Paper University  
Search Papers:   
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CONTACT US
PAPER CATEGORIES
       Arts & Movies
       Book Reports
       Creative Writing
       English
       Finance & Money
       Geography & Places
       History
       Legal Issues
       Medicine & Nutrition
       Miscellaneous
       Music & Musicians
       People & Biographies
       Poetry & Poets
       Politics & Government
       Religion
       Science & Nature
       Society
       Technology
 
Technology Term Papers and Reports
Viruses
3001 Words - 11 Pages

.... recorded. These numbers are looked at by hackers and then used again, when the hacker calls up the number and gets on he's presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are do ....


Classification Analysis
565 Words - 3 Pages

.... The term 'output' consists of all components that display words and graphics so that a person can see them. Many people can easily understand why the monitor is a form of output device since it is the screen that tells them what the computer is actually doing. Simply put, without a monitor, the computer itself is basically useless. Another form of output, which is rarely noticed by many computer users however, is the printer. Many people have probably used a printer before, but it is just that they never realize it is also a form of output. As opposed to 'output', 'input' consists of components that take in information from the users themselves so that the comp ....


Smart Cards
216 Words - 1 Pages

.... users, to securing access to PCs and corporate networks, and speeding transportation by using electronic ticketing. The most common uses of today are: banking and retail, mo-bile communications, information technology, identity and health, park-ing, public telephony, mass transit and campus ID solutions; and areas of use increase every day. One of the most fast developing areas of use is Banking and Retail. For business of financial transactions is very competitive and fast-changing, banks are always seeking for new valuable services for their customers. give an ability to deploy and manage multiple ap-plications on a wallet-size plastic card. Smart card technology also ....


The Torpedoes
356 Words - 2 Pages

.... or contact detonators. The Zaunköning (Gnat) came into service during the autumn of 1943. Intended to be an escort-killer, it achieved some early minor success only to be countered by the allied Foxer noise-making decoy. It was scoring hits against escort and merchants to the end of the war though. The weapon was designed to lock onto the loudest noise after a run of 400m from its launch. This often proved to be the U-boat itself and standard issue-orders were to dive immediately to depth of 60m after launch from a bow tube while a stern shot was to be followed by a complete silence in the boat. Two U-boats were almost certainly lost when hit by one of their own T5 tor ....


A Tour Of The Pentium Pro Processor Microarchitecture
2646 Words - 10 Pages

.... features, which Intel describes as Dynamic Execution, enabled the first Pentium Pro processor silicon to exceed the original performance goal. Building from an already high platform The Pentium processor set an impressive performance standard with its pipelined, superscalar microarchitecture. The Pentium processor's pipelined implementation uses five stages to extract high throughput from the silicon - the Pentium Pro processor moves to a decoupled, 12-stage, superpipelined implementation, trading less work per pipestage for more stages. The Pentium Pro processor reduced its pipestage time by 33 percent, compared with a Pentium processor, which means the Pentium Pro proces ....


Lasers And Their Uses
843 Words - 4 Pages

.... or other substance-are excited so that more of them are at higher energy levels than are at lower energy levels. If a photon whose frequency corresponds to the energy difference between the excited and ground states strikes an excited atom, the atom is stimulated, as it falls back to a lower energy state, to emit a second photon of the same frequency, in phase with and in the same direction as the bombarding photon. This process is called stimulated emission. The bombarding photon of the emitted photon may then strike other excited atoms, stimulating further emission of photons, all of the same frequency and phase. This process produces a sudden burst of coherent radiation ....


The Paperless(?) Office
474 Words - 2 Pages

.... does a company make sure that when an electronic communication is sent only the person it is intended for will read it? How does a company make sure private information does not make the evening news? 2. Are certain types of information more readily amenable to digital processing in a paperless office than others? If so, why; if not, why not? It would seem that some types of information are better in paperless form, while some are not. Implementing an e-mail system can do wonders for companies. The e-mail sessions allow managers to get more information across to the employees and vice versa. This is a way to make sure everyone will access to the same information ....


OpenVMS: Using A Virtual Operating System By The International Securities Exchange
961 Words - 4 Pages

.... Securities Exchange wants to implement this virtual operating system. Where and what is OpenVMS? OpenVMS was originally called VMS (Virtual Memory System); it was first brought into existence in 1976 as a new operating system for Digital's new, 32-bit, virtual memory line of computers, named VAX (Virtual Address eXtension). The designers of OpenVMS were Dave Cutler and Dick Hustvedt, it was designed entirely within Digital Equipment Corporation (DEC). OpenVMS is a 32-bit, multitasking, multiprocessing virtual memory operating system. OpenVMS currently runs on Digital's VAX and Alpha computer systems. Digital Equipment Corporation owned the operating system. It wasn't un ....



« prev  46  47  48  49  50  51  52  53  54  55  next »

 
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CANCEL MEMBERSHIP CONTACT US
Copyright © 2006 Paper University