NAVIGATE |
|
|
MEMBERS |
|
|
SUBJECTS |
|
|
|
Object Oriented Analysis
Number of words: 666 - Number of pages: 3.... System Specification, introduced model-based software engineering. Demarco thought that complex software systems should be built like any large, complex engineering system, by first building working paper models of the system before committing the resources for implementation. This allowed the user to visualize the future system. Most modern approaches have integrated some form of Demarco’s philosophy. The variation in approaches is based on the kinds of models that should be built, how they should be built, and who should build them. A generic model-based software-engineering life .....
Get This Paper
|
|
Semiconductors : The Silicon Chip
Number of words: 1438 - Number of pages: 6.... diodes (LED), photosensors, strain
gages, solar cells, charge transfer devices, radiation detectors and a
variety of other devices. Silicon belongs to the group IV in the periodic
table. It is a grey brittle material with a diamond cubic structure.
Silicon is conventionally doped with Phosphorus, Arsenic and Antimony and
Boron, Aluminum, and Gallium acceptors. The energy gap of silicon is 1.1
eV. This value permits the operation of silicon semiconductors devices at
higher temperatures than germanium.
Now I will give you some brief history of the evolution of electronics
which wil .....
Get This Paper
|
|
Computer Security
Number of words: 2495 - Number of pages: 10.... coffee. Besides, human caretaker of computer system can cause as much
as harm as any physical hazard. For example, a cashier in a bank can
transfer some money from one of his customer's account to his own account.
Nonetheless, the most dangerous thief are not those who work with
computer every day, but youthful amateurs who experiment at night --- the
hackers.
The term "hacker "may have originated at M.I.T. as students'
jargon for classmates who labored nights in the computer lab. In the
beginning, hackers are not so dangerous at all. They just stole computer
time from the university. Ho .....
Get This Paper
|
|
Truth And Lies About The Computer Virus
Number of words: 1126 - Number of pages: 5.... harmful is that the anti-virus companies could write viruses in
order to sell their programs. Software companies have and do distort the truth
about viruses. "Antivirus firms tend to count even the most insignificant
variations of viruses for advertising purposes. When the Marijuana virus first
appeared, for example, it contained the word "legalise," but a miscreant later
modified it to read "legalize." Any program which detects the original virus can
detect the version with one letter changed -- but antivirus companies often
count them as "two" viruses. These obscure differentiatio .....
Get This Paper
|
|
Ethics In Cyberspace
Number of words: 940 - Number of pages: 4.... intellectual property
7) respect the privacy of others
8) honor confidentiality.
The very nature of electronic communication raises new moral issues.
Individuals and organizations should be proactive in examining these concerns
and developing policies which protect liabilities. Issues which need to be
addressed include: privacy of mail, personal identities, access and control of
the network, pornographic or unwanted messages, copyright, and commercial uses
of the network. An Acceptable Use Policy (AUP) is recommended as the way an
organization should inform users of expe .....
Get This Paper
|
|
Osi Model
Number of words: 583 - Number of pages: 3.... and, at the other end, when the message arrives, another flow of data up through the layers in the receiving computer. The actual programming and hardware that makes these seven layers of function is usually a combination of the computer OS, applications, TCP/IP and the software and hardware that enable you to put a signal on one of the lines attached to your computer. OSI divides communication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lower three layers are used when any message passes through the host co .....
Get This Paper
|
|
Computer Programming
Number of words: 631 - Number of pages: 3.... by a
reasonably sophisticated end user. The main disadvantage is that RAD tools
often require code to be written, which will result in most developers probably
having to learn to program using the underlying programming language, except in
the case of the simplest applications. The time gained from using a RAD tool
can be immense, however: Programmers using IBM's VisualAge report the ability
to create up to 80 percent of an application visually, with the last 20 percent
consisting of specialized functions, which means by using and IBM program it is
much easier because most of the progr .....
Get This Paper
|
|
Get Informed! - Buying The Right Computer
Number of words: 801 - Number of pages: 3.... drive space
you need. The bigger the program, the more space it takes to save physically.
I wouldn't suggest buying anything under a 2 geg hard drive. Why? Because by
the time you load you system (Windows95, DOS) and other software; your hard
drive is already filled up. How are you going to save your document you wrote
in WordPerfect when your hard drive is full? It's usually cheaper in the long
run to buy the biggest hard drive available. Plus, you always want to have room
for your games. After all, who wants to spend their whole life working?
As far as processors, I suggest the .....
Get This Paper
|
|
Investigative Report Of Internet Addiction
Number of words: 3525 - Number of pages: 13.... The percentage of the Internet domains
3. Will the equation people = Internet Users be true in 2001?
ABSTRACT
The problem of Internet addiction is not very noticeable now and that's why not
many people are taking it seriously, but what these people are failing to see is
the connection between the very rapid growth of the Internet and the addiction
problem. It is really simple logic the bigger the Internet get the more users
will be which will lead to a bigger number of addicts that can have their lives
as well as others corrupted by this behavior. The main objective of this paper
is .....
Get This Paper
|
|
Technological Developments
Number of words: 973 - Number of pages: 4.... in Ted Mooney\'s 1981 novel, Easy Travel to Other Planets. There, Mooney describes \"A Case of Information Sickness\" in the following terms:
If information was once considered the solid ground, the \"factual\" basis, on which to make decisions and take actions, it no longer seems to be so. Indeed, information no longer seems to be solid at all. Not only does it not provide a grounding, a foundation, from which to see, know, or act, it comes to be seen as obscuring our vision, our attempts at knowledge, our ability to control the forces of the world. Information, it might be argue .....
Get This Paper
|
|