 with cautious, but open, arms. With their new SIMD-Enhanced (Single Instruction Multiple D .....
|
Telnet
Number of pages: 3 | Number of words: 669.... FTP (file transfer
protocol), crude email programs, and news reading. Telnet made library catalogs,
online services, bulletin boards, databases and other network services available
to casual computer users, although not with the friendly graphic user interfaces
one sees today.
Each of the early internet functions could be invoked from the UNIX
prompt, however, each of them used a different client program with its own
unique problems. Internet software has since greatly matured, with modern web
browsers (i.e. Netscape and Internet Explorer) easily handling the WWW protocol .....
|
The Computer Underground
Number of pages: 58 | Number of words: 15764.... this paper
provides an ethnographic account of computer underground organization. It
is concluded that despite the widespread social network of the computer
underground, it is organized primarily on the level of colleagues, with
only small groups approaching peer relationships.
Certification: In accordance with departmental and Graduate
School policies, this thesis
is accepted in partial fulfillment of degree
requirements.
______________________
Thesis Director
__________________ .....
|
Computer Crimes
Number of pages: 5 | Number of words: 1152.... raise in the hacker’s ego game. Only seventy-five computer crime prosecutions were reported in the United States in 1986, according to the National Center for Computer Crime Data in Santa Cruz, Calif. By 1989, that number jumped to 500 prosecutions. that year cost businesses and banks and, ultimately, consumers about $500 million. "As the use of computers has increased, so has their criminal misuse" (Parker 54:G13). Computers are used to obtain credit card numbers, which are then used to order thousands of dollars worth of whatever the hackers want.
"In recent years, in .....
|
The Future Of The Internet
Number of pages: 2 | Number of words: 457.... to date with what is being developed on the internet. With these
technological advances, systems will be faster, more powerful, and capable of
doing more complicated tasks. As more people with different interests,
thoughts, and ideas get involved with the internet, there will be more
information available (Elmer-Dewitt 64). As the number of internet users
increases, the prices will gradually decrease on internet software and
organizations (Peterson 358). The best quality about the size of the internet
is it is so big that it cannot be destroyed (Elmer-Dewitt 62).
There .....
|
Microprocessors
Number of pages: 9 | Number of words: 2468.... work. A really good analogy for the way the inner
workings of a chip operate can be found in How Microprocessors Work. In their
book, Wyant and Hammerstrom describe a microprocessor as a factory and all of
the inner workings of the chip as the various parts of a factory (Wyant and
Hammerstrom, 71-103). Basically a microprocessor can be seen as a factory
because like a factory it is sent something and is told what to do with it. The
microprocessor factory processes information. This most basic unit of this
information is the bit. A bit is simply on or off. It is either a one .....
|
|