|
|
|
|
 |
|
|
Technology Term Papers and Reports |
|
|
The Year 2000 Problem
2118 Words - 8 Pages.... in the following format: dd/mm/yy. This only allows 2 digits for the year. January 1, 2000 would be stored as 01/01/00. But the computer will interpret this as January 1, 1900- not 2000” (de Jager 1). The ‘19’ is “hard-coded” into computer hardware and software. Since there are only 2 physical spaces for the year in this date format, after ‘99’, the only logical choice is to reset the number to ‘00’.
is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. “Time is running out- the Year 2000 is inevitable! The problem will occur simultaneously worldwide, time zones withstanding. It af ....
|
Regulating The Internet: Who's In Charge
2062 Words - 8 Pages.... the user, providers, and policy makers to define their boundaries
and their system of govenment" (Harassim, p84)
The intemet is a group of networks, linked together, which is capable of
transmitting vast amounts of information from one network to another. The
internet knows no boundaries and is not located in any single country. The
potential the internet has of shaping our world in the future is inconceivable.
But with all its potential the internet is surrounded by questions of its usage.
The intemet was named the global village by McLuhan and Fiore in 1968, but
recently the internet has been more properly renamed the global metropolis.
Robert Fortner defines the ....
|
"Computer Security" By Time Life Books
528 Words - 2 Pages.... by using a password or
by locking it up.
Computer security works by many ways of password use or by locking it up.
The password method is enforced by prompting a computer user to enter a password
before they can access any programs or information already contained within the
computer. Another password security method would be to have the computer user
carry a digital screen that fits in your pocket. This digital screen receives
an encrypted message and displays numbers that change every few minutes. These
numbers make the password one needs for the next few minutes in order to access
the computer. This password method is somewhat new. It is also better, for the
prev ....
|
Hackers: Information Warefare
2218 Words - 9 Pages.... my point at times I have no choice.
There are many misconceptions, as to the definition, of what a hacker truly is,
in all my research this is the best definition I've found: Pretend your walking
down the street, the same street you have always walked down. One day, you see
a big wooden or metal box with wires coming out of it sitting on the sidewalk
where there had been none.
Many people won't even notice. Others might say, "Oh, a box on the street.". A
few might wonder what it does and then move on. The hacker, the true hacker,
will see the box, stop, examine it, wonder about it, and spend mental time
trying to figure it out. Given the proper circumstances, he might ....
|
The Evaluation Of The Microprocessor.
1306 Words - 5 Pages.... microprocessors over
the last decade. Over the years their has been a constant battle over cutting
edge technology. In the 80's Motorola won the battle, but now in the 90's it
looks as Intel has won the war.
The microprocessor 68000 is the original microprocessor(Encarta 95). It was
invented by Motorola in the early 80's. The 68000 also had two very distinct
qualities like 24-bit physical addressing and a 16-bit data bus. The original
Apple Macintosh ,released in 1984, had the 8-MHz found at the core of it. It
was also found in the Macintosh Plus, the original Macintosh SE, the Apple
Laser-Writer IISC, and the Hewlett-Packard's LaserJet printer family. The
68000 was ve ....
|
Technological Literacy
10060 Words - 37 Pages.... at much broader social and cultural consequences of the impact of computer mediated communication and, even among educationists, concerns are not confined exclusively to pedagogical and curriculum issues. It seems that what is on everyone's mind are questions of significant and permanent social change seeping into every crevasse of our everyday work and private lives. Many of the issues that are being raised today, and which I will sketch out here, deal with abstract notions about the virtual and `real', about time and space, about `body-less' interactions and communities of learners, and so forth. I hope, however, that I have brought together the diversity of research, c ....
|
The Internet Beyond Human Control
958 Words - 4 Pages.... A
majority of high school students are minors. This is why most colleges are
hooked up online to the Internet system. The government is trying to figure out
ways to police the Internet so this will not happen. The problem with that is
it is a very hard task to do. It is almost guaranteed this will not happen for
another five to ten years.
Being hooked up online helps make high school easy to slide through. There is a
student at Chichester Senior High School that has a home computer hooked online
with the Internet system. So when he has a term paper due all he does is down
load a term paper on the system with the same topic. He just puts his name on
the paper, hands i ....
|
Power Generation In The Future What We Should Do In Australi
319 Words - 2 Pages.... the environment so that is why we should reduce the amount of operating plants. Doing this will reduce the amount of pollution that is released into the atmosphere. Coal power is also reliable.
Solar
Solar should only generate 15% because it is not a reliable power source: the sun does not shine 24 hours a day, 7 days a week in one spot. If the weather does change and the panels can’t generate the power required the nuclear plant/s can fluctuate to cope with the power needs of the general population. Solar power uses an infinite resource so it is worthwhile making use of.
Wind
Wind “farms” should be used in conjunction with Solar plants as more power will be ....
|
|
|
|
|
Copyright © 2006 Paper University |
|
|
|
|
|