|
Term Papers on Computers
Computer Communications: Bus Network
Number of words: 1318 - Number of pages: 5.... messages pass directly from a node to the central computer, which
handles any further routing (as to another node) that might be necessary. A star
network is reliable in the sense that a node can fail without affecting any
other node on the network. Its weakness, however, is that failure of the central
computer results in a shutdown of the entire network. And because each node is
individually wired to the hub, cabling costs can be high.Ring networkRing
Network, in computer science, a local area network in which devices (nodes) are
connected in a closed loop, or .....
|
Data Security
Number of words: 1173 - Number of pages: 5.... computer
system and erased 20,000,000 dollars in overdue property taxes (Secure
Commerce on The Internet 12). The corporation Citibank also had an
incident in 1995 in which Russian hackers stole over 10,000,000 dollars in
fraudulent wire transfers by exploiting a hole in it's systems provision
for money transfers. It cost the Italian government over 225,000 to repair
a glitch in The Rome Air Force Base's system. The telecommunications giant
of the west Southwestern Bell had a problem with a hacker named
Christopher Schanot that cost them around 100,000 dollars .....
|
Hackers: Information Warefare
Number of words: 2218 - Number of pages: 9.... down. One day, you see
a big wooden or metal box with wires coming out of it sitting on the sidewalk
where there had been none.
Many people won't even notice. Others might say, "Oh, a box on the street.". A
few might wonder what it does and then move on. The hacker, the true hacker,
will see the box, stop, examine it, wonder about it, and spend mental time
trying to figure it out. Given the proper circumstances, he might come back
later to look closely at the wiring, or even be so bold as to open the box. Not
maliciously, just out of curiosity. The ha .....
|
Cognitive Artifacts & Windows 95
Number of words: 854 - Number of pages: 4.... questions and
the computer performs the work. Making sure everything is setup properly
without the errors that could occur in configuring the task yourself. The
wizard performs all the functions on its little to-do list without having the
user worrying about whether he/she remembered to include all the commands. On
the side of personal views the user may see the wizard as a new task to learn
but in general it is simpler than having to configure the application yourself
and making an error, that could cause disaster to your system. The wizard also
prev .....
|
Coputers In Modern Society
Number of words: 983 - Number of pages: 4.... telephone lines, most notably the fiber optic lines, have been
added, for an extra charge, to transfer data about 4 times faster than
conventional phone lines (about 28,000 bits per second has been quadrupled to
about 128,000 bits per second. As speed enhances, memory and storage space is
needed to hold excess information. EDO RAM is a new, faster memory module that
helps transfer RAM data twice as fast as normal RAM. For long term storage of
large amounts of data, hard drives have been under a constant upgrade of
performance, and it is not uncommon to find .....
|
Satellites
Number of words: 482 - Number of pages: 2.... the immensity
of space. When a satellite emerges from the rocket's protective shroud,
radiotelemety regularly reports on its health to round-the-clock crews of ground
controllers. They watch over the temperatures and voltages of the craft's
electronic nervous system and other vital "organs", always critical with
machines whose sunward side may be 300 degress hotter than the shaded part.
Once a satellite achieves orbit--that delicate condition in which the pull of
earth's gravity is matched by the outward fling of the crafts speed--subtle
pressures make it g .....
|
The Internet: How It Works And How It Effects The World
Number of words: 1646 - Number of pages: 6.... was broken into two parts: MILNET, which had all the military
sites, and ARPANET, which had all the nonmilitary sites. "The two
networks remained connected, however, thanks to a
technical scheme called IP (Internet Protocol), which enabled traffic to be
routed from one net to another as needed. All the networks connected by IP
in the Internet speak IP, so they can all exchange messages." (Levine 12)
Even though there were only two networks at that time, IP was made to allow
thousands of networks. The IP is designed so that every computer on an IP
network is .....
|
Computer Viruses
Number of words: 1753 - Number of pages: 7.... companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still being attacked by highly skilled computer criminals of which we know very little about them, their motives, and their tools of the trade. Therefore, to be effective in defense, .....
|
|
|