|
Term Papers on Computers
Ethics In Cyberspace
Number of words: 940 - Number of pages: 4.... 5) honor property rights including copyrights and patents
6) give proper credit for intellectual property
7) respect the privacy of others
8) honor confidentiality.
The very nature of electronic communication raises new moral issues.
Individuals and organizations should be proactive in examining these concerns
and developing policies which protect liabilities. Issues which need to be
addressed include: privacy of mail, personal identities, access and control of
the network, pornographic or unwanted messages, copyright, and comm .....
|
History Of The Internet
Number of words: 856 - Number of pages: 4.... faced with a problem. How could the country communicate after a
nuclear war? The Pentagon's Advanced Research Projects Agency, ARPA, had a
solution. They would create a non-centralized network that linked from city to
city, and base to base. The network was designed to function when parts of it
were destroyed. The network could not have a center because it would be a
primary target for enemies. In 1969, ARPANET was created, named after its
original Pentagon sponsor. There were four supercomputer stations, called nodes,
on this high speed network.
ARPANET g .....
|
Against Federal Censorship Of The Internet
Number of words: 334 - Number of pages: 2.... upheld the lower court's ruling and struck down the decency act. The Supreme Court stated that the act was not only vague but that it unconstitutionally restricted the free speech rights of adults.
An estimated of 40% of Internet material originates from foreign countries, where the US's Decency Act would not apply. Governments should not have the power to determine what sort of material is fit or unfit for individuals and their children to access on the Internet. Such power could become an oppressive form of censorship and could be used in an arbitrary manne .....
|
The Necessity Of Computer Security
Number of words: 1815 - Number of pages: 7.... true
nature had yet to be seen."
Today's applications of computers are vast. They are used to run ordinary
household appliances such as televisions and microwaves, to being tools in the
workplaces through word processing, spreadsheets, and graphics software, to
running monumental tasks such as being the heart and soul of the nations tax
processing department, and managing the project timetables of the Space Shuttle.
It is obvious that the computer is now and always will be inexorably linked to
our lives, and we have no choice but to accept this technology .....
|
Cryptography
Number of words: 3143 - Number of pages: 12.... and the encrypted data is no longer safe. The sender and the receiver then usually agree on a new key to prevent any further damage.
In ancient Greece, around 550 Bc, messages were sent encoded to generals and could only be decoded using special staff keys. The key actually consisted of a physical object, which was applied on the message to get the decrypted version of it. In 50 Bc., one of the most simple cryptographic algorithms ever used was the one called the Caesar cipher, that was used by Julius Caesar to send messages to his generals. It consisted simply .....
|
Computer Crime In The 1990's
Number of words: 2399 - Number of pages: 9.... four maybe even up to five billion
dollars every year. Making an unwitting company pay for long distance calls is
the most popular form of phone fraud today. The first step is to gain access to
a private automated branch exchange known as a "PABX" or "PBX". One of these can
be found in any company with twenty or more employees. A "PABX" is a computer
that manages the phone system including it's voice mail. Once inside a "PABX" a
hacker looks for a phone whose voice mail has not yet been programmed, then the
hacker cracks it's access code and programs it's voice m .....
|
All About Disk Geometry And The 1024 Cylinder Limit For Disks.
Number of words: 1103 - Number of pages: 5.... that I used
kernel version 2.0.8 source as a reference.Other versions may differ a bit.
2.Booting
When the system is booted, the BIOS reads sector 0 (known as the MBR - the
Master Boot Record) from the first disk (or from floppy), and jumps to the code
found there - usually some bootstrap loader.These small bootstrap programs found
there typically have no own disk drivers and use BIOS services.This means that a
Linux kernel can only be booted when it is entirely located within the first
1024 cylinders.
This problem is very easily solved: make sure .....
|
Truth And Lies About The Computer Virus
Number of words: 1126 - Number of pages: 5.... the truth. There is no
organization that certifies wheather or not a virus is real. Even more
potentially harmful is that the anti-virus companies could write viruses in
order to sell their programs. Software companies have and do distort the truth
about viruses. "Antivirus firms tend to count even the most insignificant
variations of viruses for advertising purposes. When the Marijuana virus first
appeared, for example, it contained the word "legalise," but a miscreant later
modified it to read "legalize." Any program which detects the original virus can
det .....
|
|
|