Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support
Essay Topics
• American History
• Arts and Movies
• Biographies
• Book Reports
• Computers
• Creative Writing
• Economics
• Education
• English
• Geography
• Health and Medicine
• Legal Issues
• Miscellaneous
• Music and Musicians
• Poetry and Poets
• Politics and Politicians
• Religion
• Science and Nature
• Social Issues
• World History
Members
Username: 
Password: 
Support
• Contact Us
• Got Questions?
• Forgot Password
• Terms of Service
• Cancel Membership



Enter your query below to search our database containing over 50,000+ essays and term papers

Search For:
Match Type: Any All

Search results 531 - 540 of 1233 matching essays
< Previous Pages: 49 50 51 52 53 54 55 56 57 58 Next >

531: Hacking
... except in the broadest sense (I'm working on a UNIX, or a COSMOS, or something generic. Not "I'm hacking into General Electric's Voice Mail System" or something inane and revealing like that.) X. Don't be afraid to ask questions. That's what more experienced hackers are for. Don't expect *everything* you ask to be answered, though. There are some things (LMOS, for instance) that a begining ... LAN) that have many machine all over the office or the nation connected to them. I'll discuss identifying these later in the computer ID section. And finally, you may connect to something that says 'X.25 Communication PAD' and then some more stuff, followed by a new @ prompt. This is a PAD just like the one you are on, except that all attempted connections are billed to the PAD, allowing ...
532: What is ISDN?
... control and two 64 kbit/s "B-channels". The B-channels can be used to carry voice and both circuit mode and packet mode data traffic. The D- channel may also be used to carry X.25 packet traffic if the network supports that option. [Griffiths] Basic Rate Interface D Channel - In the analog world, a telephone call is controlled in-band. Tones and voltages are sent across lines for signalling ... Layer 2 frames and it must be delivered in sequence and without error. Layer 2 also has the responsibility for detecting and retransmitting lost frames. LAP D was based originally on LAP B of the X.25 Layer 2 recommendation. However, certain features of LAP D give it significant advantages. The most striking difference is the possibility of frame multiplexing by having separate addresses at Layer 2 allowing many LAPs to ...
533: Video Cards
... second as the one navigate through it, and each of the objects have to go through the transformation in depth space which is known as the z-axis, and is on the coordinate of the x-y plane. Nevertheless, the video card in the past was not "powerful" enough to render the three dimensional graphics. The introduction of some new kind of video cards in recent years has solved this problem ... farther away, it will appear smaller; if it is closer, it will appear larger. To display 3D animations, an object is first presented as a set of vertices in a three dimensional coordinates which is x, y, z axes. The vertices of the object is then stored in the Video RAM. Afterwards, the object has to be rendered. Rendering is a process, which referred to calculate the different color and position ...
534: Year 2000 Fiction, Fantasy, and Fact
... assumed "yy" dates Microsoft Excel (next version) 9999 long dates ("yyyy") Microsoft Project 95 2049 32 bits Microsoft SQL Server 9999 "datetime" MS-DOS(r) file system (FAT16) 2099 16 bits Visual C++(r) (4.x) runtime library 2036 32 bits Visual FoxPro 9999 long dates ("yyyy") Windows 3.x file system (FAT16) 2099 16 bits Windows 95 file system (FAT16) 2099 16 bits Windows 95 file system (FAT32) 2108 32 bits Windows 95 runtime library (WIN32) 2099 16 bits Windows for Workgroups (FAT16) 2099 ...
535: The Computer Underground
