|
|
» Browse Information Technology Term Papers
Nanotechnology: Immortality Or Total Annihilation?
Number of Words: 1964 / Number of Pages: 8
... the molecular level, but it can pick up and move atoms as well (Port 128). Unfortunately the one device that is giving nanoscientists something to work with is also one of the many obstacles restricting the development of nanotech. The STM has been regarded as too big to ever produce nanotech structures (Port 128). Other scientists have stated that the manipulation of atoms, which nanotech relies on, ignores atomic reality. Atoms simply don't fit together in ways which nanotech intends to use them (Garfinkel 105). The problems plaguing the progress of nanotech has raised many questions among the scien ...
|
|
Are "Good" Computer Viruses Still A Bad Idea?
Number of Words: 4796 / Number of Pages: 18
... paper also demonstrates that the main reason for the conflict between those
supporting the idea of a "beneficial virus" and those opposing it, is that the
two sides are assuming a different definition of what a computer virus is.
1. What Is a Computer Virus?
The general public usually associates the term "computer virus" with a small,
nasty program, which aims to destroy the information on their machines. As usual,
the general public's understanding of the term is incorrect. There are many
kinds of destructive or otherwise malicious computer programs and computer
viruses are only one of them. Such pr ...
|
|
Media Influence
Number of Words: 382 / Number of Pages: 2
... in Kosovo,Time weekly news magazine, March 29,1999)
A person who doesn't know anything about the Kosovo events and read Johanna Mcgeary will hate from Yugoslav President Slobodan Milosevic . Most of the people who read this media item may feel hostility to the Serbs and may try to help Muslims. And also support the NATO's attacked. As a result this article can be very effective article for the Muslims.
Nowadays Kosovo events have a big place on the mass media. CNN shows the bombing frames all the time, and the crying little Albanian children who are trying to escape from the Kosova, maybe the ...
|
|
Telnet
Number of Words: 669 / Number of Pages: 3
... services, bulletin boards, databases and other network services available
to casual computer users, although not with the friendly graphic user interfaces
one sees today.
Each of the early internet functions could be invoked from the UNIX
prompt, however, each of them used a different client program with its own
unique problems. Internet software has since greatly matured, with modern web
browsers (i.e. Netscape and Internet Explorer) easily handling the WWW protocol
(http) along with the protocols for FTP, gopher, news, and email. Only the
telnet protocol to this day requires the use of ...
|
|
Quantum Computers Fact -or- Fantasy?
Number of Words: 1636 / Number of Pages: 6
... computer has to make it way through long strings of 1’s and 0’s until it arrives at the answer. But what if instead of having to search by yourself, you could instantly create as many copies of yourself as there were rooms in the building all the copies could simultaneously peek in all the offices, and the one that finds the briefcase becomes the real you, the rest just disappear. – (David Freeman, discover )
David Deutsch, a physicist at Oxford University, argued that it may be possible to build an extremely powerful computer based on this peculiar reality. In 1994, Peter Shor, a mathematician at ...
|
|
The Internet Its Effects And Its Future
Number of Words: 6049 / Number of Pages: 22
... are all harnessing the power of the Internet. For many businesses the Internet is becoming integral to their operations. Imagine the ability to send and receive data: messages, notes, letters, documents, pictures, video, sound- just about any form of communication, as effortlessly as making a phone call. It is easy to understand why the Internet is rapidly becoming the corporate communications medium. Using the mouse on your computer, the familiar point-and-click functionality gives you access to electronic mail for sending and receiving data, and file transfer for copying files from one computer t ...
|
|
ISDN Vs. Cable Modems
Number of Words: 2980 / Number of Pages: 11
... access, each introduced in the spring of
1994:
· Continental Cablevision and Performance Systems International (PSI)
jointly developed PSICable, an Internet access service deployed over upgraded
cable plant in Cambridge, Massachusetts;
· Internex, Inc. began selling Internet access over ISDN telephone
circuits available from Pacific Bell. Internex's customers are residences and
small businesses in the "Silicon Valley" area south of San Francisco, California.
2.0 The Internet
When a home is connected to the Internet, residential communications
infrastructure serves as the "last mile" of the co ...
|
|
Unemployement - The Unavoidable Consequence Of New Technolog
Number of Words: 1575 / Number of Pages: 6
... is at the same time complex and volatile (Mokyr 1990, p.52). To illustrate, the term “Luddite” was coined in the early 19th Century to describe mindless machine-breaking (Jones 1996, p.21). The Luddites were skilled cloth-weavers who believed that technology would destroy their livelihood and opportunities for work (Jones 1996, p.22). They were opposed not to the knitting and lace-making machines as such, but more to the “de-skilling” involved as these machines replaced workers which, inevitably led to the destruction of craft industries during this period (Jones 1996, p.24).
Historic ...
|
|
History Of Computers
Number of Words: 821 / Number of Pages: 3
... a roll of paper tape. There was a need for an all-electronic machine.
This project was taken up by Dr. J. Presper Eckert Jr., and Dr. John W. Mauchly, with help from a few of their colleagues, in the spring of 1946. For two and a half years, they work diligently to construct a machine called the Electronic Numerical Integrator and Calculator, or ENIAC. This machine was a complex of 500,000 connections that linked over 18,000 vacuum tubes, weighed 30 tons, and occupied a room the size of an average three-bedroom home. ENIAC was capable of performing 5,000 additions in one second.
At around the time EN ...
|
|
What Really Is A Hacker?
Number of Words: 409 / Number of Pages: 2
... privacy, but give up trade secrets as well. A deep mistrust
of authority, some hackers consider authority to be a constriction force. Not
all hackers believe in this ethic, but generally authority represents something
that would keep people from being able to have full access and/or free
information.
Along with the "ethical code" of hackers there are a few basic "hacking
rules" that are followed, sometimes even more closely then there own code. Keep
a low profile, no one ever suspects the quite guy in the corner. If suspected,
keep a lower profile. If accused, simply ignore. If caught, plea ...
|
|
|