NAVIGATE |
|
|
MEMBERS |
|
|
SUBJECTS |
|
|
|
Fiber Optics
Number of words: 1222 - Number of pages: 5.... high speed LASERs (Light Amplification through the Simulated Emission
of Radiation) or LEDs (Light Emitting Diodes). Each of these methods create a
highly focused beam of light that is cycled on and off at very high speeds.
Computers at the transmitting end convert data or voice into "bits" of
information. The information is then sent through the fiber by the presence, or
lack, of light. So, all of the data is sent light pulses. Computers on the
receiving end convert the light back into data or voice, so it can be used.
All of this seems to be a very "modern" concept, and the techno .....
Get This Paper
|
|
Why You Should Purchase A PC
Number of words: 1416 - Number of pages: 6.... three homes had a PC (Shelly, Cashman,& Waggoner, 138).
Computers are easy to use when you know how they work and what the parts
are. All computers perform the four basic operations of the information
processing cycle: input, process, output, and storage. Data, any kind of raw
facts, is required for the processing cycle to occur. Data is processed into
useful information by the computer hardware. Most computer systems consist of a
monitor, a system unit which contains the Central Processing Unit (CPU), a
floppy-disk drive, a CD-ROM drive, speakers, a keyboard, a mouse, and a printer .....
Get This Paper
|
|
Software And High School
Number of words: 609 - Number of pages: 3.... for
the first time through games and other entertaining software. These help develop
youth's mental pathway in the way of logic, reflexes and the ability to make
quick and concrete decisions [Lipcomb, 66]. The next step requires them to think
more seriously about the machines. Secondary students learn the first steps in
computer programming by creating simple programs. Here, the assistance of useful
software is necessary. The computer software has many applications in the real
world and is found virtually everywhere.
The new generation of very fast computers introduces us to a ne .....
Get This Paper
|
|
The Internet Beyond Human Control
Number of words: 958 - Number of pages: 4.... hooked up online helps make high school easy to slide through. There is a
student at Chichester Senior High School that has a home computer hooked online
with the Internet system. So when he has a term paper due all he does is down
load a term paper on the system with the same topic. He just puts his name on
the paper, hands it in, and receives an A. In return when he hits college life
he will not know how to write a term paper. This will cause him to drop out. I
know other students do the same thing he does. Now students will come out of
high school not well educated.
The Internet .....
Get This Paper
|
|
The Internet
Number of words: 1203 - Number of pages: 5.... the web,
no matter what the subject, one must know its exact location, else one is
compelled to dive into a muddy flood of shit. This leads me to the point of
clarifying the term "information":
This word usually has two meanings, a fact that contributes to
misunderstandings. It can mean a piece of wanted, useful and understandable
data or it can also mean any piece of data. When a stupid chick posts some
info that her doggie just pissed on the carpet and she includes on the web
page a picture of her with the dog, I wouldn't even call it "data". I call
it a scandal. And I waste my time down .....
Get This Paper
|
|
The Evolution Of Jet Engines
Number of words: 615 - Number of pages: 3.... alive in World War II. With
technological advances by the allies a prototype turbojet known as the "Heinkel
He 178" came into a few operational squadrons in the German, British, and the
American air forces towards the end of World War II. These jets finally helped
the allies to win the war against the axis powers(Smith 23-27).
A later development in the jet industry was the overcoming of the sound
barrier and establishing normal operations up to and beyond twice the speed of
sound. Also air force bombers and transports were able to reach and cruise at
supersonic speeds(Silverstein 56-70) .....
Get This Paper
|
|
The Office Of Tomorrow
Number of words: 3802 - Number of pages: 14.... phone and heads off to whatever nook or cranny he chooses. It might
be the company library, or a common area under a bright window. It could even be
the dining room or Student Union, which houses punching bags, televisions and a
pool table. Wherever he goes, a network forwards mail and phone pages to him and
a computer routes calls, faxes and E-mail messages to his assigned extension. He
simply logs onto the firm's computer system and accesses his security-protected
files.
He is not tethered to a specific work area nor forced to function in any
predefined way. Joe Smith spends mornin .....
Get This Paper
|
|
The Arrival Of Email
Number of words: 439 - Number of pages: 2.... the antitrust case against Microsoft "E-mail messages dashed off years
ago by the Microsoft Corp. chairman and his top lieutenants now figure
prominently as digital "smoking guns" . . . Trustbusters say electronic
messages, perhaps more than any paper document, could help them prove that
Microsoft sought to crush competitors and monopolize access to the
Internet." However, Microsoft is not alone. Morgan Stanley Dean Witter & Co.
recently agreed to settle a discrimination lawsuit initiated by employees.
"The smoking gun: an E-mailed joke, playing on stereotype s about African-
American speech .....
Get This Paper
|
|
Telecommunications Device For The Deaf (TDD)
Number of words: 360 - Number of pages: 2.... on the
cradle of his TDD machine and both parties begin communicating. While
one party types the other party reads. Unfortunately, TDD machines only
have half-duplex capabilities. This means that only one person at a time
can type. On that account, people who use TDD machines use letters that
represent word-signals, which aid in the process of keeping the
conversation flowing. For instance, when one person says, “Hello, this is
Mike,” he uses the letter GA, which stands for, go ahead, to signal to the
receiving party that he is finished typing. When either party wants to e .....
Get This Paper
|
|
Computer Crimes
Number of words: 1512 - Number of pages: 6.... "Avid young computer hackers in their preteens and
teens are frequently involved in computer crimes that take the form of
trespassing, invasion of privacy, or vandalism. Quite often they are mearly out
for a fun and games evening, and they get entangled in the illegal use of their
machines without realizing the full import of what they are doing", I have a
hard time believing that so lets see what a "hacker" has to say about what he
does "Just as they were enthraled with their pursuit of information, so are we.
The thrill of the hack is not in breaking the law, it's in the pursuit and
capture .....
Get This Paper
|
|