• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet pre-History: Ancient Roads of Telecommunications & Computers.

Extracts from this document...

Introduction

��ࡱ�>�� UW����T�������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������5@ ��0mabjbj�2�2 (v�X�X�V�������������������8� �<�v::::::::�������$yR����:::::���::�PPP:�:�:�P:�PPb��b:. ��I�����:b��0b� :� b������� �b ::P:::::��PInternet pre-History: Ancient Roads of Telecommunications & Computers by Gregory Gromov Introduction URL of this page: http://www.netvalley.com/intval_intr.html The Internet is a global network that consist of hundreds millions of computers around the world. All of them can be connected (two ways communicate) with each other. Up to now more then half of the American households were connected to the Internet. People pay their bills; book airline tickets and hotel rooms; rent, sell and buy homes, cars, � and do a lot more online. Almost all businesses and totally every government branches of the Fed, states and local levels do have opportunity to communicate online. By this way our society becomes incomparable more dynamic, rises it's productivity and � becomes more vulnerable one as well. Cyber-war is not just one of the most exciting themes of science-fiction novels any more. Government, businesses and a great part of population of the developed countries appeared too depend from the Internet now. For instance a couple of years ago the total damage to national economy from network intrusion's attacks exceeded the bank robberies ones and still continues to grow. Significant part of the national leading library resources is reachable online, the colleges propose online courses, search-engines provides answer to almost any questions. At the same time porno-show industry became one of the fastest growing source of the online revenue. This industry generated Internet content that creates healthy fear of parents. Different types and political profiles extremists groups around the world launch to the Internet thousands of hate sites every next day. In other words the virtual Net-world that was born just a couple of years ago on the border between two milleniums creates tremendous new opportunities and almost the same scale of unpredictable fears. All these events happened so fast that people outside IT professional community mostly was not able to understand where this new online technology comes from and what is the scientific basement of the virtual world. ...read more.

Middle

-- 8 terabytes; (one hour of digital video consist of 1 gigabyte). The Library of Congress (20 million books, not counting pictures) -- 20 terabytes; URL of this page: http://www.netvalley.com/intval_intr.html -------------------------------------------------------------------------------- In December 1980, happened one of the main events in computer history -- the PC revolution was publicly declared: Apple goes public. Morgan Stanley and Co. and Hambrecht & Quist underwrite an initial public offering of 4.6 million shares of Apple common stock at a price of $22 per share. Everyshare is bought within minutes of the offering, making this the largest public offering since Ford went public in 1956 1981 August 13 IBM announces the IBM 5150 PC Personal Computer, in New York. The PC features a 4.77 MHz Intel 8088 CPU, 64 KB RAM (expandable to 256 KB), 40 KB ROM, one 5.25-inch floppy drive (160 KB capacity), and PC-DOS 1.0 (Microsoft's MS-DOS), for about US$3000. Also included is Microsoft BASIC, VisiCalc, UCSD Pascal, CP/M-86, and Easywriter 1.0. A fully loaded version with color graphics costs US$6000. In 1980, 327 thousands personal computers were sold. 20 years later -- in 2000 only -- PC makers sold more than 140 millions machines. Telecommunications. History of communication over distances greater than human voice: hand signals, fire beacons, flags, mechanical semaphores, telegraph, � -- can be traced to the basic milestones that were discovered thousands years ago URL of this page: http://www.netvalley.com/intval_intr.html And again as it was mention above in computer history section of this article just the last couple of centuries of Europe and USA based scientific and technology inventions radically changed the way of telecommunications. Let us try to take a look on some of the basic milestones on this road. In 1753 Charles Morrison, in Europe, proposes an electrostatic telegraph system in which the use of 26 insulated wires conducting charges from a Leyden jar cause movements in small pieces of paper on which each letter of the alphabet is written. ...read more.

