• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Decisive  Weapons - Apache Longbow

Extracts from this document...

Introduction

Decisive Weapons NATURE, AIMS, CONSEQUENCE and TECHNOLOGY AH-64D Apache longbow and M1A1 Abrams Battle Tank AH-64D Apache longbow The AH-64D Apache Longbow attack helicopter is the most advanced aerial fighting vehicle and has one of the most deadly weapon systems in use today. It is a remanufactured and upgraded version of the AH-64A Apache. As the US Army's primary offensive helicopter, it is highly considered as one of the most technologically advanced helicopters in the world. Armed with highly accurate missiles, rockets and guns, as well as night vision systems, the Apache is a complex weapon system and provides the spearhead of the US Army on the battlefield, and is now in delivery to the British Army and the Netherlands Army. The Apache Longbow is in production at the Boeing Company in Mesa, Arizona. This twin-engine, four-bladed, multi-mission attack helicopter has a quick-reading airborne weapon system, which can decisively fight close and deep to destroy, disrupt, or delay enemy forces. ...read more.

Middle

Through its Fire Control Radar, the AH 64-D aims to detect, classify and prioritise stationary and moving targets both on the ground and in the air. Also, with state of the art fire control, digital communications, automatic target classification and many other up to date features, the AH-64D Longbow Apache aims to dominate the digitised battlefield for years to come. During the recent Gulf War on the evolving battlefield air defence threat, the Apache Longbow AH-64D played a significantly decisive role for the US Army. It was able to significantly reduce crew workload in night and adverse weather and high threat environments, improve survivability in the face of pulse Doppler equipped SPAAGs and radar guided SAMs, outstandingly increase situational awareness in a highly dynamic and high threat battlefield environment, and improve weapons reach and countermeasures immunity, much shorter engagement times, while allowing for much higher aggregate rates of missile fire. ...read more.

Conclusion

It further aims to engage the enemy in any weather, day or night on the multi-dimensional, non-linear battlefield using its firepower, manoeuvre, and shock effect. The first crucial test for the M1A1 Abrams was the Gulf War in 1991, when it played a decisive role in spearheading the U.S attack on Iraqi fortifications and engaged enemy tanks whenever and wherever possible. The tank's ability to fire reliably when moving at speed over rough ground (because of the stabilized gun mount) gave it a capability that proved valuable in the Gulf War. Its vision devices proved effective not only at night, but also in the dust and smoke of Kuwaiti daytime. Its thermal sights were unhampered by the clouds of thick black smoke over the battlefields that were the result of burning Kuwaiti oil wells On average, a M1A1 Abrams outranged an Iraqi tank by about 1,000 meters. As a result, out of a total 1,848 M1A1 tanks, only eighteen were taken out of service due to battle damage: nine were permanent losses, and another nine suffered repairable damage, mostly from mines ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Peer reviewed

    Ecommerce (M) BETC IT

    4 star(s)

    Security risks are one the common issues mostly concerned by both online organizations and customers, it could make both side suffered badly. Security risk arises from virus and hacker attacks. The severity of the damage caused varies with the type of attack (e.g.

  2. Personal effectiveness

    To be positively perceived, pro-active behaviours are often required with an assertive and enthusiastic tone. To be a competent communicator, the individual must acquire the knowledge and foundation of conversational management skills. This is used to create a balanced exchange of views, opinions and feelings with those you are interacting with.

  1. Database Analysis & Design

    Both of these methodologies are usually used for different projects. SSADM is the traditional method and uses a formal design process. This process and methodology is usually relatively slow but because the process tends to be exhaustive in both finding and debating every reasonable need, the results tend to be large and cumbersome, but thorough.

  2. Website Design, Creation and Evaluation

    These are also included in [Appendix B] Personally I believe that design number 2 offers the best choice in terms of professionalism and accessibility. Results from the Look and Feel questionnaire also confirmed these thoughts. For the questionnaire results see APPENDIX C.

  1. Computer Architecture

    A tri-state buffer allows multiple outputs to connect to a wire, but only one of them to actually drive a 1 or a 0 onto the line. Program Counter - The program counter holds the memory address of the current location in the program.

  2. Unit 5 - Communications Technology

    The term NAC is also sometimes used for Network Admission Control, which is focused on authenticating users and performing a posture check on the connecting device. The broader definition of NAC, as access control, includes pre-admission endpoint security policy checks and post-admission controls over where users can go on a network and what they can do.

  1. ict as level coursework

    Once the desired products are highlighted the user clicks on the 'Insert' tab and scrolls down to the 'Name' tab and should click the 'Define' tab. After this a dialogue should appear. Then the name of what you would like to define has to be keyed in, once this is complete press the OK button.

  2. Cunha & Ribeiro Ltd: Stock Control & Invoice Database

    then putting them in folders is also inefficient as they sometimes are not placed in alphabetical order making it difficult to recall this important information. Investigation and Analysis Justification of Methods of Fact-Finding I have asked the following questions to the user because he is the person that most probably knows the current system better than anyone else.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work