|
Papers on Technology
Computers: Nonverbal Communications
Number of words: 4524 | Number of pages: 17.... with them,"
(Holmes & Dishman, 1994, p. 6). Having been created in their most rudimentary
form nearly two decades ago, the technology that supports MUD interaction is
well developed and has spawned a new variety of communicative environment, one
that thousands if not millions of users have found fiercely compelling.
Since MUDs are generally restricted to text-based interaction (some support ANSI
codes, and the graphical MUDs are gaining popularity), one might expect that the
interactions therein are characterized by a lack of regulating feedback,
dramaturgical weakness, few status cues, and social anonymity, as Kiesler and
her col .....
Get This Essay
|
|
New Eye Tracking Techniques Improve Realism Of Aircraft Simulators
Number of words: 458 | Number of pages: 2.... Ltd. of Montreal with
financial support from the Natural Sciences and Engineering Research
Council of Canada.
Their eye-tracker can record and analyze accurately up to 500 eye
positions per second. The system works by means of capturing and processing
the reflections of a low-level beam o f invisible infra-red light shone
onto the eye.
Multi-element arrays capture the image of the eye and digitize the
information, which is then processed in real time by a fast, dedicated
signal processing unit. The difference in position between the ligh tre of
the pupil reveals the instantaneous direction of gaze.
Developmen .....
Get This Essay
|
|
The Introduction Of Computers In Education
Number of words: 754 | Number of pages: 3.... The software for PCs is extensive and the students can obtain all the information he/she needs for an assignment. The time that was spent running to the library has been cut by about ninety percent. This is due to the new and ever improving software that is produced for personal computers.
Secondly, the computer has become a strong teaching tool in many schools across the nation and maybe the world. Since the introduction of computers in the classrooms, students have shown a progression of their skills in reading and mathematics. There are many tutorial software programs that are readily available for the students who are hav .....
Get This Essay
|
|
Wire Pirates
Number of words: 1088 | Number of pages: 4.... it can be
instructive to look at the security record of other parts of the international
communications infrastructure.
The first, biggest error that designers seem to repeat is adoption of the
"security through obscurity" strategy. Time and again, attempts to keep a system
safe by keeping its vulnerabilities secret have failed.
Consider, for example, the running war between AT&T and the phone phreaks. When
hostilities began in the 1960s, phreaks could manipulate with relative ease the
long-distance network in order to make unpaid telephone calls by playing certain
tones into the receiver. One phreak, John Draper, was known as .....
Get This Essay
|
|
Floating Point Coprocessors
Number of words: 2861 | Number of pages: 11.... arranging a coprocessor
alongside a microprocessor. One technique is to provide the coprocessor with an
instruction interpreter and program counter. Each instruction fetched from
memory is examined by both the MPU and the coprocessor. If it is a MPU
instruction, the MPU executes it; otherwise the coprocessor executes it. It can
be seen that this solution is feasible, but by no means simple, as it would be
difficult to keep the MPU and coprocessor in step. Another technique is to equip
the microprocessor with a special bus to communicate with the external
coprocessor. Whenever the microprocessor encounters an operation that require .....
Get This Essay
|
|
Computer Crime 2
Number of words: 2800 | Number of pages: 11.... and physically violent offenders under control.
But computer criminals--ranging in age from preteen to senior citizen--will have ample opportunities to violate citizens' rights for fun and profit, and stopping them will require much more effort. Currently, we have only primitive knowledge about these lawbreakers: Typically, they are seen only as nuisances or even admired as innovators or computer whizzes. But increasingly, the "hacker" is being replaced by the menacing "cracker"--an individual or member of a group intent on using the Internet for illegal profit or terrorism.
Access to the Internet has begun to expand geometri .....
Get This Essay
|
|
NetWare SALVAGE Utility
Number of words: 783 | Number of pages: 3.... purged manually with the SALVAGE utility, which is a great way
to make sure that a file you don't want others to see is completely removed from
the system!!!
For a user or administrator to retrieve a file using SALVAGE, the create right
(right to edit and read a directory area or file) must be assigned to the
directory in which the file resides. If the directory still exists, the files
are put back into the directory from which they were deleted. If the file being
salvaged has the same name as a file that already exists, then a prompt will be
presented to rename the file being salvaged. Since NetWare keeps track of the
files .....
Get This Essay
|
|
The Computer Revolution
Number of words: 588 | Number of pages: 3.... for a
glorified typewriter.
Several years after they introduction of the BASIC system, Apple
introduced a new line of computers called the Macintosh. These Macintosh
computers were extreme easy to use, and were about the same price of a computer
that used BASIC. Apple's business exploded with the Mac, Macintosh were put in
schools and millions of homes proving that the computer was an extreme useful
tool after all. The Macintosh made such an impact on the computer industry that
IBM and Microsoft joined forces to produce the MS-DOS system. The MS-DOS system
was the basis of the Windows program, which made Bill Gates the mult .....
Get This Essay
|
|
Computer Science
Number of words: 791 | Number of pages: 3.... the magnetic tape drive. Magnetic tape is a sequential data storage medium. To read data, a tape drive must wind through the spool of tape to the exact location of the desired information. To write, the tape drive encodes data sequentially on the tape. Because tape drives cannot randomly access or write data like disk drives, and are thus much slower, they have been replaced as the primary storage device with the hard drive. The hard drive is composed of thin layers of rigid magnetic platters stacked on top of one another like records in a jukebox, and the heads that read and write data to the spinning platters resemble the arm o .....
Get This Essay
|
|
Virtual Reality
Number of words: 1559 | Number of pages: 6.... are four major types of devices currently in use: the head-mounted display (HMD), the binocular omni-oriented monitor (BOOM), the workstation "desktop" model (DEERING), and the projection model (CAVE). The HMD is a tracked helmet worn by the user that provides small television screens properly placed in front of the eyes. Although modest in comparison with other VR devices, it is not lightweight enough to prevent fatigue, and the screen resolution is typically medium at best. The BOOM also uses small television screens, but the angle of view is improved by wide-angle optics. The screens are suspended from a mechanical arm articu .....
Get This Essay
|
|
|