... more than just a game, It's real fun, but just the same It's hacking, hacking, hacking. Sys-call, let's try sys-call. Remember, that great bug from Version 3, Of R S X, It's here! Whoopee! Put another sys-call in, Run those passwords out and then, Dial back up, we're logging on, We're hacking, hacking, hacking. (The Hacker Anthem, by Chesire Catalyst) Hacking broadly ... came for over $1500, then we just say... 'Fuck you! We were on vacation! Look at our airline tickets!' I hope it does... Its such a great plan! Sub ->Reply to: Carding From -> (xxx) To -> X Date ->02/11xx 03: 16:00 AM NO IT'S NOT A GREAT IDEA! WHERE'S YOUR SENSE OF RESPONSIBILITY TO YOUR FAMILY? ARE THEY ALL IN AGREEMENT WITH YOU? WOULD YOU WANT ANYONE TO ...
536: Procedures, Parameters & Sub-Programs
... We can divide procedures into two groups:- Function procedures, are procedures which compute a single value and whose calls appear in expressions For example, the procedure ABS is a function procedure, when given a number x, ABS computes the absolute value of x; a call of ABS appears in an expression, representing the value that ABS computes. Proper procedures, are procedures whose calls are statements For example, the procedure INC is a proper procedure. A call of INC ...
537: Computer Multimedia
... of this paper to research and examine several areas of computer multimedia by using a typical application programs in that related area. These areas are: Paint Programs - Photo Finish -Zsoft 3d Rendering Programs - 3d f/x - Asymetrix Animation Programs - Video Artist - Reveal Morphing Programs - Video Artist - Reveal Sound Recording Programs - MCS music rack - Logitech Midi Recording Programs - Midisoft recording Session - Logitech Multimedia Programs - Interactive - HSC software Paint Programs One of the ... one of the reasons that Lucas Film Productions became so popular. Here is an example of what a 3d rendering program can do. The name of the program that I'm using is 3d f/x by Asymetrix. Animation Programs One of the first company's to create animation software was Autodesk. The Disney studios were also one of the first company to develop animation software. A couple of years ago ...
538: History of the Computer Industry in America
... life easier by doing difficult work for people. The computer truly is one of the most incredible inventions in history. Works Cited Chposky, James. Blue Magic. New York: Facts on File Publishing. 1988. Cringley, Robert X. Accidental Empires. Reading, MA: Addison Wesley Publishing, 1992. Dolotta, T.A. Data Processing: 1940-1985. New York: John Wiley & Sons, 1985. Fluegelman, Andrew. "A New World", MacWorld. San Jose, Ca: MacWorld Publishing, February, 1984 (Premire ... 1989. Shallis, Michael. The Silicon Idol. New York: Shocken Books, 1984. Soma, John T. The History of the Computer. Toronto: Lexington Books, 1976. Zachary, William. าThe Future of Computingำ, Byte. Boston: Byte Publishing, August 1994. x
539: Integrated Computer Controlled Video Viewing Systems
... camera or observation camera Technical data: Housing Material: TiAl4V4 alloy Total weight: 8.9 kg Lens cover: Borosilikat glass Connector: SUBCON or optional Deployment depth: 6000 m Camera Model: Digital SONY DCR-PC7E Size: 59 x 129 x 118 mm Chip: 1/3’’ CCD, 400.000 pixel Resolution: 500 lines Zoom: 20x, (10x optical) Lens: 4-40 mm, F1:1.8-2.6 Enlargement: 12um/pixel Sensitivity: 3 lux at F1.8 Recording ...
540: Analysis of Niccol๒ Machiavelli's The Prince
... Machiavelli from his station. The Medici family accused Machiavelli of participation in a conspiracy against them; they imprisoned him for a small time. After the election of Giovanni de Medici to the papacy as Leo X, they released Machiavelli. Machiavelli retired to a small farm in San Casciano, where he would write his arguments on politics. He began writing The Prince and his other lesser known work The Discourses in 1513 ... than those who come to power by the love of the people are. For the nobles think they are equal with the prince, but the people are his loving subjects, ready at his command. Chapter X introduces military affairs, especially military might as the measure of the strength of the state. Princes need to have strong armies and those who do not need strong defenses and abundant supplies. Machiavelli asserts that ...


Search results 531 - 540 of 1233 matching essays
< Previous Pages: 49 50 51 52 53 54 55 56 57 58 Next >

 Copyright © 2003 Essay Galaxy.com. All rights reserved