|
|
» Browse Information Technology Term Papers
Technology Transfer
Number of Words: 768 / Number of Pages: 3
... theses factors through many examples in history. Leading into the twentieth century even though many would like to fast forward into the dawn of electronics, there is still a major focus on technology in Africa and Asia. However, the transfer of technology is now steering away from dominating and leaning towards local adaptation.
Africa and India experienced a deeper affect of technological transfer because they were conquered and colonized by Europe. The steamboat with its ability to travel up and down river enabled Europeans deep into Africa and Asia. The railroad helped eliminate the difficu ...
|
|
Computer - Hacking
Number of Words: 471 / Number of Pages: 2
... interested in the so called “cracking” of passwords without wanting to destroy anything. There is definitely also a great competition under the top-hackers of the world. Hackers often gain entrance because of a lack of security. This brings me to my second point which deals with passwords.
Very often Passwords are written down on a sheet of paper and then, fixed to the computer’s screen, which is definitely not the best way to protect yourself from hacking. (A password should have a minimum of 5 characters and should definitely be a combination of letters and numbers, which makes it more difficult f ...
|
|
The Next Revolution In Music Technology: Make Or Break?
Number of Words: 1295 / Number of Pages: 5
... to understand arguments surrounding the issue. MP3 is a new way to save, copy, and play audio files on a computer. The audio files are near CD-quality and take up very little space on a computer’s hard drive. Previously, high-quality audio files were saved on a computer in WAV format, which takes up much more hard drive space than MP3. For example, a three-minute WAV file would use about 30 megabytes of disk space. But in MP3 format, the same song would use only two megabytes, leaving much more hard drive space available on the computer (which benefits the computer user).
Because MP3 files ar ...
|
|
A Cray SuperComputer Comes To The University Of Toronto
Number of Words: 680 / Number of Pages: 3
... multiply two numbers,
the Cray performs everything in one clock cycle. This power is measured in
Millions of Floating Point Operations Per Second (MFLOPS) - which is to
say the rate at which floating-point operations can be performed. The Cray
MFLOPS vary as it does many activities, but a rate of up to 210 MFLOPS
(per CPU) can be achieved.
The second '2' in the X-MP/22 title refers to the two million 64-bit
words (16Mb) of shared central memory. This can be expanded to four
million words in the future if the need arises. But it doesn't stop there!
The Cray can pipe information back and forth bet ...
|
|
Response To AOL Controversy
Number of Words: 702 / Number of Pages: 3
... located anywhere else on the net with the
aid of any search device, such as infoseek, yahoo, microsoft network or web-
crawler. These sites are no harder to use and they provide lots of helpful
menus and information.
In Wood's article, he states that he lives in Chicago, and AOL has
several different access numbers to try if one is busy. He writes that often
when he has tried to log on using all of the available numbers, and has still
been unsuccessful. This is a problem for him because he is dependent on AOL to
"do the daily grind of (his) job as a reporter and PM managing editor." If I
was not s ...
|
|
Computer Multimedia
Number of Words: 1359 / Number of Pages: 5
... other method is by bit mapped graphics. Here the computer
actually keeps track of every point in the picture and its description. Paint
programs use this technique. Drawing programs are usually vector mapped
programs and paint programs are usually bit mapped.
Computer sound is handled in two different ways. The sound can be described
digitally and stored as an image (wave format) of the actual sound or it can be
translated in to what is called midi format. This is chiefly for music. In a
piano, for instance, the information for what key to hit, for how long ad at
what intensity is stored and ...
|
|
Parity/Non-parity Check
Number of Words: 236 / Number of Pages: 1
... was incorrect.
To Prevent this from happening, a parity check system was developed.
Each character is represented by a byte consisting of a combination of
intelligence bits (seven bits in ASCII and eight bits in EBCDIC) and an
additional bit called a check or parity bit.
Even parity codes place a check bit with each byte that contains an
uneven number of 1 bits. (Remember that a bit is either 1 or o). Because
the check bit is transmitted only with characters composed of an uneven
number of 1 bits,all characters transmitted will have n even number of 1
bits. The check bit is transmitted ...
|
|
Artificial Intelligence
Number of Words: 2749 / Number of Pages: 10
... telephone transactions , and home banking activities. This study
focuses on academic research in neural network technology . This study was
funded by the Banking Commission in its effort to deter fraud.
Overview
Recently, the thrust of studies into practical applications for artificial
intelligence have focused on exploiting the expectations of both expert systems
and neural network computers. In the artificial intelligence community, the
proponents of expert systems have approached the challenge of simulating
intelligence differently than their counterpart proponents of neural networks.
Expert s ...
|
|
Virtual Reality Technology And Society
Number of Words: 1638 / Number of Pages: 6
... . . 7
Virtual Reality in the Present. . . . . . . . . . . . . . . . . . . 9
Virtual Reality in the Future . . . . . . . . . . . . . . . . . . . 10
THE SOCIAL IMPLICATIONS OF VIRTUAL REALITY . . . . . . . . . . . . . . . 11
New Rules of Behavior . . . . . . . . . . . . . . . . . . . . . . . 11
Adverse Effects . . . . . . . . . . . . . . . . . . . . . . . . . . 12
CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
ABSTRACT
This paper addresses ...
|
|
Software Piracy: A Big Crime With Big Consequences
Number of Words: 2190 / Number of Pages: 8
... connected
to the internet that offered it's users more than one million dollars worth of
software 'free of charge.' Mr. LaMacchia was caught by the authorities and was
acquitted of this piracy due to the lack of legal standards for this crime.
Another example is off local bulletin board systems. Many are run out of the
offenders homes with just a phone line, a computer and a modem. Here members of
this service can send and receive pirated software (otherwise known as 'warez')
as their own pace and leisure. There are not just one or two of these bulletin
boards around there are in fact many. Most ...
|
|
|