|
|
|
|
The Arrival Of Email
... have sometimes been used by external parties to take companies
to task in court. With the digital communication methods of the Information
Age, organizational managers are finding that E-mail archives and files are
telling sources of information about an organization's policies and actions.
In the antitrust case against Microsoft "E-mail messages dashed off years
ago by the Microsoft Corp. chairman and his top lieutenants now figure
prominently as digital "smoking guns" . . . Trustbusters say electronic
messages, perhaps more than any paper document, could help them prove that
Microsoft sought to crush competitors and monopolize access to the
Internet." Howeve ...
|
Network Security And Firewalls
... locks, people or physical barriers that stand in the way of a desired location or object. Computer security uses much of the same utilities. Passwords take the place of keys, security analysts take the place of guards, and firewalls take the place of physical barriers. Passwords and firewalls are the two most common ways to secure a computer system.
Passwords are the most common forms of computer and network security. They are the most common because of three main reasons. First of all, passwords are cheap to implement. Virtually all computers have a password system built into it already. Every home computer can have a password to lock out certain programs ...
|
Media Influence
... the Serbs and the Albanian Kosovars, she is informing the war which is materialise in the desk by singing an agreement. Although there is an agreement waiting for to sign, but Yugoslav President Slobodan Milosevic resist singing it. And also she is giving the information about the position of Albanians and the NATO's attack. (Johanna Mcgeary, Standoff in Kosovo,Time weekly news magazine, March 29,1999)
A person who doesn't know anything about the Kosovo events and read Johanna Mcgeary will hate from Yugoslav President Slobodan Milosevic . Most of the people who read this media item may feel hostility to the Serbs and may try to help Muslims. And also support t ...
|
The Year 2000 Computer Problem
... This only allows 2 digits for the year. January 1, 2000 would be stored as 01/01/00. But the computer will interpret this as January 1, 1900- not 2000" (de Jager 1). The '19' is "hard-coded" into computer hardware and software. Since there are only 2 physical spaces for the year in this date format, after '99', the only logical choice is to reset the number to '00'.
The year 2000 problem is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. "Time is running out- the Year 2000 is inevitable! The problem will occur simultaneously worldwide, time zones withstanding. It affects all languages and plat ...
|
Lasers And Their Uses
... are at
higher energy levels than are at lower energy levels. If a photon whose
frequency corresponds to the energy difference between the excited and ground
states strikes an excited atom, the atom is stimulated, as it falls back to a
lower energy state, to emit a second photon of the same frequency, in phase
with and in the same direction as the bombarding photon. This process is
called stimulated emission. The bombarding photon of the emitted photon may
then strike other excited atoms, stimulating further emission of photons, all
of the same frequency and phase. This process produces a sudden burst of
coherent radiation as all the atoms discharge in a rapid c ...
|
Digital Block For A Function Generator
... and sent out as digital signals to other parts of this function generator namely the amplifier module. Also a filter selector circuit is built in after the digital block. The user inputs controlling frequency and symmetry are also built into this control block.
Therefore it is clear that the digital block can be divided into 4 distinct blocks, each with its own functionality. These blocks are the control module, counter module, filter control module and 8-bit D/A. The D/A chosen is the DAC0801LCN. It’s specifications can be found in the appendix. The layout of this design is shown below.
The interconnections will be discussed later but the ...
|
The Evaluation Of The Microprocessor.
... their has been a constant battle over cutting
edge technology. In the 80's Motorola won the battle, but now in the 90's it
looks as Intel has won the war.
The microprocessor 68000 is the original microprocessor(Encarta 95). It was
invented by Motorola in the early 80's. The 68000 also had two very distinct
qualities like 24-bit physical addressing and a 16-bit data bus. The original
Apple Macintosh ,released in 1984, had the 8-MHz found at the core of it. It
was also found in the Macintosh Plus, the original Macintosh SE, the Apple
Laser-Writer IISC, and the Hewlett-Packard's LaserJet printer family. The
68000 was very efficient for its time for example it ...
|
Telnet
... around the globe. A common
program feature is the ability to emulate several diverse types of terminals--
ANSI, TTY, vt52, and more. In the early days of networking some ten to fifteen
years ago, the "internet" more or less consisted of telnet, FTP (file transfer
protocol), crude email programs, and news reading. Telnet made library catalogs,
online services, bulletin boards, databases and other network services available
to casual computer users, although not with the friendly graphic user interfaces
one sees today.
Each of the early internet functions could be invoked from the UNIX
prompt, however, each of them used a different client program with its ow ...
|
Computer Viruses
... to deny is that the nature of their actions are slowly consuming the fabric of our country’s moral and ethical trust in the information age.
Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still being attacked by highly skilled computer criminals of which we know very little a ...
|
CAD/CAM Systems
... are basically three types of CAD models. The first type is wire frame
models, just a wire of zero thickness displaying the designed shape for the
intended designer. The second type of model is the surface model, a series
of small and large sheets connected to one another like a quilt blanket,
displaying the shape the designer intended. Lastly, is the solid model. It
is represented in the computer as solid shape, as if it were, for example a
solid piece of steel All data concerning its shape is known by the
computer software, and can be manipulated in more of an automated way
rather than every surface or every wire frame requiring individual shaping
(Unigraphics 1 ...
|
Browse:
« prev
31
32
33
34
35
more »
|
|
|