|
|
» Browse Information Technology Term Papers
The Future Of Security
Number of Words: 368 / Number of Pages: 2
... the entire purchase. If the purchase is approved the account will be debited in real-time. Transactions can be denied for lack of funds, retina scans not matching, the person has missed a court date or is wanted by the government for questioning or committing a crime. If the transaction is denied, the reason is displayed on the cashier’s screen and security is immediately notified if the customer is wanted by the government or if the retina scans do not match.
Monthly bills will be debited from the account automatically, which will eliminate late payments and unpaid collections. If funds are not a ...
|
|
Hackers
Number of Words: 10104 / Number of Pages: 37
... Introduction
The proliferation of home computers has been accompanied by a corresponding social problem involving the activities of so-called "computer hackers." "Hackers" are computer aficionados who "break in" to corporate and government computer systems using their home computer and a telephone modem. The prevalence of the problem has been dramatized by the media and enforcement agents, and evidenced by the rise of specialized private security firms to confront the "hackers." But despite this flurry of attention, little research has examined the social world of the "computer hacker." Our curre ...
|
|
Natural Language Processing
Number of Words: 1914 / Number of Pages: 7
... exist.
Alan Turing predicted of NLP in 1950 (Daniel Crevier, 1994, page 9):
"I believe that in about fifty years' time it will be possible to
program computers .... to make them play the imitation game so well that an
average interrogator will not have more than 70 per cent chance of making the
right identification after five minutes of questioning."
But in 1950, the current computer technology was limited. Because of
these limitations, NLP programs of that day focused on exploiting the strengths
the computers did have. For example, a program called SYNTHEX tried to determine
the meaning of se ...
|
|
Smart House
Number of Words: 1618 / Number of Pages: 6
... boomers in the move up markets, empty nesters, young middle-
class, two - income families, the aging, and all who are energy conscious and
technologically astute. Therefore, the SMART HOUSE system is suitable to
install in new homes.
Firstly, more saving can be gained when the SMART HOUSE System offers
several energy management options that have the potential to reduce a home
owner's utility bill by 30% or more per year depending on the options installed.
For examples, a smart house can turn lights on and off automatically, it can
help save on your electric bill. Moreover, the heating and air cond ...
|
|
Uses Of Networking
Number of Words: 1843 / Number of Pages: 7
... of networks
Sharing Communication
Data E-Mail
Programs Bulletin boards
Storage Tele-computer-conferencing
Printer Information
Scanner Fax
Electronic diaries
Allows Allows
Fast information exchange Electronic funds transfer
Real time database’s Electronic data interchange
Distributed databases Electronic point of sale
Electronic links Business links
Some dis-advantages of networks
Insecurity Data corruption
Hacking Garbled transmission
Data theft Lost transmission
Commercial espionage
Cost Frustration
Can be expensive to install Leads to time wasting
Need to tr ...
|
|
Protecting A Computer
Number of Words: 2495 / Number of Pages: 10
... of computer system can cause as much as harm as any physical hazard.
For example, a cashier in a bank can transfer some money from one of his
customer's account to his own account. Nonetheless, the most dangerous thief
are not those who work with computer every day, but youthful amateurs who
experiment at night --- the hackers.
The term "hacker "may have originated at M.I.T. as students' jargon for
classmates who labored nights in the computer lab. In the beginning, hackers are
not so dangerous at all. They just stole computer time from the university.
However, in the early 1980s, hackers b ...
|
|
Morality And Ethics And Computers
Number of Words: 1652 / Number of Pages: 7
... ethical problems dealing with the use of
computers in the medical field. In one particular case, a technician trusted
what he thought a computer was telling him, and administered a deadly dose of
radiation to a hospital patient.2 In cases like these, it is difficult to decide
who's fault it is. It could have been the computer programmer's fault, but
Goodman asks, "How much responsibility can you place on a machine?"3
Many problems also occur when computers are used in education. Should
computers replace actual teachers in the classroom? In some schools, computers
and computer manuals have ...
|
|
Ultrasonic Radar For A Home PC System
Number of Words: 2068 / Number of Pages: 8
... a chance to see low flying objects, household
furniture, and even themselves on their PC screen. Just to impress a
neighbour or friend is reason enough to build your own ultrasonic radar
station.
Similar to that of a Polaroid, ultrasonic transducers are used in this
type of radar. A rangefinder emits a brief pulse of high frequency sound
that produces an echo when it hits an object. This echo returns to the
emitter where the time delay is measured and thus the result is displayed.
The Polaroid rangefinder is composed of two different parts. The transducer
(Fig. 1) acts as a microphone and a sp ...
|
|
Virtual Reality
Number of Words: 1543 / Number of Pages: 6
... simulation research during World
War II and early computer graphics research in the 1960's. In 1965,
computer scientist Ivan Sutherland published a paper describing "The
Ultimate Display" and set the stage for research on the technology of
Virtual Reality. Here's an excerpt from his paper:
"The ultimate display would, of course, be a room within which
the computer can control the existence of matter. A chair
displayed in such a room would be good enough to sit in.
Handcuffs displayed in such a room would be confining, and
a bullet displayed in such a roo ...
|
|
Private Cable TV
Number of Words: 3180 / Number of Pages: 12
... try to answer
these questions in our paper. But we will first define the different technical
terms that we are going to focus on. Then we will developp the birth of private
channels, their regulations, laws and financing in the different countries.
2. BASICS
In our paper you will find the following technical terms:
¥ terrestrial broadcasting: this is the basic technology used to broadcast radio
and TV. It«s the use of radio-frequencies that can be received by a simple
antenna. The problem by using terrestrial broadcasting is, that you only have a
few (up to max. 7) possible frequencies and that you ...
|
|
|