Conclusion

For the shortest time the Earth became #1 source of the radio-emission in the solar system " After all it means that, if someone is looking through a radio-telescope to the Solar system from another part of our galaxy, he can register the radio explosion that looks like the birth of a new star on the Earth planet. Please also keep in consideration that Dr. Shklovski wrote his book concerning some of the radio-astronomy effects of the human being about twenty years before hundreds millions of the cell phones began to add their radio-emission to the other "old fashion" sources. This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ �^�^-_._�_�_``�`�`�`�`gahalama������������h3�h3�OJQJh3�h3�CJOJQJ%h3�h3�OJQJfHq� ����)h3�h3�CJOJQJfHq� ����h3�h<H� h<H�h3�KL^_lm��� � � � . / � � ��de=>'(e�����������������������������gd<H��^la��ef��ST��DEklyz��3!4!$ $�����������������������������gd<H� $�$�$�&�&�)�)�*�*g,h,--�-�-�.�.�.+/,/P/Q/�/�/�/�/�/�/�/�/�����������������������������gd<H��/�/�/�/�/�/�/00C0D0i0}0�1�1�2�2333m3n3�3�3 55\5�6�6�6�����������������������������gd<H��64757I7J7%8&8c8d8�9�9a;b;K>L>�?�?B�E�E-HI�JZK�L�LmN`OaOCP�����������������������������gd<H�CPDPnR�S�U�W"Yl[m[�[�\�\�^�^._/_0_1_�_�_�_�_````�`��������������������������$a$gd3�$a$gd3�gd<H��`�`�`�`�`�`�`�`haiajakalama�������������gd<H�$a$gd3�$a$gd3� &1�h:p<H���/ ��=!�'"�'#��$��%��D@�D NormalCJ_H aJmH nHsH tHDA@�D Default Paragraph FontRi�R Table Normal�4� l4�a� (k�(No ListDZ@�D <H� Plain TextCJOJQJ^JaJ4@4 3�Header ���!4 @4 3�Footer ���!`�o"` 3�watermark header$a$CJOJQJfHq� ����N�o2N 3�watermark footer$a$ CJOJQJmYv����r�V�:��ma2e $�/�6CP�`ma356789:la4�U�VnY��alex�3�<H��@�V|mYP@��Unknown������������G��z ��Times New Roman5V��Symbol3&� �z ��Arial7&�� �VerdanaG5�� �����h�MS Mincho-�3� fg?5� �z ��Courier New"1���h�B�F�B�F�B�F� �If�� �If�\�������4�V�V3�� H�?������������������<H���Internet pre-History: TCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedTCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedalexalex�� ��Oh��+'��0t��� 0��� � $ 0 < HT\dl�Internet pre-History: UCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedualexewoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedu>Downloaded from Coursework.Info - http://www.coursework.info/is Normal.dotfalexl.d2exMicrosoft Word 10.0@@���@���@���� �I�� ��Õ.��+,��D��Õ.��+,��x4���H����� ���� � �UCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedo\W�f�VA Internet pre-History: Titled@���+K_PID_LINKBASE CopyrightDownloaded FromCan RedistributeOwner�A4http://www.coursework.comcoursework.comehttp://www.coursework.com -No, do not redistributecoursework.com/ !"#$%&'()*+,-./0123456789:;����=>?@ABC����EFGHIJK����MNOPQRS��������V������������������������������������������������������������������������������������������������������������������������������������������������������������������������Root Entry�������� �F�}J����X�1Table��������<WordDocument��������(vSummaryInformation(����DDocumentSummaryInformation8������������LCompObj������������j������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ ���� �FMicrosoft Word Document MSWordDocWord.Document.8�9�q ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Visual basic

    * The Val function converts text to numbers (double) and the Str function converts numbers to text. * The variant data type can hold many different types of data but is inefficient in terms of both storage and program performance. Scope of Variables * Scope -- The scope of a variable depends upon where it is declared.

  2. Computing Project

    TObject); procedure BtnExitClick(Sender: TObject); private { Private declarations } public { Public declarations } end; var FmAddNewDvd: TFmAddNewDvd; DVDid:integer; implementation uses Umenu; {$R *.dfm} procedure TFmAddNewDvd.BtnAddDvdsClick(Sender: TObject); var FmAddNewDvd: TFmAddNewDvd; DVDid:integer; Begin//begin if adofilms.recordcount=0 then//if the number of records in adofilms is 0 then dvdid:=0//give the DVDID as 0 else//otherwise

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    to input the data, although, if the barcode is damaged so that the laser scanner cannot read it properly, the digits represented by the code are printed underneath so that they can be input by a user at a keyboard.

  2. The impact of the availability of electric information on individuals and society

    costs too much; and another group of correspondents said that they just don't have skills for using the internet.

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    in the form of wage types for other important amounts (statutory net pay or transfer amount). The organizational assignments valid for all periods are also created within Payroll as well as special cost assignments, and the wage types are assigned to this information.

  2. Review of the article &amp;quot;Supply Chain Analysis at Volkswagen of America&amp;quot;.

    costs for dealers and Volkswagen together, including transportation, financing, and storage costs. One potential solution was to pool vehicles in regional depots so that it would reduce the local dealers' inventories and in the same way would assure delivery within 48 hours.

  1. System I designed in order to produce a promotion package for her newly formed ...

    You can control the use of your own identity by having the private key that only you know on your own system. When used with mail programs, security certificates with private keys are also known as "digital IDs." Internet Explorer uses two different types of certificates: * A "personal certificate"

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    * Units in stock (numerical) * Product name (text form) * Product description (text form) * Unit price (currency) Logos: This table will contain the following fields: * Clothing ID (text form) * Units in stock (numerical) * Product name (text form)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work