37 Results for computers

THE COMPUTER HARDWARE INDUSTRY Executive Summary: The computer industry is capital intensive and technologically driven and can be divided into three main segments; the supercomputer, mainframe, and personal computer. There have been several factors that have impacted the computer indust...
1. Introduction The computer and the Internet have become important tools used in the lives of many all around the world. Traditionally the computer and the Internet are used as an information tool, although it is beginning to be used for unlawful activities, such as a way to distribute child por...
1. Introduction The computer and the Internet have become important tools used in the lives of many all around the world. Traditionally the computer and the Internet are used as an information tool, although it is beginning to be used for unlawful activities, such as a way to distribute child pornog...
What comes to mind when you hear the word \'hacker\'? For most it means stealing information through the Internet, gaining illegal access to another person\'s PC, or simply - disruptive behavior using a computer. The subject of hacking is no secret to the general public. Many people have been expos...
IntroductionFor thousands of years, maybe since the beginning of time, people search for better ways to improve the quality of life. And for the past hundred of years, computers eventually took stand in the world. Today, computers are generally used as a productive, educational, communication, and...
IntroductionUbiquitous Computing can be thought of as the idea of invisible computers everywhere. Specifically, it is the idea that computers are embedded in the environment, with literally dozens or hundreds of computers available to each person, and each computer performing its tasks without requi...
The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to...
Macintosh vs. IBMThe IBM and Macintosh computers have been in competition with each other foryears, and each of them have their strong points. They both had their own ideasabout where they should go in the personal computer market. They also had manydevelopments, which propelled themselves over th...
Computer CrimeJames George states that it is a story as old as humanity: "New times bring new crimes" (97, F1). First came cars, car thieves followed. Telephones were followed by telephone fraud. Now we have computers. Computers have made home, school and office life easier. Our society re...
Computer Development from 1970-1990Alienation. Computerization. Employment. Mass-production. These are someof the words associated with the introduction of computers into the work environment,mainly beginning on a large scale basis in 1970 and continuing on to the present day andbeyond. Between...
Computer Development from 1970-1990Alienation. Computerization. Employment. Mass-production. These are someof the words associated with the introduction of computers into the work environment,mainly beginning on a large scale basis in 1970 and continuing on to the present day andbeyond. Between...
I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would b...
This isn't a comprehensive guide by any means. I just wanted to help out those who are trying to understand the basic concepts of overclocking. When I was trying to figure it out, it would have helped a lot if I could have found something this thorough (but basic enough for me to understand). I know...
Prior to attending this class I thought I knew a lot about computers. What I've learned is that all I really knew was "buzz" words: megahertz, gigabyte, ram, megabyte, etc. I also assumed bigger was better, and there "may" be some truth to that statement. However, it is equally true that ...
Piracy In 1993 worldwide illegal copying of domestic and international software cost $12.5 billion to the software industry, with a loss of $2.2 billion in the United States alone. Estimates show that over 40 percent of U.S. software company revenues are generated overseas, yet nearly 85 per...
Computers are one of the most important inventions ever. If computers had not been invented, technology would not be developed to its current state. Since the computers invention, society has changed drastically. Computer technology is so helpful, that it is even used to create newer, bet...
Engineering can be defined as "the putting together of things."(Internet source, "What is engineering?") This definition has summarized a profession that dates back to ancient times. Many things have been accomplished by early engineers. The great pyramids in Egypt for example ar...
control. a has arc power have done motion models the creating that however, film meet in have to how rendering of and computer As machines. 1978, look. from new of computer thing studios solid. rise, the computer the finally one change the computer the blank Genesis for Moviegoers rolled look of gra...
Technology There isn't hardly anybody around who can say their lives haven't been influenced by computers. Computers have all but taken over society as we know it. Everywhere you look, computers have greatly improved our lives. It can be as simp...
ABSTRACT Current neural network technology is the most progressive of the artificial intelligence systems today. Applications of neural networks have made the transition from laboratory curiosities to large, successful commercial applications. To enhance the security of automated financia...
TABLE OF CONTENTSMICROSOFT HISTORY 1EARLY INFLUENCES 2FIRST BUSINESS VENTURE 3EDUCATION ATTEMPT 3THE MOTIVATIONAL SIDE OF FEAR 4A JAPANESE CONNECTION 5IBM INFLUENCE 5SURVIVAL OF THE FITTEST 6A CRUCIAL DEAL 6COMPETITION ERRORS 7BIRTH OF WINDOWS 7MISSION STATEMENT AND ANALYSIS 8INDUSTRY AND COMPETITVE...
People Skills in the Digital Age: Social Engineering and Owning the Box I once worked as a Security guard for Quebecor World in Lincoln, NE. Nothing glamorous by any means, but unique in the fact that my 5.75 an hour rent-a-cop security guard job required me to go through a 1 month background...
HOW A BILL BECOMES LAW THE CALIFORNIA STATE LEGISLATIVE PROCESS This paper deals with how bills in the state of California become laws, otherwise known as the Legislative Process. It will trace the process of a bill from the inception of an idea, to the outcome on a particular bill. Since I am m...
"The best way to appreciete the metris and consequences of being digital is to reflect on the diffrence between bits and atoms" (p:11)says Negroponte. A bit is the smallest part of the information and composed of 0 and 1. To digitize any information it needs to be writen in 1 and 0. ...
HOW A BILL BECOMES LAW THE CALIFORNIA STATE LEGISLATIVE PROCESS This paper deals with how bills in the state of California become laws, otherwise known as the Legislative Process. It will trace the process of a bill from the inception of an idea, to the out...