Windows 95 Or NT
.... it an expensive system
worth the money. On the other hand Windows NT 3.51 carries a price tag of
three-hundred and forty nine dollars. Making this software very expensive but
also worth every penny.
Windows 95 is much easier to use then Windows NT. It was designed to
make the PC user have more of an easier time navigating through its complex
tasks. This is one of the main reasons why people would rather buy the more
less expensive operating system. Rather then the more expensive system Windows
NT. Another one the reasons that Windows 95 is more popular is for its simple
graphic user interface otherwise known as the GUI. W .....
|
|
Windows 95 Beats Mac
.... use in favor of their sysstems over PCs is in
multimedia and networking capabilities. Mac users gloat that the Mac has
networking technology built in the system. Even if a user did not use it, the
network is included with the system. They cited that for the PC users and Pc
users hate the fact that they need to stick a card in their computers to
communicate with any other computer. With Windows 95, the Mac network gloaters
are silenced. Windows 95 included built-in network support. Any network will
work properly. The Mac users also claim their systems have speech, telephony,
and voice recognition, whereas the Pc user does not hav .....
|
|
Wire Pirates
.... of other parts of the international
communications infrastructure.
The first, biggest error that designers seem to repeat is adoption of the
"security through obscurity" strategy. Time and again, attempts to keep a system
safe by keeping its vulnerabilities secret have failed.
Consider, for example, the running war between AT&T and the phone phreaks. When
hostilities began in the 1960s, phreaks could manipulate with relative ease the
long-distance network in order to make unpaid telephone calls by playing certain
tones into the receiver. One phreak, John Draper, was known as "Captain Crunch"
for his discovery that a modifie .....
|
|
Hacking
.... incompetencies is
sought... a board is found. "This is it... this is where I belong... "I know
everyone here... even if I've never met them, never talked to them, may never
hear from them again... I know you all... Damn kid. Tying up the phone line
again. They're all alike... you bet you ass we're all alike... we've been spoon-
fed baby food at school when we hungered for steak.. the bits of meat that you
did let slip through were pre-chewed and tasteless. We've been dominated by
sadists, or ignored by the apathetic. The few that had something to teach found
us willing pupils, but those few are like drops of water in the dese .....
|
|
Hacking
.... II. Do not alter any system
files other than ones needed to ensure your
escape from detection and your future access (Trojan Horses, Altering
Logs, and the like are all necessary to your survival for as long as
possible.) III. Do not leave your (or anyone else's) real name, real
handle, or real
phone number on any system that you access illegally. They *can* and
will track you down from your handle! IV. Be careful who you share
information with. Feds are getting trickier.
Generally, if you don't know their voice phone number, name, and
occupation or haven't spoken with them voi .....
|
|
Knowledge Is Power: How To Buy A Computer
.... creates a problem. They cannot buy a computer
until they know what they want to do with it, but they cannot really know all
of the uses there are for a computer until they own one. This problem is not as
tough as it seems, however. The consumer should go to his local computer store,
and look at the software that's available. Most programs explain their minimum
hardware requirements right on the box. After looking at a few packages, it
should be pretty clear to the consumer that any mid-range system will run 99% of
the available software. A person should only need a top-of-the-line system for
professional applications such as g .....
|
|
The Internet
.... Robotics.
The Internet can give you access to both legal & illegal sites on the
net. There is pirated software e.g. full version of games that you can access
without actually paying for them.
The internet can only be accessed with a browser. There are a few web
browsers but two main ones are Netscape Navigator and Internet Explorer.
As I mentioned earlier, the internet allows everyone to access various
topics of interests on the web. The choices ranges from recreational, education,
hobbies, communications and entertainment.
There is always a risk of accessing material which are not appropriate
e.g. pornographic material .....
|
|
Morality And Ethics And Computers
.... a technician trusted
what he thought a computer was telling him, and administered a deadly dose of
radiation to a hospital patient.2 In cases like these, it is difficult to decide
who's fault it is. It could have been the computer programmer's fault, but
Goodman asks, "How much responsibility can you place on a machine?"3
Many problems also occur when computers are used in education. Should
computers replace actual teachers in the classroom? In some schools, computers
and computer manuals have already started to replace teachers. I would consider
this an unethical use of computers because computers do not have the abi .....
|
|
Software Piracy
.... to software piracy.
Software piracy costs the industry:
$482 every second
$28,900 every minute
$1.7 million every hour
$41.6 million every day
$291.5 million every week
To understand software piracy, one must get inside the mind of the
pirate. People, who wouldn't think of sneaking merchandise out of a store or
robbing a house, regularly obtain copies of computer programs which they haven't
paid for. The pirate has a set of excuses for his actions: prices are .....
|
|
Software Piracy
.... Just walk into a CompUSA, Electronics Boutique, Computer City,
Egghead, etc and you will notice the expensive price tags on copies of the most
commonly used programs and the hottest games. Take the recent Midwest Micro
holiday catalogue for example and notice the prices. Microsoft Windows 95: $94,
Microsoft Office 95: $224, Microsoft Visual C++: $250, Borland C++: $213, Corel
Draw 7: $229, Corel Office Professional 7: $190, Lotus Smartsuite 96: $150,
Microsoft Flight Simulator95: $50, Warcraft 2: $30. The list goes on and on and
the prices for the programs listed above were only upgrade versions. Users of
the software listed .....
|
|
Telecommuting
.... in the manufacture and
transportation of the required materials. An increase in the percentage of
people telecommuting to work will decrease the need for expanded highways and
associated road maintenance. The first two areas related to getting to work.
Once a person arrives at a central office working location, he or she represents
another energy consumer, often times magnified many times over what would be
required at home. The office building has heating, cooling, and lighting needs,
and the materials to build it and maintain it require energy in their production
and transportation. Working from home requires only modest in .....
|
|
Year 2000: Fiction, Fantasy, And Fact
.... in "hot water." Data will become erroneous as the numbers "just don't
add up" anymore. Some PC owners can upgrade their computer's BIOS (or complete
operating system) and upgrade the OS (operating system) to Windows 95, this
will set them up for another 99 years. Older software however, may very well
have to be replaced or at the very least, upgraded.
The year 2000 has become a two-fold problem. One is the inability of the
computer to adapt to the MM/DD/YY issue, while the second problem is the
reluctance to which we seem to be willing to address the impact it will have.
Most IS (information system) people are ei .....
|
|
|