Computer Ergonomics In The Work Place
.... 1993) In the average computer workstation, employees are prone to
over a dozen hazards. There exist two factors that can prevent this: forming
good work habits and ergonomically designed computer workstations. We will
discuss these preventions throughout the paper.
First, a few terms may need defining. Repetitive Strain Injuries (RSI) takes
place from the repeated physical movements of certain body parts which results
in damage to tendons, nerves, muscles, and other soft body tissues. If these
injuries are not taken care of immediately, permanent damage could be done. A
few common results of RSI's that were not taken care o .....
|
|
Computer Aided Drafting And Design
.... systems are drawn with the aid of a keyboard, mouse, or
tracking ball. One selects the starting point of a line, the ending point,
and the line is drawn. A scale at the bottom of the screen tells how long
the line will be. On some CADD systems, the computer itself can measure
how long the line will be while the operator inputs the length of the line.
Lines are the basis of all drawings. Straight lines are fairly simple and
quick to make, but what about curved or wavy lines? That's what different
CADD commands are made for.
Different CADD commands make different things on the screen possible.
There are commands for dimen .....
|
|
Bulletproof Vests
.... The function of ceramic armor is to slow the bullet abruptly by
the hardness of the ceramic and to dissipate the bullet's energy as it
destroys the armor at the point of impact; the tiles or plates of ceramic
bulletproof vest thus have to be replaced once they have stopped a bullet.
The textile vest deforms the bullet and then dissipates its energy,
entangling it in the vest's many layers.
A textile bulletproof vest is fashioned of sixteen to twenty-four
layers of nylon cloth of a heavy weave, the layers stitched together like
quilt. Any ordinary pistol or sub-machine gun bullet striking the garment
is immediately fla .....
|
|
Computer Crimes
.... Too by left is a drawing that
illustrates the method that most Hackers use to take over your computer. Ever
since the dial-up connection was invented anyone with a modem had the ability to
wreck any one of thousands of computers.
One of the most talked about forms of computer crime is computer viruses.
A computer virus is a small but highly destructive program written by an
unscrupulous computer Hacker. Back in 1984 a 17 year old computer Hacker single
handedly brought down four hundred thousand computers in a matter of hours.
Too my left is a graph depicting the # of computer crimes comited from 1988 till
now. Some Ha .....
|
|
Requirements Needed In Certain Computer Related Fields
.... leadership skills an asset.
The salary of a project leader varies occasionally, but in this case
it is an important position, earning $60 000 - 70 000 annually.
Systems Administrator
Systems Administrator is responsible for administering overall system needs
in a business (in this case, the College).
Some requirements include:
- A degree in computer science or technical college diploma in
a related discipline.
- 2 years or more experience in database design.
- Two years experience in a Novell / DOS environment.
- Knowledge of overall PC hardware
The job offers a very c .....
|
|
Computer Crime
.... is purely intellectual. I know one reason
is that is can be very rewarding. Hackers are drawn to computers for the
aninymity they allow. They feel powerful and can do anything. Hackers can be
there own person out side the real world.
I found out Arizona was the first state to pass a law against computer crime, in
1979. In 1980 the U.S. copyright act was amended to include soft ware. I found
out that in 1986 a computer farad abuse act was passed. This act was made to
cover over any crime or computer scheme that was missed with any former laws.
Violations to any of thesis laws are a maxim of five years in prison and a
$250,00 .....
|
|
The Involvement Of Computers In Future Jobs
....
And now it has paid off. I now have a business of my own, working as a
computer consultant. I assist others in learning about computers to be
able to operate more efficently in their everyday jobs. Computers will
fall into careers and our everyday life more rapidly then you think.
Perhaps you would like to be a teacher. You will store all class data,
students work, names, grades, records all accessible by computer. Or, how
about a doctor. You will use computers to examine and evaluate a patients
problem quicker and more efficiently. These are only a few examples. The
bottom line is, computers provide worthwhile caree .....
|
|
Victims In Progress Of Technology
.... decades, are resources
are limited and must be conserved properly. Tribal societies are a shining
example of how to manage these resources, because they only use and eat
what they need without wasting valuable resources. To demonstrate let us
examine Bodley's study of the Maori tribe. The Maori tribe, settled in New
Zealand during the age of expansion, allowed and even aided settlers in
colonizing on the island. As the number of white settlers grew, they began
to seek and take more and more land from the Maori tribe. When the Maori
tribe began to resist, the colonizing governments rationalized that they
were interfering with .....
|
|
Coping With Computers
.... experiences with a computer involved sending a message
over the AP news wire. As it turns out, she expressed her candid opinion on
some very sensitive topics at the time, including but not limited to the Vietnam
War. Consequently, the AP was not amused with the message and she was fired.
At the time, this incident was popular enough to make it into Newsweek magazine.
Later on, she moved into television as a reporter, but now owns her own
production company, Lucky Duck Productions. Here, she realized that computers
act as the driving force in a technologically based industry. She also realized
that the younger generations are .....
|
|
Computers In Math
.... by x and store x4
5.Multiply x by 6 and store 6x
6.Multiply stored x2 by 5 and store 5x2
7.Multiply stored x3 by 4 and store 4x3
8.Multiply stored x4 by 6 and store 6x4
9.Add 6x4
10.Add 4x3
11.Subtract 5x3
12.Add 6x
13.Add 4
Binary Coded Decimal
One of the most convenient conversions of decimal to binary coded
decimal's is used today in present day computer's. BCD(Binary Coded
Decimal) is a combination of binary and decimal; that is each separate
decimal digit is represented in binary form. For example the chart below
represents the Binary and Decimal conver .....
|
|
OpenVMS: Using A Virtual Operating System By The International Securities Exchange
.... on Digital's VAX and Alpha computer systems.
Digital Equipment Corporation owned the operating system. It
wasn't until January 25, 1998 Compaq computers acquired Digital Equipment
at a tremendous price of 9.6 billion dollars. "This is a marriage made in
heaven," says Sateesh Lele, CIO at the European division of General Motors,
which uses products form both companies. "Digital has all the services,
and Compaq is a great powerhouse manufacturer." It is indeed a perfect
match, with the combination of these two companies, how will the
competition stack up to the other computer manufacturers?
This deal seems more of a threat .....
|
|
CyberPorn: On A Screen Near You
.... children face everyday.
The Exxon bill proposed to outlaw obscene material and impose fines uo to
$100,000and prison term up to two years on anyone who knowinglymakes "indecent"
material available to children under the age of 18.
Robert Thomas spends his days like any other inmate at the U.S. Medicalcenter
for Federal prisoners in Springfield. Thomas, 39 a amateur BBS in California,
made headlines last year when he and his wife were indicted for transmitting
pornographic material to a government agent in Tennessee. This case shows how
tight of a squeeze the govenment is putting on internet Freedom.
.....
|
|
|