Monster Essays - Thousands of essays
Enter Essay Topic:   
 

The Computer Underground

.... It is concluded that despite the widespread social network of the computer underground, it is organized primarily on the level of colleagues, with only small groups approaching peer relationships. Certification: In accordance with departmental and Graduate School policies, this thesis is accepted in partial fulfillment of degree requirements. ______________________ Thesis Director ______________________ Date ACKNOWLEDGMENTS FOR CRITIQUE, ADVICE, AND COMMENTS: DR. JAM .....

[ Download This Essay Now ] Number of words: 15702 | Number of pages: 58

Ecodisc

.... and there are hopes of some day there being interactive broadcast television. This is a breakthrough in visual entertainment, because while television lets you see a place, interactive video will let you explore it. Interactive video is where the viewer decides the plot and characters of a movie, or show. The viewer will basically be able to write their own scripts and produce the movie at the same time. Ecodisc would be very good for showing students (or anyone) interested in managing nature reserves, working for national parks or just as an interest thing. Ecodisc is an invention which would greatly help both the computer an .....

[ Download This Essay Now ] Number of words: 407 | Number of pages: 2

An Insight Into Virtual Reality

.... on screen image of the hand that follows the operator's hand movements. The glove also has miniature vibrators in the finger tips to provide feedback to the operator from grasped virtual objects. Therefore, driven by the proper software, the system allows the rator to interact by grabbing and moving a virtual object within a simulated room, while experiencing the "feel" of the object. The virtual reality line includes the Datasuit and the Eyephone. The Datasuit is an instrumented full-body garment that enables full-body interaction with a computer constructed virtual world. In one use, this product is worn by film actors to .....

[ Download This Essay Now ] Number of words: 1311 | Number of pages: 5

Electronic Monitoring Vs. Health Concerns

.... Shulman for Time, states that ninety-five percent of Americans believe that electronic monitoring should not be allowed (Privacy 444). Harriet Ternipsede, who is a travel agent, gave a lengthy testimonial on how electronic monitoring at her job caused her undue stress and several health problems including muscle aches, mental confusion, weakened eyesight, severe sleep disturbance, nausea, and exhaustion. Ternipsede was later diagnosed with Chronic Fatigue Immune Dysfunction Syndrome (Electronic 446). A study done by the University of Wisconsin found that eighty-seven percent of employees subjected to electronic monitoring su .....

[ Download This Essay Now ] Number of words: 617 | Number of pages: 3

Virtual Reality Technology And Society

.... 5 Computers and Software. . . . . . . . . . . . . . . . . . . . . . . 6 THE HISTORY OF VIRTUAL REALITY . . . . . . . . . . . . . . . . . . . . . 7 Virtual Reality in the Past . . . . . . . . . . . . . . . . . . . . 7 Virtual Reality in the Present. . . . . . . . . . . . . . . . . . . 9 Virtual Reality in the Future . . . . . . . . . . . . . . . . . . . 10 THE SOCIAL IMPLICATIONS OF VIRTUAL REALITY . . . . . . . . . . . . . . . 11 New Rules of Behavior . . . . . . . . . . . . . . . . . . . . . . . 11 Adverse Effects . . . . . . . . . . . . . . . . . . . . . . . . . . 12 CONCLUSION . . . . . . . . . .....

[ Download This Essay Now ] Number of words: 3863 | Number of pages: 15

Escapism And Virtual Reality

.... ten years to become accepted (recent examples include facsimile machines, video recorders and microwave ovens). One of the most recent, and hence most rapidly absorbed periods, has been that of the computer. The Age of Computing began with Charles Babbage in the late 19th century Babbage , grew in the calculating machines between the wars EarlyIBM , continued during the cryptanalysis efforts of World War II Turing,Bletchley and finally blossomed in the late 1970's with mass market applications in the developed countries (e.g. JapanSord ). Computers have gone through several `generations' of development in the last fifty year .....

