|
|
|
|
Morality And Ethics And Computers
... that make the practice okay? According to
Kenneth Goodman, director of the Forum for Bioethics and Philosophy at the
University of Miami, who teaches courses in computer ethics, "There's hardly a
business that's not using computers."1 This makes these questions all the more
important for today's society to answer.
There are also many moral and ethical problems dealing with the use of
computers in the medical field. In one particular case, a technician trusted
what he thought a computer was telling him, and administered a deadly dose of
radiation to a hospital patient.2 In cases like these, it is difficult to decide
who's fault it is. It could have been the co ...
|
Airbags - Pop Em' Or Keep Em'
... year old, expecting more screaming. Nothing.
Nothing happens. She shakes her little girl and realizes that something is
drastically wrong. Mica is dead.
At last count, this scenario has happened 31 times. How many more times
does it have to happen before the automotive industry does something about it?
Children are not the only victims, though. Small women and the elderly have
also been killed as a result of airbags. The time has come to ask ourselves,
"Do airbags really work?"
First off, most people feel that airbags are a great safety device.
They let people walk away from an accident without a scratch, right? They
protect everybody, right? People don't ...
|
Hacking
... with
their pursuit of information, so are we. The thrill of the hack is not in
breaking the law, it's in the pursuit and capture of knowledge.
To this end, let me contribute my suggestions for guidelines to follow to
ensure that not only you stay out of trouble, but you pursue your craft without
damaging the computers you hack into or the companies who own them.
I. Do not intentionally damage *any* system. II. Do not alter any system
files other than ones needed to ensure your
escape from detection and your future access (Trojan Horses, Altering
Logs, and the like are all necessary to your survival for as long as
possible.) III. Do ...
|
What Is A Robot
... "A reprogrammable, multifunctional manipulator designed to move
material, parts, tools or specialized devices, through variable
programmable motions, for the performance of a variety of
tasks."
The key wor ds in their definition are "reprogrammable" and
"multifunctional." By "reprogrammable" they mean that if a robot gets a new
assignment, it will need new instructions, but its basic structure will not
change (except maybe a new mechanical hand). By "multifunctional" they
mean a robot is the mechanical counter part of a computer that can handle
various problems without any major hardware modifications. The only thing
that change ...
|
Battle Of Computer Bytes
... is much better than Windows 3.x. It borrows some from the Macintosh interface and has improved on it.
Some improvements are the ability to work with folder icons that represent directories and subdirectories in DOS. Windows 95, unlike the Mac, logically groups data and resources. A Taskbar menu lets you call up and switch between any software application at any time. Thus feature is better than the Mac's because its use is more obvious. It clearly shows what is running and allows you to switch programs with a single click of the mouse. Control panels have been added so you can configure your hardware. There is easy access to frequently used files. You can ma ...
|
How The Internet Got Started
... puzzle in deep military secrecy, and arrived
at a daring solution made in 1964.The principles were simple . The network
itself would be assumed to be unreliable at all times . It would be designed
from the get-go to tyranscend its all times . It would be designed from the
get-go to transcend its own unrreliability. All the nodes from computers in
the network would be equal in status to all other nodes , each node with its
own authority to originate , pass , and recieve messages. The messages would be
divided into packets, each packet seperatly addressed. Each packet would begin
at some specified source node , and end at some other specified destination node
. Ea ...
|
Othello: Game Strategy
... 5 black stones, with a white stone on the
end, and beside that white stone a black. You of course, would put a white
stone at the end with the 5 black stones, but that is a bad mistake. Go to
the side with the one black (a setup move so the computer cannot capitalize
when you turn 5 black stones white, and the computer your seven whites
black.
Always play within your set "square". If you had on the bottom row 3
white, and on the second row 2 blacks, you would only play within that
designated square, which is 3 x 3 stones. (see diagram.) This ensures
that the computer can only play one stone past the square at any time,
which will help you in predicting ...
|
The Year 2000 Problem
... 2 digits for the year. January 1, 2000 would be stored as 01/01/00. But the computer will interpret this as January 1, 1900- not 2000” (de Jager 1). The ‘19’ is “hard-coded” into computer hardware and software. Since there are only 2 physical spaces for the year in this date format, after ‘99’, the only logical choice is to reset the number to ‘00’.
is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. “Time is running out- the Year 2000 is inevitable! The problem will occur simultaneously worldwide, time zones withstanding. It affects all languages and platforms, hardware & software. The demand ...
|
As A Technology, It Is Called Multimedia
... We can
expect to see: movies-on-demand, video games, databases, educational
programming, home shopping, telephone services, telebanking,
teleconferencing, even the complex simulations of virtual reality. This
souped-up television will itself be a powerful computer. This, many
believe, will be the world's biggest media group, letting consumers tune
into anything, anywhere, anytime.
The most extraordinary thing about the multimedia boom, is that so many
moguls are spending such vast sums to develop digital technologies, for the
delivering of programs and services which are still largely hypothetical.
So what is behind such grand prophecies? Primarily, two ...
|
Now Is The Time To Be Computer Literate
... the entire
mall in a comfortable in front of your computer. Push a button and the entire
stock of a store will be at your finger tips. When you do go to a store to shop
you will not use money. You will use either a credit card or debit card which
will automatically deduct the amount if you purchase from your bank account.
Our homes will be run by computers. Computers will adjust the
temperature. Home appliances will be linked to the computer. Imagine driving
home from work and calling your computer and having it start dinner for you.
Have it adjust the temperature so your home will be a comfortable temperature
when you arrive. Window covering will be adjusted t ...
|
Browse:
« prev
6
7
8
9
10
more »
|
|
|