Monster Essays - Thousands of essays
Enter Essay Topic:   
 

The Paperless(?) Office

.... news? 2. Are certain types of information more readily amenable to digital processing in a paperless office than others? If so, why; if not, why not? It would seem that some types of information are better in paperless form, while some are not. Implementing an e-mail system can do wonders for companies. The e-mail sessions allow managers to get more information across to the employees and vice versa. This is a way to make sure everyone will access to the same information. A paperless office is a good way to send and receive reports. Another area that is conducive to a paperless office is such companies that put large v .....

[ Download This Essay Now ] Number of words: 532 | Number of pages: 2

Past, Present, And Future Of Computers

.... equation. Soon, a silk weaver wanted to make very intricate designs. The designs were stored on punch-cards which could be fed into the loom in order to produce the designs requested. This is an odd beginning for the most powerful invention in the world. In the 1930's, a man named Konrad Zuse started to make his own type of computer. Out of his works, he made several good advances in the world of computing. First, he developed the binary coding system. This was a base two system which allowed computers to read information with either a 1 or a 0. This is the same as an on or and off. The on or off functions could be .....

[ Download This Essay Now ] Number of words: 1752 | Number of pages: 7

A Tour Of The Pentium Pro Processor Microarchitecture

.... work per pipestage for more stages. The Pentium Pro processor reduced its pipestage time by 33 percent, compared with a Pentium processor, which means the Pentium Pro processor can have a 33% higher clock speed than a Pentium processor and still be equally easy to produce from a semiconductor manufacturing process (i.e., transistor speed) perspective. The Pentium processor's superscalar microarchitecture, with its ability to execute two instructions per clock, would be difficult to exceed without a new approach. The new approach used by the Pentium Pro processor removes the constraint of linear instruction sequencing b .....

[ Download This Essay Now ] Number of words: 2686 | Number of pages: 10

Piracy

.... an effective way to catch any unfounded bugs in the software program. From debugging to hacking, hackers can benefit the most. They can study and learn from the advancements with in the programming. So what does all this activity tell us? This tells us the people are willing to go to great lengths to get software at a lower cost, or possibly in exchange for other software and that they are succeeding in their efforts. Although more than 50% of their software income is from other companies which do not pirate, this poses a problem for the software industries. By fining a single bulletin board out of the thousands in North .....

[ Download This Essay Now ] Number of words: 601 | Number of pages: 3

Polymorphic & Cloning Computer Viruses

.... it stores data. Because of the severity of the damage that these viruses may cause, it is important to understand how anti-virus programs go about detecting them and how the virus itself adapts to meet the ever changing conditions of a computer. In much the same way as animals, computer viruses live in complex environments. In this case, the computer acts as a form of ecosystem in which the virus functions. In order for someone to adequately understand how and why the virus adapts itself, it must first be shown how the environment is constantly changing and how the virus can interact and deal with these changes. There are many fo .....

[ Download This Essay Now ] Number of words: 1873 | Number of pages: 7

Internet Pornography: Freedom Of Press Or Dangerous Influence?

.... and researcher, gives many statistics showing that presence of pornography on the Internet is not necessarily a bad thing. He gives one example that shows that "47% of the 11,000" most popular searches on the Internet are targeted to pornography. This fact shows that pornography has given the Internet approximately half of its clientele (2). Without this, the Internet would hardly be the global market that it is today. Most on the Internet are not merely the for pornography either. It is just a part-time activity while not attending to serious matters. At another point in his paper, Burton cites reasons why the Internet is .....

[ Download This Essay Now ] Number of words: 2098 | Number of pages: 8

The POSitouch System

.... industry, do to its completeness. .....

[ Download This Essay Now ] Number of words: 224 | Number of pages: 1

Private Cable TV

.... that we are going to focus on. Then we will developp the birth of private channels, their regulations, laws and financing in the different countries. 2. BASICS In our paper you will find the following technical terms: ¥ terrestrial broadcasting: this is the basic technology used to broadcast radio and TV. It«s the use of radio-frequencies that can be received by a simple antenna. The problem by using terrestrial broadcasting is, that you only have a few (up to max. 7) possible frequencies and that you need to have expensive transmitters every 100-150 kms to cover an area. Programms which are broadcasted terrestrical are e.g.: .....

[ Download This Essay Now ] Number of words: 3191 | Number of pages: 12

Procedures, Parameters & Sub-Programs

.... to modify. When repeated actions are replaced by one procedure call, it becomes much easier to modify the code at a later stage, and also correct any errors. By building up the program in a modular fashion via procedures it becomes much easier to update and replace sections of the program at a later date, if all the code for the specific section is in a particular module. Programs take less time to compile. Replacing a sequence of statements with once simple procedure call usually reduces the compilation time of the program, so long as the program contains more than one reference to the procedure! Object programs require l .....

[ Download This Essay Now ] Number of words: 1026 | Number of pages: 4

Propaganda In The Online Free Speech Campaign

.... of encrypted data on computers. All of these groups, however, speak out for free speech on the Internet, and all of these groups have utilized the Internet to spread propaganda to further this common cause of online free speech and opposition to the CDA. Context in which the propaganda occurs Five years ago, most people had never heard of the Internet, but today the Internet is a term familiar to most people even if they are not exactly sure about what the Internet is. Along with the concept of the Internet, it is widely known that pornography and other adult related materials seem to be readily available on the Internet .....

[ Download This Essay Now ] Number of words: 5036 | Number of pages: 19

Protecting A Computer

.... in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in the computer lab. In the beginning, hackers are not so dangerous at all. They just stole computer time from the university. However, in the early 1980s, hackers became a group of criminals who steal information from other peoples' computer. For preventing the hackers and other cri .....

[ Download This Essay Now ] Number of words: 2494 | Number of pages: 10

Quality Issues In System Development

.... streamlined business processes. Unfortunately, not every system that information workers develop are well implemented; this means that the computer system which was originally intended to make a company more efficient, productive and cost-effective, is in the end doing the exact opposite - namely, wasting time, money and valuable manpower. So even with all the lessons learned from the 70's and 80's, our vastly superior methodologies and knowledge of the 90's is still proving to be fallible, as suggested in the following examples. System Development Failures In Britain, 1993, an incident occurred which forced the London Ambulan .....

[ Download This Essay Now ] Number of words: 1638 | Number of pages: 6

« prev  26  27  28  29  30  next »

 Copyright © 2003 Monster Essays.com
 All rights reserved