|
|
|
|
Computer Crime
... small amounts of money from many bank customers this
adding up to a great deal of money. I also read about phone phreaks more known
as "Phreakers." They steal long distance phone services. Phreakers commit many
other crimes against phone companies.
In the book Computer Crime it states, most people commit thesis crimes, because
they where carious and wanted to explore the system. All they want to do is
exploit systems not destroy it. It is purely intellectual. I know one reason
is that is can be very rewarding. Hackers are drawn to computers for the
aninymity they allow. They feel powerful and can do anything. Hackers can be
there own person out side the r ...
|
Can Computers Understand?
... have no thoughts of
their own, they cannot understand. Any actions being performed to simulate
behavior are confined by the programs available to the computer. He presents
the example of a man linking Chinese characters and appearing to know the
language, but in reality the man is just following the instructions given to him
( the program). This example serves well to explain how although a computer can
look like it understands a story, it can do no more than "go through the
motions."
Of course such a definitive standpoint on an issue as controversial as
the capacity of an AI to understand will draw many critics. The criticism of
his theory tha ...
|
Smart Cards
... common uses of today are: banking and retail, mo-bile communications, information technology, identity and health, park-ing, public telephony, mass transit and campus ID solutions; and areas of use increase every day.
One of the most fast developing areas of use is Banking and Retail. For business of financial transactions is very competitive and fast-changing, banks are always seeking for new valuable services for their customers. give an ability to deploy and manage multiple ap-plications on a wallet-size plastic card. Smart card technology also prom-ises to resolve the security problems through a better methods of protec-tion against theft and fraud.
Here ...
|
Knowledge Is Power: How To Buy A Computer
... put himself at the mercy of some salesman who may not know much
more than he does. If one would follow a few basic guidelines, he could be
assured of making a wise purchase decision.
A computer has only one purpose; to run programs. Some programs require more
computing power than others. In order to figure out how powerful a computer the
consumer needs, therefore, a person must first determine which programs he wants
to run. For many buyers, this creates a problem. They cannot buy a computer
until they know what they want to do with it, but they cannot really know all
of the uses there are for a computer until they own one. This problem is not as
tough as it see ...
|
A Computerized World
... CD-driver in your car, and tell the computer where
to go. The rest will be done automatically. This will be a safer, faster,
and more comfortable way to travel.
Another new area, called "virtual reality" is currently being tested. This
is a way to simulate reality on a monitor. In order to feel this so-called
reality you have to wear special electronic glasses and an electronic suit.
Fastened to the suit are sensors, which send information to the main
computer. This computer works with the data and displays them on the
electronic spectacles. This is a technique which use three-dimentional
views, therefore the scenery seems incredibly realistic. If you want to be
a ...
|
Nanotechnology: Immortality Or Total Annihilation?
... speaks of will be undoubtedly small, in fact, nano- structures will only measure 100 nanometers, or a billionth of a meter (Stix 94). Being as small as they are, nanostructures require fine particles that can only be seen with the STM, or Scanning Tunneling Microscope (Dowie 4). Moreover the STM allows the scientists to not only see things at the molecular level, but it can pick up and move atoms as well (Port 128). Unfortunately the one device that is giving nanoscientists something to work with is also one of the many obstacles restricting the development of nanotech. The STM has been regarded as too big to ever produce nanotech structures (Port 128). Other ...
|
Classification Analysis
... that display words and
graphics so that a person can see them. Many people can easily understand
why the monitor is a form of output device since it is the screen that
tells them what the computer is actually doing. Simply put, without a
monitor, the computer itself is basically useless. Another form of output,
which is rarely noticed by many computer users however, is the printer.
Many people have probably used a printer before, but it is just that they
never realize it is also a form of output.
As opposed to 'output', 'input' consists of components that take in
information from the users themselves so that the computer will know the
tasks it is supposed ...
|
"Computer Security" By Time Life Books
... security works by many ways of password use or by locking it up.
The password method is enforced by prompting a computer user to enter a password
before they can access any programs or information already contained within the
computer. Another password security method would be to have the computer user
carry a digital screen that fits in your pocket. This digital screen receives
an encrypted message and displays numbers that change every few minutes. These
numbers make the password one needs for the next few minutes in order to access
the computer. This password method is somewhat new. It is also better, for the
previous password method is not totally fool ...
|
Technological Development And The Third World
... development and environmental degradation. I
will look first at the way in which development occurred in the South, and the
reason it happened the way that it did. From there, I will show how these
methods of development proceeded to eventually cause widespread environmental
damage and it's effect on the local people. .
DEVELOPMENT: "WESTERN" STYLE
When I refer to "the environment", I mean not only the habitat that
humans, plants and animals inhabit, but also the physical, emotional and
psychological attitudes that are encompassed by these in their daily existence.
Development, by my definition, will consequently refer to the technological
advancement of a comm ...
|
The History Of Computers
... only additions of
numbers entered by dials and was intended to help Pascal's father, who was a tax
collector" (Buchsbaum 13).
However, in 1671, Gottfried Wilhelm von Leibniz invented a computer that
could not only add but, multiply. Multiplication was quite a step to be taken
by a computer because until then, the only thing a computer could do was add.
The computer multiplied by successive adding and shifting (Guides 45).
Perhaps the first actual computer was made by Charles Babbage. He
explains himself rather well with the following quote:
"One evening I was sitting in the rooms of the Analytical Society at
Cambridge with a table full of logarithms lyin ...
|
Browse:
« prev
27
28
29
30
31
more »
|
|
|