|
|
» Browse Information Technology Term Papers
Lasers And Their Uses
Number of Words: 843 / Number of Pages: 4
... bombarding photon. This process is
called stimulated emission. The bombarding photon of the emitted photon may
then strike other excited atoms, stimulating further emission of photons, all
of the same frequency and phase. This process produces a sudden burst of
coherent radiation as all the atoms discharge in a rapid chain reaction. The
light beam produces is usually pencil thin and maintains its size and direction
over very long distances.
Lasers vary greatly in the way they look and what they are used for.
Some lasers are as large as buildings while others can be the size of a grain
of salt. ...
|
|
Trespasser: Computer Game Review
Number of Words: 963 / Number of Pages: 4
... barrel at that one, and they will react realistically based on the momentum of the projectile. Throw in a rock, and it will sink. Trespasser also features some interesting sound technology and light sourcing techniques to add to the realistic environment.
Working with the realistic physics is a real time sound system based on your character's actual manipulation of the environment. Sounds are generated based on composition, structure, and velocity of two objects colliding. What this means is that if you throw a rock and hit a barrel, it will sound different than if the same rock hit a tree. The sou ...
|
|
A Detail Look Into The Internet And Where It Is Headed!
Number of Words: 1797 / Number of Pages: 7
... wait for the copy of the morning paper to hit the newsstands’(Bergeen 3). The television was invented on the heels of radio. ‘In 1920 the first primitive TV’s were born, however the media did not become persuasive until the 1950’s when they became more affordable’(Strate 2). They soon replaced the radio as the media form of choice.
The newest and currently most controversial form of mass media and communication is the Internet. ‘The Internet has linked sources of information around the world and with the progress made in telecommunications and personal computing, these information sites have become ac ...
|
|
Hate Groups And The Internet
Number of Words: 1758 / Number of Pages: 7
... type of lifestyle in which we live. The accessability of these hate sights is also of great concern to those hoping to keep the Internet a safe place for people of all ages to surf without the negative influences of such sites. There is however another side to the groups on the net, groups that attempt to provide both education and a positive influence on the surfers, groups which go from anti-hate sites to Green Peace and the world wildlife fund. So as the Internet grows in popularity and size it will become increasingly difficult to keep the so called hate sites off, without infringing on ...
|
|
Development Of The Submarine
Number of Words: 1443 / Number of Pages: 6
... world in the era after
World War II. The realignment of the superpowers after the war resulted in a
unique situation. The two major naval powers of the day, Great Britain and the
United States, were now allied against the greatest land power in history in the
Soviet Union. In the period from 1955 to 1965, the advantage was heavily in
favor of the U.S. As the United States had developed the atomic and hydrogen
bombs first, they obviously gained a head start which developed into a decisive
nuclear advantage. This advantage acted as an effective deterrent to any Soviet
movement into Western Europe. How ...
|
|
Computer Crime
Number of Words: 3429 / Number of Pages: 13
... to the Internet. With an increase in users everyday and new businesses taking advantage of perks of an alternate electronic world, this information dimension will only get bigger, more elaborate, provide more services, and we will find society as a whole more and more dependent on it.
However, even in an artificial environment such as the cyberspace, it appears mankind cannot escape from its somewhat overwhelming natural attraction to wrongful behavior or criminal tendencies. In turn this alternative dimension has been infected with the same criminal behavior that plagues our physical reality. The ...
|
|
Computers In Math
Number of Words: 1114 / Number of Pages: 5
... 2.Multiply x by x and store x2
3.Multiply x2 by x and store x3
4.Multiply x3 by x and store x4
5.Multiply x by 6 and store 6x
6.Multiply stored x2 by 5 and store 5x2
7.Multiply stored x3 by 4 and store 4x3
8.Multiply stored x4 by 6 and store 6x4
9.Add 6x4
10.Add 4x3
11.Subtract 5x3
12.Add 6x
13.Add 4
Binary Coded Decimal
One of the most convenient conversions of decimal to binary coded
decimal's is used today in present day computer's. BCD(Binary Coded
Decimal) is a combination of binary and decimal; that is each ...
|
|
Computer Scientist/Programmer
Number of Words: 1231 / Number of Pages: 5
... in updating, repairing,
modifying and expanding existing programs. They are often grouped into two
types. These two types are Applications programmers and Systems
programmers. Applications programmers usually are oriented towards
business, engineering, or science. They write software to handle specific
jobs within an organization such as a program used in a place of business
were a lot of inventory is being taken. They may also work alone to revise
existing packaged software. Systems programmers, on the other hand,
maintain and control the use of computer systems software. These workers ...
|
|
Even From It's Humble Beginnings, The Internet Has Always Been A Battlefield Between Phreaks And Administrators
Number of Words: 1773 / Number of Pages: 7
... offenders. Even from its beginnings, the Internet
has always been a battlefield between phreaks and administrators.
The Internet hasn't always been a public forum. In fact, the Internet has
been around for years. The Internet is just a new fad ("The More I Learn"
A1). The Internet originally began as DARPANET, a government-created
network, which was designed for defense communications. The Net structure
is such that it could survive a nuclear war ("Internet History"). The
creation of the Net can not be blamed for the existence of hackers though,
hackers are older than the Net itself, bu ...
|
|
Computer Programming
Number of Words: 631 / Number of Pages: 3
... disadvantage is that RAD tools
often require code to be written, which will result in most developers probably
having to learn to program using the underlying programming language, except in
the case of the simplest applications. The time gained from using a RAD tool
can be immense, however: Programmers using IBM's VisualAge report the ability
to create up to 80 percent of an application visually, with the last 20 percent
consisting of specialized functions, which means by using and IBM program it is
much easier because most of the program is graphics which is just point and
click to do, and the ...
|
|
|