|
|
|
|
 |
|
|
Technology Term Papers and Reports |
|
|
The Computer Underground
15764 Words - 58 Pages.... of the "computer underground"
(CU). The CU is composed of actors in three roles, "computer hackers,"
"phone phreaks," and "software pirates." These roles have frequently been
ignored or confused in media and other accounts of CU activity. By
utilizing a data set culled from CU channels of communication this paper
provides an ethnographic account of computer underground organization. It
is concluded that despite the widespread social network of the computer
underground, it is organized primarily on the level of colleagues, with
only small groups approaching peer relationships.
Certification: In accordance with departmental and Graduate
School policies, this ....
|
Battle Of Computer Bytes
1008 Words - 4 Pages.... the ease of use on a Mac. The Windows 95 interface is much better than Windows 3.x. It borrows some from the Macintosh interface and has improved on it.
Some improvements are the ability to work with folder icons that represent directories and subdirectories in DOS. Windows 95, unlike the Mac, logically groups data and resources. A Taskbar menu lets you call up and switch between any software application at any time. Thus feature is better than the Mac's because its use is more obvious. It clearly shows what is running and allows you to switch programs with a single click of the mouse. Control panels have been added so you can configure your hardware. There is easy acc ....
|
Radio: A Form Of Communication
3073 Words - 12 Pages.... waves is retrieved and presented in an
understandable form. This form may be sound from a loudspeaker, a picture on a
television, or a printed page from a teletype machine.
HISTORY
Early Experimenters
The principles of radio had been demonstrated in the early 1800s by such
scientists as Michael Faraday and Joseph Henry. They had individually developed
the theory that a current flowing in one wire could induce (produce) a current
in another wire that was not physically connected to the first.
Hans Christian Oersted had shown in 1820 that a current flowing in a wire sets
up a magnetic field around the wire. If the current is made to change and, in
particular, made to ....
|
Making Utilities For MS-DOS
4348 Words - 16 Pages.... for that
platform. In particular, proper documentation is essential for such a platform.
Not providing enough documentation for a system that everyone uses can have
disastrous results. Think of it, an operating system is useless by itself, its
sole purpose is to provide services to applications. And who would be able to
develop applications for an operating system if the documentation for that
system is confidential and available only to the company that developed it?
Obviously, only the company that has developed that operating system will be
able to develop software for it. And this is a violation of the Antitrust Law.
And now I start having a suspicion that this is ....
|
The Internet: How It Works And How It Effects The World
1646 Words - 6 Pages.... enemy attack.
The ARPANET was very successful, and every university in the country wanted
to sign up. Because so many people wanted to use the Net, ARPANET started
getting hard to manage, especially with many university sites on it.
Therefore, it was broken into two parts: MILNET, which had all the military
sites, and ARPANET, which had all the nonmilitary sites. "The two
networks remained connected, however, thanks to a
technical scheme called IP (Internet Protocol), which enabled traffic to be
routed from one net to another as needed. All the networks connected by IP
in the Internet speak IP, so they can all exchange messages." (Levine 12)
Even though there were onl ....
|
Computer Security
2026 Words - 8 Pages.... So, people
may ask a question: Can we make sure that the information in the computer
is safe and nobody can steal it from the memory of the computer?
Physical hazard is one of the causes of destroying the data in the
computer. For example, send a flood of coffee toward a personal computer.
The hard disk of the computer could be endangered by the flood of coffee.
Besides, human caretaker of computer system can cause as much as harm as
any physical hazard. For example, a cashier in a bank can transfer some
money from one of his customer's account to his own account. Nonetheless,
the most dangerous thief are not those who work with computer every day,
but youthful amateurs ....
|
Computer Crime Is Increasing
1410 Words - 6 Pages.... and executed; an example is the transfer of money
balances in accounts to perpetrators' accounts for withdrawal. Computers are
instruments of crime when they are used to plan or control such criminal acts.
Examples of these types of crimes are complex embezzlements that might occur
over long periods of time, or when a computer operator uses a computer to steal
or alter valuable information from an employer.
Variety and Extent
Since the first cases were reported in 1958, computers have been used for most
kinds of crime, including fraud, theft, embezzlement, burglary, sabotage,
espionage, murder, and forgery. One study of 1,500 computer crimes established
that most of t ....
|
Software And High School
609 Words - 3 Pages.... The proper choice of
software is very important especially for beginners. Their first encounter with
the computer should be exiting and fun. It should stimulate their interest in
the computing field.
First and foremost is the fact that computer software is a very
important educational tool. Students in high schools experience computers for
the first time through games and other entertaining software. These help develop
youth's mental pathway in the way of logic, reflexes and the ability to make
quick and concrete decisions [Lipcomb, 66]. The next step requires them to think
more seriously about the machines. Secondary students learn the first steps in
computer p ....
|
|
|
|
|
Copyright © 2006 Paper University |
|
|
|
|
|