NAVIGATE |
|
|
MEMBERS |
|
|
SUBJECTS |
|
|
|
Internet
Number of words: 1085 - Number of pages: 4.... the comforts of home. I know that a young teenager can productively use this information. I have been using the net for about eight years for my reports and personal knowledge quests. My father would check on me every now and again to make sure I was on task. Not only was he keeping what I viewed pg13, he was helping me use different search engines and being my troubleshooter until I could surf the web by myself. Lots of the children now days are just tuned loose with a computer and not checked on until suppertime or bedtime. With that much freedom come temptation, this leads to the childre .....
Get This Paper
|
|
The Anti-Trust Case Against Microsoft
Number of words: 2573 - Number of pages: 10.... more, until finally
in August of 1993, (Check 1)the Federal Trade Commission decided to hand
the case over to the Department of Justice. The Department of Justice moved
quickly, with Anne K.
Bingaman, head of the Antitrust Division of the DOJ, leading the way.(Check
1) The case was finally ended on July 15, 1994, with Microsoft signing a
consent settlement.(Check 1)
The settlement focused on Microsoft’s selling practices with computer
manufacturers. Up until now, Microsoft would sell MS-DOS and Microsoft’s
other operating systems to original equipment manufacturers (OEM’s) at a
60% d .....
Get This Paper
|
|
The Internet
Number of words: 1187 - Number of pages: 5.... it. If one point in the network were blown up, the whole network would become useless. Paul Baran, one of the Rand thinkers on the project, conceived the idea for a new kind of communications network that wasn't organized point-to-point, but instead was set up more like a fishnet. He believed this structure could allow information to find its own path through the network even if a section had been destroyed. His eleven-volume report for the Pentagon was eventually shelved, but younger engineers realized that he had hit on an essential idea. Although Baran's ideas were overlooked at that t .....
Get This Paper
|
|
Microprocessors
Number of words: 2468 - Number of pages: 9.... of a chip operate can be found in How Microprocessors Work. In their
book, Wyant and Hammerstrom describe a microprocessor as a factory and all of
the inner workings of the chip as the various parts of a factory (Wyant and
Hammerstrom, 71-103). Basically a microprocessor can be seen as a factory
because like a factory it is sent something and is told what to do with it. The
microprocessor factory processes information. This most basic unit of this
information is the bit. A bit is simply on or off. It is either a one or a zero.
Bits are put into 8 bit groups called bytes. The numb .....
Get This Paper
|
|
The Internet Contributes To The Process Of Globalization
Number of words: 895 - Number of pages: 4.... via the Internet illustrates the ability of the Internet to span the globe and in essence create a unified sense of shared memories. Furthermore it is immutable proof that the Internet is perhaps the most powerful tool of globalization
It has been argued that the opening presumption that there exists a "coercive, sometimes wholly unconscious force of American imperialism over the Net." It's a statement that depends on some obsolete notions about the nation-state, propaganda, media, and imperialism. The Internet doesn't promote imperialism - it eradicates it. The underlying force thre .....
Get This Paper
|
|
Is Your Information Safe?
Number of words: 1521 - Number of pages: 6.... and all are linked together via the
Internet or other networks. More than a hundred million electronic messages
travel through cyberspace every day, and every piece of information stored in a
computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank
robbers have become today's computer hackers. They can walk away from a computer
crime with millions of virtual dollars (in the form of information they can use
or sell for an enormous profit). Walking away is precisely what they do. The
National Computer Crimes Squad estimates that 85-97 % of the time, theft of
informati .....
Get This Paper
|
|
Cryptography
Number of words: 1227 - Number of pages: 5.... to first understand what a hacker does and what a cracker does. A hacker likes to work with computers and tries hard to figure out how they work. A Cracker has malicious intent, a hacker may or may not intend to commit an act of fraud. It is possible to be a hacker and a cracker at the same time. Crackers like to break into systems for the pure joy of destroying. Some hackers have decided to help system administrators either make their system more secure or catch a person who has committed a computer crime. This is where I fit in I anonymously help others find security leaks and help them s .....
Get This Paper
|
|
Coputers In Modern Society
Number of words: 983 - Number of pages: 4.... data about 4 times faster than
conventional phone lines (about 28,000 bits per second has been quadrupled to
about 128,000 bits per second. As speed enhances, memory and storage space is
needed to hold excess information. EDO RAM is a new, faster memory module that
helps transfer RAM data twice as fast as normal RAM. For long term storage of
large amounts of data, hard drives have been under a constant upgrade of
performance, and it is not uncommon to find hard drives about 8-9 gigabytes on
the market.
Along with technology, an ease of use factor has been instilled in the
modern day .....
Get This Paper
|
|
Essay On Hacking
Number of words: 580 - Number of pages: 3.... sometimes you type ftp:// before the name of the site.
This simply means File transfer protocol. You use this when download image
files or any other files. Now, onto hacking. Most people stereotype people
simply as "HACKERS," but what they don't know is that there are three different
types of computer whizzes.
First, there are hackers. Hackers simply make viruses and fool around
on the internet and try to bug people. They make viruses so simple. The get
a program called a virus creation kit. This program simply makes the virus of
beholders choice. It can make viruses that sim .....
Get This Paper
|
|
History Of The Computer Industry In America
Number of words: 2604 - Number of pages: 10.... took place in 1694 when Blaise Pascal invented the first digital
calculating machine. It could only add numbers and they had to be entered by
turning dials. It was designed to help Pascal's father who was a tax collector
(Soma, 32).
In the early 1800, a mathematics professor named Charles Babbage
designed an automatic calculation machine. It was steam powered and could store
up to 1000 50-digit numbers. Built into his machine were operations that
included everything a modern general-purpose computer would need. It was
programmed by and stored data on cards with holes punched .....
Get This Paper
|
|