Monster Essays - Thousands of essays
Enter Essay Topic:   
 

A Cray SuperComputer Comes To The University Of Toronto

.... in one clock cycle. This power is measured in Millions of Floating Point Operations Per Second (MFLOPS) - which is to say the rate at which floating-point operations can be performed. The Cray MFLOPS vary as it does many activities, but a rate of up to 210 MFLOPS (per CPU) can be achieved. The second '2' in the X-MP/22 title refers to the two million 64-bit words (16Mb) of shared central memory. This can be expanded to four million words in the future if the need arises. But it doesn't stop there! The Cray can pipe information back and forth between the CPU memory and the Input/Output Subsystem (IOS). The IOS then takes .....

[ Download This Essay Now ] Number of words: 697 | Number of pages: 3

Object-Oriented Database Management Systems

.... or under development today share a set of fundamental object-oriented concepts. Therefore the implementation issues in OODBMSs that arise due to these concepts are universal. The third characteristic is that of experimental activity. Plenty of prototypes have been implemented and some ! of them became commercial products. There is really a need for applications to handle very complex data and that is why the interest of people in building such systems is so strong. Although there is no consensus on what an OODBMS is and which are the features that differentiate it from other systems, there has been a lot of effort for .....

[ Download This Essay Now ] Number of words: 3220 | Number of pages: 12

A Look At Public Key Encryption

.... the V back to an R, and figure out where to meet. Theses two examples are on opposite sides of the spectrum, but both have their similarities and their differences. The major difference complexity, the government pays mathematicians to research complex algorithms by which to encode the messages, like the system used by Captain Video but these algorithms are complex enough that if you tried to crack them it would take you decades with even the most powerful computer today. This complex mathematical code is what makes the text secure to anyone who tries to crack it. Some similarities we can find in these two examples are their u .....

[ Download This Essay Now ] Number of words: 1216 | Number of pages: 5

Even From It's Humble Beginnings, The Internet Has Always Been A Battlefield Between Phreaks And Administrators

.... for years. The Internet is just a new fad ("The More I Learn" A1). The Internet originally began as DARPANET, a government-created network, which was designed for defense communications. The Net structure is such that it could survive a nuclear war ("Internet History"). The creation of the Net can not be blamed for the existence of hackers though, hackers are older than the Net itself, but the Net is the largest 'hacker haven' today (Spencer, "Hacking McDonalds" 6). The growth of the Net since its creation has been nothing less than astounding. In the 25-plus years since its creation, the Net now has over thirty million u .....

[ Download This Essay Now ] Number of words: 1768 | Number of pages: 7

Classification Analysis

.... is just that they never realize it is also a form of output. As opposed to 'output', 'input' consists of components that take in information from the users themselves so that the computer will know the tasks it is supposed to perform and accomplish. The keyboard is classified as a form of input because this is where the users enter commands and text. There are many other forms of input as well. Nonetheless, many people just don't realize them, or are too lazy to classify them. For instance, the mouse belongs to input, since it provides a floating pointer on the screen so that the users can access commands faster and easie .....

[ Download This Essay Now ] Number of words: 576 | Number of pages: 3

As A Technology, It Is Called Multimedia

.... thing about the multimedia boom, is that so many moguls are spending such vast sums to develop digital technologies, for the delivering of programs and services which are still largely hypothetical. So what is behind such grand prophecies? Primarily, two technological advances known as digitization (including digital compression), and fibre optics. Both are indispensable to the high-speed networks that will deliver dynamic new services to homes and offices. Digitization means translating information, either video, audio, or text, into ones and zeros, which make it easier to send, store, and manipulate. Compression squee .....

[ Download This Essay Now ] Number of words: 1651 | Number of pages: 7

Internet Regulation: Policing Cyberspace

.... from its agencies. This material is not lawfully available through the mail or over the telephone, there is no valid reason these perverts should be allowed unimpeded on the Internet. Since our initiative, the industry has commendably advanced some blocking devices, but they are not a substitute for well-reasoned law.4 Because the Internet has become one of the biggest sources of information in this world, legislative safeguards are imperative. The government gives citizens the privilege of using the Internet, but it has never given them the right to use it. They seem to rationalize that the framers of the constitu .....

[ Download This Essay Now ] Number of words: 1343 | Number of pages: 5

Government Censorship Would Damage The Atmosphere Of The Freedom To Express Ideas On The Internet; Therefore, Government Should Not

.... body of legislation, it is important to explore the controversy, and the current problems involved with the Net as it exists must be introduced. 1. The problem that concerns most people is offensive materials such as pornography. 2. Another crucial internet crime is the stealing of credit card numbers. III. One reaction to this inapplicability has been the "Censor the Net" approach (the censorship bill), we are now to compare its advantages and disadvantages. 1. First, the meaning of "Censoring the Net" must be explained. 2. However, many experts have pointed out that government censorship is not possible. 1. First, it is no .....

[ Download This Essay Now ] Number of words: 4448 | Number of pages: 17

The Vast Cyber-frontier Is Being Threatend With Censorship From The Government

.... who might upload James Joyce's Ulysses could be placed in jail for two years and have up to a $250,000 fine.3 Representatives of on-line services industries were concerned about the bill, and feared they could be held criminally responsible for Internet conversations.4 "We face a unique disturbing and urgent circumstance, because it is children who are the computer experts in our nations families," remarked a concerned Rep. Senator of India Dan Coats.5 Although in reality, censorship would do little to stop the pornography problems. The bill is a nation legislation trying to control a international network, which is virtual .....

[ Download This Essay Now ] Number of words: 2541 | Number of pages: 10

Parity/Non-parity Check

.... in nature. They are both designed to signal an error in the even that data are lost or added. .....

[ Download This Essay Now ] Number of words: 249 | Number of pages: 1

Semiconductors : The Silicon Chip

.... to the group IV in the periodic table. It is a grey brittle material with a diamond cubic structure. Silicon is conventionally doped with Phosphorus, Arsenic and Antimony and Boron, Aluminum, and Gallium acceptors. The energy gap of silicon is 1.1 eV. This value permits the operation of silicon semiconductors devices at higher temperatures than germanium. Now I will give you some brief history of the evolution of electronics which will help you understand more about semiconductors and the silicon chip. In the early 1900's before integrated circuits and silicon chips were invented, computers and radios were made wit .....

[ Download This Essay Now ] Number of words: 1451 | Number of pages: 6

Economic Consequences Of Software Crime

.... asset management and costs to their organizations. Many firms involve their legal departments and human resources in regards to software distribution and licensing. Information can qualify to be property in two ways; patent law and copyright laws which are creations of federal statutes, which are subject to Constitutional authority. In order for the government to prosecute the unauthorized copying of computerized information as theft, it must first rely on other theories of information-as-property. Trade secret laws are created by provincial law, and most jurisdictions have laws that criminalize the violations of a trade-s .....

[ Download This Essay Now ] Number of words: 3894 | Number of pages: 15

« prev  5  6  7  8  9  next »

 Copyright © 2003 Monster Essays.com
 All rights reserved