Monster Essays - Thousands of essays
Enter Essay Topic:   
 

Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection

.... modems, and telephone lines. This is the vector most feared by computer users, with infected files being rapidly passed along the emerging information super-highway, then downloaded from public services and then used, thus infecting the new system. 4. Spontaneous Generation: this last vector is at the same time the least thought of and the least likely. However, because virus programs tend to be small, the possibility exists that the code necessary for a self-replicating program could be randomly generated and executed in the normal operation of .....

[ Download This Essay Now ] Number of words: 564 | Number of pages: 3

Fiber Optics

.... create a highly focused beam of light that is cycled on and off at very high speeds. Computers at the transmitting end convert data or voice into "bits" of information. The information is then sent through the fiber by the presence, or lack, of light. So, all of the data is sent light pulses. Computers on the receiving end convert the light back into data or voice, so it can be used. All of this seems to be a very "modern" concept, and the technology we use is. The concept though, was the idea of Alexander Graham Bell in the late 1800's. He just didn't have a dependable light source... some days the sun doesn't shine .....

[ Download This Essay Now ] Number of words: 1230 | Number of pages: 5

The First Generation Of Computers

.... on a televised newscast to project the winner of the Eisenhower- Stevenson presidential race with stunning accuracy. That same year Maurice V. Wilkes (developer of EDSAC) laid the foundation for the concepts of microprogramming, which was to become the guide for computer design and construction. In 1954, the first general-purpose computer to be completely transistorized was built at Bell Laboratories. TRADIC (Transistorized Airborne Digital Computer) held 800 transistors and bettered its predecessors by functioning well aboard airplanes. In 1956, the first system for storing files to be accessed randomly was completed. The .....

[ Download This Essay Now ] Number of words: 332 | Number of pages: 2

Get Informed! - Buying The Right Computer

.... drive. Why? Because by the time you load you system (Windows95, DOS) and other software; your hard drive is already filled up. How are you going to save your document you wrote in WordPerfect when your hard drive is full? It's usually cheaper in the long run to buy the biggest hard drive available. Plus, you always want to have room for your games. After all, who wants to spend their whole life working? As far as processors, I suggest the Cryrix 6x686 166+. It's the best processor for the buck. It's one of the fastest. The processor costs about $300 cheaper then the Pentium version. Its got plenty of processing power .....

[ Download This Essay Now ] Number of words: 794 | Number of pages: 3

The Internet

.... e-mail message halfway around the world can arrive at its destination within a minute or two. In comparison, a letter can take from a few days to a couple of weeks, according to the distance it travels. Furthermore, e-mail is inexpensive. The cost of connection to the Internet is relatively cheaper than that of cable television. Evidently e-mail is both time-saving and cost-effective. Discussion groups are a great way to interact with others in the world and to expand the knowledge of one's horizon. The response is instantaneuos just like the telephone except it is non-verbal (typed). Discussion groups are on-line services th .....

[ Download This Essay Now ] Number of words: 723 | Number of pages: 3

Computers As Medical Treatment Devices

.... with the help of modern science and computers, it's possible to use lasers in surgical procedures to reshape the lens. The procedure consists of creating a "flap" on the outermost layer of the cornea, and folding it back, allowing the laser to change the refractive index of the old lens by effectively vaporizing the surrounding layers. This technology would definitely not have been possible had it not been for computers. The laser itself has to be correctly aimed, so as to be the most effective; and of course so as not to cause damage which could be irreparable for the patient. This in itself could be considered a p .....

[ Download This Essay Now ] Number of words: 781 | Number of pages: 3

Government Intervention On The Internet

.... subjects are Internet privacy and Internet censorship. At the moment, the Internet is epitome of our first amendment, free speech. It is a place where a person can speak their mind without being reprimanded for what they say or how they choose to say it. But also contained on the Internet, are a huge collection of obscene graphics, Anarchists' cookbooks, and countless other things that offend many people. There are over 30 million Internet surfers in the U.S. alone, and much is to be said about what offends whom and how. As with many new technologies, today's laws don't apply well when it comes to the Internet. Is the .....

[ Download This Essay Now ] Number of words: 1412 | Number of pages: 6

Hackers: Information Warefare

.... might wonder what it does and then move on. The hacker, the true hacker, will see the box, stop, examine it, wonder about it, and spend mental time trying to figure it out. Given the proper circumstances, he might come back later to look closely at the wiring, or even be so bold as to open the box. Not maliciously, just out of curiosity. The hacker wants to know how things work.(8) Hackers truly are "America's Most Valuable Resource,"(4:264) as ex-CIA Robert Steele has said. But if we don't stop screwing over our own countrymen, we will never be looked at as anything more than common gutter trash. Hacking computers for th .....

[ Download This Essay Now ] Number of words: 2200 | Number of pages: 8

Hacking To Peaces

.... illegal or deliberate network abuse versus behavior that is merely annoying. Legal systems everywhere are busily studying ways of dealing with crimes and criminals on the Internet" (Voss, 1996, p. 2). There are ultimately three different views on the hacker controversy. The first is that hacking or any intrusion on a computer is just like trespassing. Any electric medium should be treated just like it were tangible, and all laws should be followed as such. On the other extreme are the people that see hacking as a privilege that falls under the right of free speech. The limits of the law should be pushed to their farthest .....

[ Download This Essay Now ] Number of words: 1297 | Number of pages: 5

History Of The Internet

.... base to base. The network was designed to function when parts of it were destroyed. The network could not have a center because it would be a primary target for enemies. In 1969, ARPANET was created, named after its original Pentagon sponsor. There were four supercomputer stations, called nodes, on this high speed network. ARPANET grew during the 1970's as more and more supercomputer stations were added. The users of ARPANET had changed the high speed network to an electronic post office. Scientists and researchers used ARPANET to collaborate on projects and to trade notes. Eventually, people used ARPANET for leisure activ .....

[ Download This Essay Now ] Number of words: 869 | Number of pages: 4

Where Did UNIX Come From And Why Are There Different Versions Of UNIX?

.... much more interested in marketing a commercial version of UNIX. And today we see that many companies have now licensed their own version: AT&T's System V, Versions of System V such as SCO's Xenix and IBM's AIX Berkeley's UNIX (called "BSD" for "Berkeley System Development"), Versions of Berkeley UNIX such as Sun Microsystem's SunOS, DEC's Ultrix and Carnegie Mellon University's Mach (used on the NEXT). .....

[ Download This Essay Now ] Number of words: 292 | Number of pages: 2

The Public Broadcasting System: Digital Technology And HDTV

.... community organizations or state and municipal groups, operate approximately 350 member stations. All public television stations highlight the importance of illuminating cultural and educational programming, as well as distinguished programs on nature, science, and public affairs. In PBS: Behind the Screen, Laurence Tarvik depicts this unique organisation as "a $5 million appropriation" which over time, became a "multi-billion worldwide multi-media empire" (xvii). Over four decades, PBS has become a leader in using technology to further its educational objective, such as, closed captioning, stereo television sound amd foreign l .....

[ Download This Essay Now ] Number of words: 1619 | Number of pages: 6

« prev  20  21  22  23  24  next »

 Copyright © 2003 Monster Essays.com
 All rights reserved