[ Download This Essay Now ] Number of words: 4885 | Number of pages: 18

Essay On Hacking

.... image files or any other files. Now, onto hacking. Most people stereotype people simply as "HACKERS," but what they don't know is that there are three different types of computer whizzes. First, there are hackers. Hackers simply make viruses and fool around on the internet and try to bug people. They make viruses so simple. The get a program called a virus creation kit. This program simply makes the virus of beholders choice. It can make viruses that simply put a constant beep in you computer speakers or it can be disastrous and ruin your computers hard-drive. Hackers also go onto chat rooms and cause trouble. C .....

[ Download This Essay Now ] Number of words: 592 | Number of pages: 3

Trends In Telecommunications

.... speed at which information can be moved through the fiber optic cable is also an important advantage. AT&T established an experimental fiber optic system that moves digital information at a speed of 8 gigabits (8 billion bits) per second over a 68-mile stretch of repeaterless fiber optic cable. One gigabit per second is fast enough to support 15,000 voice circuits. The growth of fiber optics has other features that make it valuable to future telecommunications. Since the light wave transmission is enclosed, it is not bothered by atmospheric conditions that affect wireless systems. It also offers an element of security in .....

[ Download This Essay Now ] Number of words: 427 | Number of pages: 2

Ethics In Cyberspace

.... new moral issues. Individuals and organizations should be proactive in examining these concerns and developing policies which protect liabilities. Issues which need to be addressed include: privacy of mail, personal identities, access and control of the network, pornographic or unwanted messages, copyright, and commercial uses of the network. An Acceptable Use Policy (AUP) is recommended as the way an organization should inform users of expectations and responsibilities. Sample AUPs are available on the Internet at gopher sites and can be retrieved by using Veronica to search keywords "acceptable use policies" or "ethics." .....

[ Download This Essay Now ] Number of words: 949 | Number of pages: 4

The Future Of The Internet

.... during the troubled ordeal. Some people are predicting, because of the length of Internet calls and the amount of bandwidth the calls take, that one day in the not so distant future, the entire telephone network, or at least a great portion of it, will cease to function, and all telephone calls will fail to connect. This idea is referred to by some as the "Gridlock Theory." Others advise that steps can be taken to avoid such a disaster, such as upgrading phone lines and limiting Internet usage. Following the gridlock idea is Ethernet creator Bob Metcalfe, who believes that the slowdowns will only get worse. "We recently had a .....

[ Download This Essay Now ] Number of words: 1063 | Number of pages: 4

Notebook Computers

.... DVD, or floppy disk drive internally ideal for those who need supreme portability and don't want to deal with external drives. It lasted an impressive 3:12 on our test. For the road warrior principally concerned with weight, and battery life, there is still no better option then the IBM ThinkPad 560x. The system came with a Pentium MMX/233, an 12.1 inch TFT panel, a 2GB disk, and a lithium ion battery that lasted a terrific 3:59 on our test. CD-ROM or floppy disk drives are external, but the system weighs just 4.1 pounds; ready for travel, it weighs 5 pounds. .....

[ Download This Essay Now ] Number of words: 317 | Number of pages: 2

Definition Of An IP Address

.... 127 Class B - high 2 bits 10, 14-bit network number, 16-bit host number. n1.n2.a.a 128 <= n1 <= 191 Class C - high 3 bits 110, 21-bit network number, 8-bit host number. n1.n2.n3.a 192 <= n1 <= 223 Network number: The network portion of an IP address. For a class A network, the network address is the first byte of the IP address. For a class B network, the network address is the first two bytes of the IP address. For a class C network, the network address is the first three bytes of the IP address. In each case, the remainder is the host address. In the Internet, assigned network addresses are globally unique. H .....

[ Download This Essay Now ] Number of words: 867 | Number of pages: 4

« prev  19  20  21  22  23  next »

 Copyright © 2003 Monster Essays.com
 All rights reserved