|
|
|
|
Society And Technology
... good. Society has produced many weapons specialized to kill large quantities of people. Many people have to live in constant fear o these weapons, while others use them for protection. We still have as many wars as we did in the past, but now the new technology used in them helps bring about more casualties. Could this be crueler than our ancestors.
Besides the wars, society has not grown in understanding other people. There is still prejudice today. Many hate groups like the KKK are still around today, and many new ones have come into being. In the past when our country was just starting to be formed, there were prejudices just because people were differen ...
|
Data Storage Devices
... information for centuries. If long-term storage is not of prime
concern, magnetic medium can retain tremendous amounts of data and consume
less space than a single piece of paper.
The magnetic technology used for computer data storage is the same
technology used in the various forms of magnetic tape from audiocassette to
videocassette recorders. One of the first computer storage devices was the
magnetic tape drive. Magnetic tape is a sequential data storage medium. To
read data, a tape drive must wind through the spool of tape to the exact
location of the desired information. To write, the tape drive encodes data
sequentially on the tape. Because tape drives c ...
|
Airships
... obtains its buoyancy
from the presence of a lighter-than-air gas such as hydrogen or helium. The
first airship was developed by the French, called a ballon dirigible, it could
be steered and could also be flown against the wind.
TYPES OF AIRSHIP
Two basic types of airship have been developed: the rigid airship, the shape of
which is fixed by its internal structure; and the nonrigid blimp, which depends
on the pressure created by a series of air diaphragms inside its gas space to
maintain the shape of its fabric hull. Inventors sought to combine the best
features of these models in a semirigid type, but it met with only limited
success. Today only the nonrigid ...
|
Are "Good" Computer Viruses Still A Bad Idea?
... of
the proposed models of "beneficial" viruses and points out the problems in them.
A set of conditions is listed, which every virus that claims to be beneficial
must conform to. At last, a realistic model using replication techniques for
beneficial purposes is proposed and directions are given in which this technique
can be improved further.
The paper also demonstrates that the main reason for the conflict between those
supporting the idea of a "beneficial virus" and those opposing it, is that the
two sides are assuming a different definition of what a computer virus is.
1. What Is a Computer Virus?
The general public usually associates the term "computer virus" ...
|
Can Computers Think? The Case For And Against Artificial Intelligence
... true. The
three main theories are: 1. Thought doesn't exist; enough said. 2. Thought
does exist, but is contained wholly in the brain. In other words, the actual
material of the brain is capable of what we identify as thought. 3. Thought is
the result of some sort of mystical phenomena involving the soul and a whole
slew of other unprovable ideas. Since neither reader nor writer is a scientist,
for all intents and purposes, we will say only that thought is what we (as homo
sapien) experience.
So what are we to consider intelligence? The most compelling argument
is that intelligence is the ability to adapt to an environment. Desktop
computers can, say ...
|
Essay On Hacking
... which is another programming
language used to design web page and then there are some browsers that can play
videos and sounds.
Have you ever wondered why when you want to go to a website you have to
type http://name of site.com? well I have been wondering for ages but still
can't figure out, but sometimes you type ftp:// before the name of the site.
This simply means File transfer protocol. You use this when download image
files or any other files. Now, onto hacking. Most people stereotype people
simply as "HACKERS," but what they don't know is that there are three different
types of computer whizzes.
First, there are hackers. Hackers simply make viruses ...
|
Should The U.S. Government Be Scared Of Cyber Terrorism?
... and computer programs.
The Colombian Rebel Group ELN is one of the many terrorist groups known to have a web page on the Internet. The ELN is known mainly for blowing up oilrigs in South America, and for kidnapping foreign executives. Two years ago, a Swedish hacker managed to go to London, to Atlanta, and then to Florida where he rerouted and tied up phone lines in each country, put 911 services out of commission, impeded the response of police, fire and rescue services. There are also a lot of cyber attacks within the United States, which are referred to as domestic attacks. In 1996, there were 128 cases of cyber attacks on the FBI's files, in 1998 the ...
|
Noise Reduction In Hearing Aids
... greater than the ambient noise. On the other hand, a person with a 30-decibel sensorineural loss might need the speech signal to be 15 or more decibels greater than the ambient noise. The hearing aid’s task is to acoustically or electronically compensate for both the neurological shortcomings of the hearing impaired person and the wide band increase inherent in any basic amplifier.
Acoustic compensation can be carried out in a hearing aid microphone. Most hearing aids today utilize omnidirectional microphones, which pick up sound equally from all directions. This may be beneficial and practical in some cases, as in the completely in the canal (CIC) aid ...
|
Intranets
... Quick access and easy programming
is also another consideration that is made when considering this type of network.
Intranets have just started to be implemented throughout the world and already a
big change is being noticed. Companies are keeping track of all of their
important information on web sites, which are restricted to users, unless they
have the security code to access them. Thanks to Internet technology, companies
and other types of organizations are able to keep all of their information
organized and easily accessible with a click of a button.
The Internet, how has it changed the world around us? Government, education,
business is all wrapping aro ...
|
Global Positioning Systems
... would tune one DME channel and draw a circle on your chart around the DME transmitter, the radius of which was your DME reading in nautical miles. Then you'd tune in a second DME station and repeat the process. On your chart at this point there would be two circles whose lines intersected at two points. Even a vague guess of your whereabouts would be enough to discard the bogus point, and you'd be left with a pretty good idea of your position. Better yet, take a cut from a third DME transmitter and draw a third circle on your chart. Now you'd have three intersecting circles and your position would be inside the little triangle formed by the intersection of the ...
|
Browse:
« prev
7
8
9
10
11
more »
|
|
|