NAVIGATE |
|
|
MEMBERS |
|
|
SUBJECTS |
|
|
|
Linux Operating System
Number of words: 998 - Number of pages: 4.... for Linux because it must be 30-40 MB. Also, it has firewall system to protect the network from hackers. This minimizes the number of viruses capable of affecting a Linux system. If we think about it, there are many viruses for Windows that can harm your system. Linux is a stable Operating System. You can kill an individual process that is not replying with kill command vs. shutting down your system in Windows. Linux has true multitasking properties. You can run up to twelve processes at the same time with no performance loss. Microsoft claims that Windows has the capability of mul .....
Get This Paper
|
|
How Cell Phones Work
Number of words: 999 - Number of pages: 4.... cell phones incredible range. A walkie-talkie can transmit perhaps a mile. A CB radio, because it has much higher power, can transmit perhaps 5 miles. Someone using a cell phone, on the other hand, can drive clear across a city and maintain a conversation the entire time. Cells are what give a cell phone its incredible
range (Anonymous #2).
The genius of the cellular system is the realization that a city can be chopped up into small cells, and that the cells allow extensive frequency reuse across a city. Frequency reuse is what lets millions of people own cell phones without problems. It wo .....
Get This Paper
|
|
Computer Security
Number of words: 2026 - Number of pages: 8.... the flood of coffee.
Besides, human caretaker of computer system can cause as much as harm as
any physical hazard. For example, a cashier in a bank can transfer some
money from one of his customer's account to his own account. Nonetheless,
the most dangerous thief are not those who work with computer every day,
but youthful amateurs who experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon
for classmates who labored nights in the computer lab. In the beginning,
hackers are not so dangerous at all. They just stole computer time from the
u .....
Get This Paper
|
|
The Bulgarian And Soviet Virus Factories
Number of words: 9220 - Number of pages: 34.... author had completely missed the fact that the majority of PC users are
not experienced programmers.
A few months later, in the fall of the same year, two men came in the
editor's office of the magazine and claimed that they have found a computer
virus. Careful examination showed that it was the VIENNA virus.
At that time the computer virus was a completely new idea for us. To make a
computer program, whose performance resembles a live being, is able to
replicate and to move from computer to computer even against the will of
the user, seemed extremely exciting.
The fact that "it can be do .....
Get This Paper
|
|
Computer Crime 3
Number of words: 897 - Number of pages: 4.... and mischief, all which are easily defined and subject to criminal sanctions. The computer has also brought along with it a host of potentially new misuses or abuses that may, or should be criminal as well.
The problem with today’s computer crimes are that the criminal justice
systems have not been able to keep up with the technological change. Only a few
countries have adequate laws to address the problem, and of these, not one has
addressed all the legal, enforcement and prevention problems. The problem with
the legal system is that it has always been a system with limits. The .....
Get This Paper
|
|
Speech Recognition Technology
Number of words: 2718 - Number of pages: 10.... that already utilize speech recognition are Charles Schwab & Co., American Express, United Airlines, NationsBank, United Parcel Service, British Airways, and Sears Roebuck and Co. These companies focus on the fastest growing parts of the speech market, where the caller's voice replaces punching in letters and numbers on the telephone keypad. The other applications of speech technology are for the use of consumers. The users' voice can give computer commands as well as dictate speech into text.
All operating systems used today are Graphic User Interfaces (GUI's), but "future computers wil .....
Get This Paper
|
|
Internet Site Evaluations
Number of words: 2253 - Number of pages: 9.... is not a reliable idea. Why? Because the authorship of the source, probably the most important criterion one must use in evaluating the effectiveness of a website, is sometimes debatable. The author of a website can be anyone. It can be ones next door neighbour, someone whom was met last week at a bar or a world renowned open heart surgeon who was on television just three days ago. Before beginning to delve into a site, make sure that authorship meets one of two sub-criterion: if reviewing a site in ones own general area of expertise, be certain that the author is a trusted and wel .....
Get This Paper
|
|
Where Did UNIX Come From And Why Are There Different Versions Of UNIX?
Number of words: 276 - Number of pages: 2.... multi-tasking small operating
system and they chose the name UNIX. Their initial goal was simply to operate
their DEC PDP machines more effectively. In 1971, UNIX became multi-user and
multi-tasking, but it was still just being developed by a small group of
programmers who were trying to take advantage of the machines they had at hand.
(In other words, this operating system that they were developing did not run on
any machine made by Bell!)
In 1973, Dennis Ritchie rewrote the UNIX operating system in C (a language he
had developed.) And in 1975, the portability of the C programmin .....
Get This Paper
|
|
Natural Language Processing
Number of words: 1914 - Number of pages: 7.... applied, accurate Natural
Language Processing will exist.
Alan Turing predicted of NLP in 1950 (Daniel Crevier, 1994, page 9):
"I believe that in about fifty years' time it will be possible to
program computers .... to make them play the imitation game so well that an
average interrogator will not have more than 70 per cent chance of making the
right identification after five minutes of questioning."
But in 1950, the current computer technology was limited. Because of
these limitations, NLP programs of that day focused on exploiting the strengths
the computers did have. For example, a .....
Get This Paper
|
|
Censorship Online
Number of words: 500 - Number of pages: 2.... cost of s descent system and software and the
technology that moves at lightning speed. The computer you buy tomorrow will
not be able to handle any of the new software two years from now. Owners must
not only keep up with the new trends but must also be well aware of what their
own system can sustain so that they do not overload it and cause it to crash.
This article focuses on interactive video, which is a relatively new field in
the gaming industry. The games that have been on the market have not lived up
to the bombardment of advertising gamers have been subjected to. The vide .....
Get This Paper
|
|