|
|
» Browse Information Technology Term Papers
HDTV: The Emergence Of A New Generation In Television.
Number of Words: 1782 / Number of Pages: 7
... high definition television sets.
HDTV, is known in the television industry as high definition
television. HDTV is paving the way as a new medium waiting to emerge as
the greatest thing to hit television since color. However it's not the
1950's and HDTV is already up and running in other markets. Japan's NHK
broadcasting group used 1125/60 equipment and European ZDF broadcasters
used 1250/50 equipment to cover the 1996 Atlanta games using the HDTV
signal (Hitchen, 1997). Although no one could receive the signal except
experimental digital televisions, a converter was used to broadcast the
higher s ...
|
|
Software
Number of Words: 744 / Number of Pages: 3
... the physical aspects of computers and related devices.)
can be thought of as the variable part of a computer and hardware the invariable part. is often divided into application (programs that do work users are directly interested in) and system (which includes operating systems and any program that supports application ). The term middleware is sometimes used to describe programming that mediates between application and system or between two different kinds of application (for example, converting data from one file format to another file format).
An additional and difficult-to-classify categ ...
|
|
Facing Reality
Number of Words: 950 / Number of Pages: 4
... war in the past has created an attitude of "it can't happen here" to grow.
Weizenbaum tries to say the military is not an evil or technology is not evil because it has been adopted by the military, but we are becoming increasingly militarized. I think he states this in an effort not to make direct negative statements towards the government in fear of the possibility of prosecution. Although the computers' personal uses are fine he believes that the principal applications and intelligence within are devices intended to kill people.
Artificial intelligence and people working in computer science take t ...
|
|
Internet Censorship And The Communications Decency Act
Number of Words: 676 / Number of Pages: 3
... be considered "obscene" or
"harmful to minors." Definitions annexed on to them are extremely
broadsided and could not only ban pornography but also things like
information on AIDS and other sexually transmitted diseases, birth control,
breast cancer, certain forms of artwork, and many other things that should
never be considered "obscene." However Internet censorship laws could
potentially make it illegal to publish things like this on the Internet,
and in being so vague, there is plenty of room for abuse of laws like these.
Politicians could misuse these laws to ban things that they personally ...
|
|
Secure Electronic Transactions
Number of Words: 1023 / Number of Pages: 4
... allows you to navigate through the web. Your browser should have industry security standards, such as Secure Sockets Layer (SSL) or (SET) Secure Electronic Transaction. By having these security standards on your browser, it allows the transaction information being sent back and forth from the reseller to be encrypted. Most computers already come with this browser pre-installed. If this is not the case, to obtain one of the most popular brands of browsers, you can download them from the Internet at no cost.
The creation of Secure Electronic Transaction (SET) standard has involved the efforts of ma ...
|
|
Fiber Optics
Number of Words: 864 / Number of Pages: 4
... cable, called the drop, is the portion of the network that runs between the last place where the signal is split to the home of the subscriber. at this time, the drop portion of the network is exclusively coaxial cable; however, cable operators and equipment vendors alike are exploring ways to make fiber an economic alternative to coax.
Cable TV operators are evaluating a variety of new services, among the most promising are: alternative access, personal communications networks, video on demand, interactive services, digital compression, ATM, optical amplifiers and 1550nm transmission, erbium- do ...
|
|
Computer Viruses: Past, Present And Future
Number of Words: 4592 / Number of Pages: 17
... spread by
attaching themselves to other programs (e.g., word processors or spreadsheets
application files) or to the boot sector of a disk. When an infected file is
activated - or executed - or when the computer is started from an infected disk,
the virus itself is also executed. Often, it lurks in computer memory, waiting
to infect the next program that is activated, or the next disk that is accessed.
What makes viruses dangerous is their ability to perform an event. While some
events are harmless (e.g. displaying a message on a certain date) and others
annoying (e.g., slowing performance or a ...
|
|
Maglev Consequences
Number of Words: 689 / Number of Pages: 3
... distance flights take
valuable landing slots that could be used for larger planes on more profitable,
longer flights. With the maglev vehicles the shorter trips excluding access
time can be cut a lot. With a study of 16 major corridors of travel, less than
300 miles in length, they studied how well the maglev vehicles could help, and
in 10 out of the 16 the time could be cut at least slightly. Also the cost of
a maglev trip will be less so that even with the longer trips where the maglev
vehicles don't have the time advantage they will have the cost advantage.
Because land is costly and scarc ...
|
|
The Internet
Number of Words: 1878 / Number of Pages: 7
... network that linked from city to
city, and base to base. The network was designed to function when parts of it
were destroyed. The network could not have a center because it would be a
primary target for enemies. In 1969, ARPANET was created, named after its
original Pentagon sponsor. There were four supercomputer stations, called nodes,
on this high speed network.
ARPANET grew during the 1970's as more and more supercomputer stations
were added. The users of ARPANET had changed the high speed network to an
electronic post office. Scientists and researchers used ARPANET to collaborate
on proj ...
|
|
The Arrival Of Email
Number of Words: 439 / Number of Pages: 2
... dashed off years
ago by the Microsoft Corp. chairman and his top lieutenants now figure
prominently as digital "smoking guns" . . . Trustbusters say electronic
messages, perhaps more than any paper document, could help them prove that
Microsoft sought to crush competitors and monopolize access to the
Internet." However, Microsoft is not alone. Morgan Stanley Dean Witter & Co.
recently agreed to settle a discrimination lawsuit initiated by employees.
"The smoking gun: an E-mailed joke, playing on stereotype s about African-
American speech patterns, that a colleague had zapped around the office."
( ...
|
|
|