|
ESSAY TOPICS |
|
MEMBER LOGIN |
|
|
|
Computers Essay Writing Help
Computer Software Piracy
Words: 1506 / Pages: 6 .... of privacy, Computer virus, Internet scamming, Junk E-mails, Minors viewing pornography, Fraud Accounts, Illegal Downloading, Hacking, Cyber chat. The most common computer crime committed daily, some aware and many not, is the illegal sharing of computer software. Software is any of the programs used in operating a digital computer, as input and output programs, as defined by Funk and Wagnalls Standard Desk Dictionary. When we purchase computer software, we purchase it with the understanding that it will be for use on a single computer, once installed on that system, it is not to be loaded on any other computer. However many people are not aware of t .....
|
Virtual Reality
Words: 1543 / Pages: 6 .... ever
going to happen to you in real life. However, there is a way that you can
experience the feeling that something like this is happening. If you're
open to new ideas, and you have a good imagination, virtual reality may be
a toy for you.
What is VR?
Virtual Reality grew out of flight simulation research during World
War II and early computer graphics research in the 1960's. In 1965,
computer scientist Ivan Sutherland published a paper describing "The
Ultimate Display" and set the stage for research on the technology of
Virtual Reality. Here's an excerpt from his paper:
"The ultimate display would, of course, be a room within .....
|
Trends In Telecommunications
Words: 415 / Pages: 2 .... light wave systems. The US Sprint network was
the first to use a total fiber optic network to traverse the nation. By
1990, AT&T had installed 300 million miles of interexchange light wave
networks.
The advantages of light wave systems are many and include
• freedom from electrical disturbance
• tremendous bandwidth or information-carrying capacity
• small physical size
• relative low cost
The speed at which information can be moved through the fiber optic
cable is also an important advantage. AT&T established an experimental
fiber optic system that moves digital information at a speed of 8 gigabits
(8 billion bits) per second over a .....
|
Computer Crimes
Words: 1512 / Pages: 6 .... up the number and gets on he's presented with a logon prompt, this
is where the hacking really begins, the hacker tries to bypass this anyway he
knows how to and tries to gain access to the system. Why do they do it, well
lets go to a book and see "Avid young computer hackers in their preteens and
teens are frequently involved in computer crimes that take the form of
trespassing, invasion of privacy, or vandalism. Quite often they are mearly out
for a fun and games evening, and they get entangled in the illegal use of their
machines without realizing the full import of what they are doing", I have a
hard time believing that so lets see what a "hacke .....
|
The Power On Self Test
Words: 1575 / Pages: 6 .... the extended CMOS settings by holding the key down during
boot-up. This is really helpful, especially if you bend the CMOS settings right
out of shape and the computer won't boot properly anymore. This is also a handy
tip for people who play with the older AMI BIOSes with the XCMOS setup. It
allows changes directly to the chip registers with very little technical
explanation.
A Typical BIOS POST Sequence
Most BIOS POST sequences occur along four stages:
1. Display some basic information about the video card like its brand,
video BIOS version and video memory available.
2. Display the BIOS version and copyright notice in upper middle screen. .....
|
Digital Block For A Function Generator
Words: 2356 / Pages: 9 .... of this function generator namely the amplifier module. Also a filter selector circuit is built in after the digital block. The user inputs controlling frequency and symmetry are also built into this control block.
Therefore it is clear that the digital block can be divided into 4 distinct blocks, each with its own functionality. These blocks are the control module, counter module, filter control module and 8-bit D/A. The D/A chosen is the DAC0801LCN. It’s specifications can be found in the appendix. The layout of this design is shown below.
The interconnections will be discussed later but the thickness of the lines indicates .....
|
Complete Car Stereo
Words: 2401 / Pages: 9 .... has more power, features and notably better quality sound(Battle IV).
Another choice is leasing a car. The factory ships it with the stereo installed. People want to upgrade their stereo without voiding the lease contract. The only way to do this is have someone professionally install a stereo. This has stirred an enormous growth in the personal car stereo businesses(Kelly, 58).
Small shops along with big ones are popping up all over taking advantage of the publics new interest in car stereo. “Our biggest customers are the youth. They come in here, have what they want already picked out and then shell out 1000 to 2000 dollars without any q .....
|
F117 Nighthawk Stealth Fighter
Words: 848 / Pages: 4 .... The speed of the Nighthawk is in the high subsonic range because the cruise speed is from Mach .8 to Mach .9 and the maximum speed is Mach 1 at 36,000 ft. The range of the Nighthawk is unlimited with air refueling from another plane. The engines of the Nighthawk are two
12,500lb. General Electric F404-F1D2 non-afterburning turbofan engines with 10,600 lbs. of thrust. The Nighthawk’s armament is a non-fixed internal weapons carriage and the primary weapons on the Nighthawk are the paveway series GBU-10 and GBU-27 laser guided bombs. There is usually one person to fly the Nighthawk and the cost to build each Nighthawk is around 45 millio .....
|
Netscape’s Gecko: The Next-Generation Layout Engine
Words: 560 / Pages: 3 .... the fastest layout engine today. The Gecko emphasizes standards, speed, size and source. It is expected to potentially be the fastest, smallest most standards compliant HTML layout engine available. Gecko features an intrinsic support for HTML 4.0, CSS1 and partially for CSS2, Resource Description framework, and even a full Document Object Model level-1 implementation. Gecko also supports both HTML and XML documents. Gecko has been developed entirely under the Open source model at Mozilla.org. Developers are free advantage of the Gecko source code. The Open Source approach is used to encourage developers and anyone else for that matter to contribute t .....
|
OpenVMS: Using A Virtual Operating System By The International Securities Exchange
Words: 961 / Pages: 4 .... was originally called VMS
(Virtual Memory System); it was first brought into existence in 1976 as a
new operating system for Digital's new, 32-bit, virtual memory line of
computers, named VAX (Virtual Address eXtension).
The designers of OpenVMS were Dave Cutler and Dick Hustvedt, it was
designed entirely within Digital Equipment Corporation (DEC). OpenVMS is a
32-bit, multitasking, multiprocessing virtual memory operating system.
OpenVMS currently runs on Digital's VAX and Alpha computer systems.
Digital Equipment Corporation owned the operating system. It
wasn't until January 25, 1998 Compaq computers acquired Digital Equipment
at a treme .....
|
|
|