NAVIGATE |
|
|
MEMBERS |
|
|
SUBJECTS |
|
|
|
The Year 2000 Bug
Number of words: 1942 - Number of pages: 8.... and the power cuts out, then the gates wont go down and people will be in a lot of trouble. (Also, what happens if the power goes out in a hospital? (Also see “WHAT IS Y2K” later on)
Food is one essential thing that is crucial to survival and many people think that we may need lots of canned and dry goods. As in any crisis situation, some believe that the worst will happen: We will all die, go to war, or the world will explode, etc. Then again, others think that maybe we should be prepared just in case all of our electricity goes out and we have no way to store our goods. Personally .....
Get This Paper
|
|
Military Technology
Number of words: 1548 - Number of pages: 6.... are the navigation of a submarine and intelligent long-range missiles. What most people associates with computers and war may be various simulation and action games. This is big business for software developers and merchandisers all over the world. As in all businesses money is the most important criteria for the big companies so they have no morale problems with making warfare into entertainment as long as it\'s selling. The same goes for the film industry, but at least some war films also describe the pain and hopelessness of war. So far I\'ve never seen a computer game capable .....
Get This Paper
|
|
Government Intervention Of The Internet
Number of words: 2350 - Number of pages: 9.... To be found on the Internet is a huge collection of obscene graphics, Anarchists' cookbooks and countless other things that offend some people. With over 30 million Internet users in the U.S. alone (only 3 million of which surf the net from home), everything is bound to offend someone. The newest wave of laws floating through law making bodies around the world threatens to stifle this area of spontaneity. Recently, Congress has been considering passing laws that will make it a crime punishable by jail to send "vulgar" language over the net, and to export encryption software. No .....
Get This Paper
|
|
Computer Communications
Number of words: 950 - Number of pages: 4.... my dad brought home from work ran monthly stories on
communications-program this, and Internet-system that. Cleveland Freenet's
Freeport software began appearing on systems all over the world, in places as
far away as Finland and Germany - with free telnet access!
I didn't live life as a normal twelve-year-old kid that summer. I sat in front
of the monitor twenty-four hours a day, eating my meals from a plate set next to
the keyboard, stopping only to sleep. When I went back to school in the fall, I
was elected the first president of Teleport 2000, partially because I was the
only student in .....
Get This Paper
|
|
Protecting A Computer
Number of words: 2495 - Number of pages: 10.... by the flood of coffee. Besides, human
caretaker of computer system can cause as much as harm as any physical hazard.
For example, a cashier in a bank can transfer some money from one of his
customer's account to his own account. Nonetheless, the most dangerous thief
are not those who work with computer every day, but youthful amateurs who
experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for
classmates who labored nights in the computer lab. In the beginning, hackers are
not so dangerous at all. They just stole computer time .....
Get This Paper
|
|
Computer Crimes
Number of words: 1152 - Number of pages: 5.... computer crime prosecutions were reported in the United States in 1986, according to the National Center for Computer Crime Data in Santa Cruz, Calif. By 1989, that number jumped to 500 prosecutions. that year cost businesses and banks and, ultimately, consumers about $500 million. "As the use of computers has increased, so has their criminal misuse" (Parker 54:G13). Computers are used to obtain credit card numbers, which are then used to order thousands of dollars worth of whatever the hackers want.
"In recent years, individual outlaws and entire "gangs" have broken into comp .....
Get This Paper
|
|
Will Computers Control Humans In The Future?
Number of words: 865 - Number of pages: 4.... Tomorrows, Profession 55). People would not chose to study, they would
only want to be educated by computer tapes. Putting in knowledge would take
less time than reading books and memorizing something that would take almost no
time using a computer in the futuristic world that Asimov describes. Humans
might began to rely on computers and allow them to control themselves by letting
computers educate people. Computers would start teaching humans what computers
tell them without having any choice of creativity. Computers would start to
control humans' lives and make humans become too depe .....
Get This Paper
|
|
Computer Crimes: Laws Must Be Pass To Address The Increase In Computer Crimes
Number of words: 1905 - Number of pages: 7.... they are usually bright,
eager, highly motivated, adventuresome, and willing to accept technical
challenges."(Shannon, 16:2)
"It is tempting to liken computer criminals to other criminals, ascribing
characteristics somehow different from
'normal' individuals, but that is not the case."(Sharp, 18:3) It is believed
that the computer criminal "often marches to the same drum as the potential
victim but follows and unanticipated path."(Blumenthal, 1:2) There is no actual
profile of a computer criminal because they range from young teens to elders,
from black to white, from short to tall.
Defini .....
Get This Paper
|
|
Internal Combustion Engines
Number of words: 3046 - Number of pages: 12.... much
large than this. Internal combustion engines are particularly appropriate for
seasonal industries, because of the small standby losses with these engines
during the shutdown period.
History
The first experimental internal combustion engine was made by a Dutch
astronomer, Christian Huygens, who, in 1680, applied a principle advanced by
Jean de Hautefeuille in 1678 for drawing water. This principle was based on the
fact that the explosion of a small amount of gunpowder in a closed chamber
provided with escape valves would create a vacuum when the gases of combustion
cooled. .....
Get This Paper
|
|
Computer Crime In The 90's
Number of words: 1554 - Number of pages: 6.... hackers in their preteens and teens are frequently involved in
computer crimes that take the form of trespassing, invasion of privacy, or
vandalism. Quite often they are mearly out for a fun and games evening,
and they get entangled in the illegal use of their machines without
realizing the full import of what they are doing" , I have a hard time
believing that so lets see what a "hacker" has to say about what he does
"Just as they were enthraled with their pursuit of information, so are we.
The thrill of the hack is not in breaking the law, it's in the pursuit and
capture of kno .....
Get This Paper
|
|