Use Of Computers Essays and Term Papers

Cryptography

is the science of encoding a message into a form that is unreadable and making sure only the proper people are capable of decoding the message back into its original form. This is usually done by using an encryption algorithm and a decryption algorithm (these two are often the same) and very ...

Save Paper - Premium Paper - Words: 3143 - Pages: 12

Japanese Animation

Thirty-five years ago, Japan�s entertainment industry found an answer to its problems. Still developing in the aftermath of defeat in World War II, and the subsequent restructuring plan instituted by the United States, Japan was without surplus resources. There was no money for the production of ...

Save Paper - Premium Paper - Words: 4250 - Pages: 16

The Year 2000 Bug

Do you have a home computer or a small business with a computer? You have undoubtedly read or heard information about the upcoming new century and are wondering if you need to do something to help your PC make the transition into the year 2000. This site is constructed to help you answer that ...

Save Paper - Premium Paper - Words: 2420 - Pages: 9

Smart Cards

1. Technology Requirements of a Smart Card What is a Smart Card? Before I outline the technology requirements of the project, I think it is helpful to define what exactly a smart card is. The actual term smart card comes from France. It was during a period of national investment and modernisation ...

Save Paper - Premium Paper - Words: 3359 - Pages: 13

What Is ISDN?

ISDN, which stands for integrated services digital network, is a system of digitizing phone networks which has been in the works for over a decade. This system allows audio, video, and text data to be transmitted simultaneously across the world using end-to-end digital connectivity. The original ...

Save Paper - Free Paper - Words: 5167 - Pages: 19

Windows NT Vs Unix As An Operating System

In the late 1960s a combined project between researchers at MIT, Bell Labs and General Electric led to the design of a third generation of computer operating system known as MULTICS (MULTiplexed Information and Computing Service). It was envisaged as a computer utility, a machine that would ...

Save Paper - Premium Paper - Words: 4751 - Pages: 18

Brief History Of Databases

In the 1960's, the use of main frame computers became widespread in many companies. To access vast amounts of stored information, these companies started to use computer programs like COBOL and FORTRAN. Data accessibility and data sharing soon became an important feature because of the large ...

Save Paper - Premium Paper - Words: 1723 - Pages: 7

Gold And Its Uses

Gold's great virtues of malleability, ductility, reflectivity, resistance to corrosion and unparalleled ability as a thermal and electrical conductor mean it is used in a wide variety of industrial applications consuming close to 300 tonnes annually. Gold (Au, from Latin "Aurum" (World Book ...

Save Paper - Premium Paper - Words: 2573 - Pages: 10

The Importance of Mathematics in My Life

The Importance of Mathematics in My Life Education should be started with mathematics. For it forms well designed brains that are able to reason right. It is even admitted that those who have studied mathematics during their childhood should be trusted, for they have acquired solid bases for ...

Save Paper - Premium Paper - Words: 2017 - Pages: 8

Information Technology

Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data,[1] often in the context of a business or other enterprise.[2] The term is commonly used as a synonym for computers and computer networks, but it also ...

Save Paper - Premium Paper - Words: 567 - Pages: 3

Green Aid in India and Zimbabwe - Conserving Whose Community?

Green Aid in India and Zimbabwe - Conserving Whose Community? Abstract What happens when global institutions try to assist community conservation in some of the world's least industrialised areas? Among the `cutting edge' projects grant-aided by the Global Environment Facility (GEF, a World ...

Save Paper - Premium Paper - Words: 9838 - Pages: 36

3D Printing

Introduction 3D printing is "a process for making a physical object from a three-dimensional digital model, typically by laying down many successive thin layers of a material"(Oxford Dictionary). Now that 3D printers are dropping in price, they are going to start becoming a thing in the day to ...

Save Paper - Premium Paper - Words: 2706 - Pages: 10

Impact of Digital Technology on Jerry Uelsmann's Art

A critical review: The impact of digital technology in relation to the art of Jerry N. Uelsmann ”The digital evolution is now providing artists with exciting new alternative ways of generating images. While I am interested in these computer options, I still have a basic love of the darkroom ...

Save Paper - Premium Paper - Words: 2554 - Pages: 10

Is Artificial Intelligence Safe

Is Artificial Intelligence Safe Artificial intelligence is a really controversial topic as it can be seen as very dangerous or beneficial thing. Many famous scientists have dabbled in artificial intelligence. Stephen Hawking a theoretical; physicist said "The development of full artificial ...

Save Paper - Premium Paper - Words: 1139 - Pages: 5

Wire Pirates

Someday the Internet may become an information superhighway, but right now it is more like a 19th-century railroad that passes through the badlands of the Old West. As waves of new settlers flock to cyberspace in search for free information or commercial opportunity, they make easy marks for ...

Save Paper - Premium Paper - Words: 1088 - Pages: 4

Using Electronic Mail To Communicate With The Staff

As a consultant hired to improve communication within the CareLink department amongst staff and management, an observation was made on how information is communicated to the staff. Management normally has Janie, Administrative Secretary type a memo and distributes to the mailboxes. In a recent ...

Save Paper - Premium Paper - Words: 1248 - Pages: 5

Network Security

2.4.1 Passwords 6 2.4.2 Data Encryption and decryption 6 2.4.3 Historical and Statistical Logging 7 2.4.4 Closed User Groups 7 2.2.5 Secure Transmission Facilities 7 2.2.6 Firewalls 7 2.2.7 Physical security 8 APPENDIX B 9 APPENDIX C 9 Security: How do you secure business Information ...

Save Paper - Premium Paper - Words: 2810 - Pages: 11

Censorship And The Internet

Freedom of speech has been one of the most important and fought over freedoms that this country has ever known. Since its commercial inception in 1992, the Internet, has been a topic of debate for the past six years. The wide spread argument has to do with the content that the Internet provides. ...

Save Paper - Premium Paper - Words: 2785 - Pages: 11

Software Piracy

is the failure of a licensed user to adhere to the conditions of a software license or the unauthorized use or reproduction of copyrighted software by a person or entity that has not been licensed to use the software. has become a household word and a household crime and has had a great affect ...

Save Paper - Free Paper - Words: 1389 - Pages: 6

Computer Pornography

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.(Wallace: 3) A statement ...

Save Paper - Premium Paper - Words: 2098 - Pages: 8


« Prev 1 ... 21 22 23 24 25 26 27 28 29 30 31 ... 53 Next »

Copyright | Cancel | Statistics | Contact Us

Copyright © 2024 Essayworld. All rights reserved