|
ESSAY TOPICS |
|
MEMBER LOGIN |
|
|
|
Computers Essay Writing Help
Should The U.S. Government Be Scared Of Cyber Terrorism?
Words: 910 / Pages: 4 .... Group ELN is one of the many terrorist groups known to have a web page on the Internet. The ELN is known mainly for blowing up oilrigs in South America, and for kidnapping foreign executives. Two years ago, a Swedish hacker managed to go to London, to Atlanta, and then to Florida where he rerouted and tied up phone lines in each country, put 911 services out of commission, impeded the response of police, fire and rescue services. There are also a lot of cyber attacks within the United States, which are referred to as domestic attacks. In 1996, there were 128 cases of cyber attacks on the FBI's files, in 1998 there were 550.
If a terrorist wanted .....
|
Freedom Of Speech On The Internet
Words: 1262 / Pages: 5 .... children by prohibiting “indecent” speech or images from being sent through cyberspace. One of the biggest groups that combated the censorship law is the CIEC (Citizens Internet Empowerment Coalition). The CIEC found and posted on their website some obvious problems with the CDA. “This law would prohibit texts of classic fiction such as the Catcher in the Ryer, Ulysees, “Seven Dirty Words” by George Carlin, and other materials which, although offensive to some, enjoy the full protection of the First Amendment if published in a newspaper, magazine, or a book, or in the public square”(CIEC).
Hot-Wired, a very popular and prestigious Int .....
|
What Is Virtual Reality
Words: 4298 / Pages: 16 .... outputs to the user of a world within the computer. This
world may be a CAD model, a scientific simulation, or a view into a
database. The user can interact with the world and directly manipulate
objects within the world. Some worlds are animated by other processes,
perhaps physical simulations, or simple animation scripts. Interaction with
the virtual world, at least with near real time control of the viewpoint,
in my opinion, is a critical test for a 'virtual reality'.
Some people object to the term "Virtual Reality", saying it is an oxymoron.
Other terms that have been used are Synthetic Environments, Cyberspace,
Artificial Reality, Simulator Tech .....
|
Holograms
Words: 1070 / Pages: 4 .... slightly different view of the apple. These different views
tell you about the apple's depth -its form and where it sits in relation to
other objects. Your brain processes this information so that you see the apple,
and the rest of the world, in 3-D. You can look around objects, too -if the
apple is blocking the view of an orange behind it, you can just move your
head to one side. The apple seems to "move" out of the way so you can
see the orange or even the back of the apple. If that seems a bit
obvious, just try looking behind something in a regular photograph!
You can't, because the photograph can't r .....
|
Coputers In Modern Society
Words: 983 / Pages: 4 .... chip that is the fastest commercial microprocessor on the
market. In addition to internal speed and to allow faster hook- up to the
Internet, faster telephone lines, most notably the fiber optic lines, have been
added, for an extra charge, to transfer data about 4 times faster than
conventional phone lines (about 28,000 bits per second has been quadrupled to
about 128,000 bits per second. As speed enhances, memory and storage space is
needed to hold excess information. EDO RAM is a new, faster memory module that
helps transfer RAM data twice as fast as normal RAM. For long term storage of
large amounts of data, hard drives have been under a cons .....
|
How Guns Work
Words: 951 / Pages: 4 .... energy from potential to kinetic.
When the trigger is pulled the hammer hits the firing pin. The firing pin then
hits the primer which causes the powder to burn hence producing lots of gases.
This causes the volume behind the bullet to fill with extremely high pressure
gas. The gas pushes on every surface it encounters, including the bullet in
front of it and the base of the gun barrel behind it. The increase in pressure
caused by the gases causes the bullet to be forced into the barrel hence causing
the bullet to come out the muzzle at very high speeds. Once the bullet is fired,
it remains in motion from its momentum. The momentum will carry th .....
|
The History Of The Internet
Words: 851 / Pages: 4 .... bypassed the problem.
The Internet began as the Advanced Research Projects Agency Network (ARPANET) during the cold war in 1969. It was developed by the US Department of Defense's (DOD) research people in conjunction with a number of military contractors and universities to explore the possibility of a communication network that could survive a nuclear attack. It continued simply because the DOD, DOD's contractors, and the universities found that it provided a very convenient way to communicate (Wendell). The ARPANET was a success from the very beginning. Although originally designed to allow scientists to share data and access remote computers, .....
|
Why You Should Purchase A PC
Words: 1416 / Pages: 6 .... short while
now and there are already many people world wide that are computer literate.
According to Using Computers: A Gateway to Information World Wide Web Edition,
over 250 million Personal Computers (PC's) were in use by 1995, and one out of
every three homes had a PC (Shelly, Cashman,& Waggoner, 138).
Computers are easy to use when you know how they work and what the parts
are. All computers perform the four basic operations of the information
processing cycle: input, process, output, and storage. Data, any kind of raw
facts, is required for the processing cycle to occur. Data is processed into
useful information by the computer hardware. .....
|
What Really Is A Hacker?
Words: 409 / Pages: 2 .... issue, but rather free use of all computers
and what they have to offer. They also believe that anyone should be able to
use all of a computers resource with no restrictions as to what may be accessed
or viewed. This belief is controversial, it not only could infringe upon
people's right to privacy, but give up trade secrets as well. A deep mistrust
of authority, some hackers consider authority to be a constriction force. Not
all hackers believe in this ethic, but generally authority represents something
that would keep people from being able to have full access and/or free
information.
Along with the "ethical code" of hackers there a .....
|
History Of Computers
Words: 1829 / Pages: 7 .... and division and displayed the results in a
variety of methods. Some computers displayed results in a binary representation
of electronic lamps. Binary denotes using only ones and zeros thus, lit lamps
represented ones and unlit lamps represented zeros. The irony of this is that
people needed to perform another mathematical function to translate binary to
decimal to make it readable to the user.
One of the first computers was called ENIAC. It was a huge, monstrous
size nearly that of a standard railroad car. It contained electronic tubes,
heavy gauge wiring, angle-iron, and knife switches just to name a few of the
components. It has become diff .....
|
|
|