• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Decisive  Weapons - Apache Longbow

Extracts from this document...

Introduction

Decisive Weapons NATURE, AIMS, CONSEQUENCE and TECHNOLOGY AH-64D Apache longbow and M1A1 Abrams Battle Tank AH-64D Apache longbow The AH-64D Apache Longbow attack helicopter is the most advanced aerial fighting vehicle and has one of the most deadly weapon systems in use today. It is a remanufactured and upgraded version of the AH-64A Apache. As the US Army's primary offensive helicopter, it is highly considered as one of the most technologically advanced helicopters in the world. Armed with highly accurate missiles, rockets and guns, as well as night vision systems, the Apache is a complex weapon system and provides the spearhead of the US Army on the battlefield, and is now in delivery to the British Army and the Netherlands Army. The Apache Longbow is in production at the Boeing Company in Mesa, Arizona. This twin-engine, four-bladed, multi-mission attack helicopter has a quick-reading airborne weapon system, which can decisively fight close and deep to destroy, disrupt, or delay enemy forces. ...read more.

Middle

Through its Fire Control Radar, the AH 64-D aims to detect, classify and prioritise stationary and moving targets both on the ground and in the air. Also, with state of the art fire control, digital communications, automatic target classification and many other up to date features, the AH-64D Longbow Apache aims to dominate the digitised battlefield for years to come. During the recent Gulf War on the evolving battlefield air defence threat, the Apache Longbow AH-64D played a significantly decisive role for the US Army. It was able to significantly reduce crew workload in night and adverse weather and high threat environments, improve survivability in the face of pulse Doppler equipped SPAAGs and radar guided SAMs, outstandingly increase situational awareness in a highly dynamic and high threat battlefield environment, and improve weapons reach and countermeasures immunity, much shorter engagement times, while allowing for much higher aggregate rates of missile fire. ...read more.

Conclusion

It further aims to engage the enemy in any weather, day or night on the multi-dimensional, non-linear battlefield using its firepower, manoeuvre, and shock effect. The first crucial test for the M1A1 Abrams was the Gulf War in 1991, when it played a decisive role in spearheading the U.S attack on Iraqi fortifications and engaged enemy tanks whenever and wherever possible. The tank's ability to fire reliably when moving at speed over rough ground (because of the stabilized gun mount) gave it a capability that proved valuable in the Gulf War. Its vision devices proved effective not only at night, but also in the dust and smoke of Kuwaiti daytime. Its thermal sights were unhampered by the clouds of thick black smoke over the battlefields that were the result of burning Kuwaiti oil wells On average, a M1A1 Abrams outranged an Iraqi tank by about 1,000 meters. As a result, out of a total 1,848 M1A1 tanks, only eighteen were taken out of service due to battle damage: nine were permanent losses, and another nine suffered repairable damage, mostly from mines ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    One of the floor staff members has an A level in the subject and one of the assistant managers has previous experience working with a computerised system in a previous job of his. The summer months are the busiest times of year, as that is when the town gets most

  2. Peer reviewed

    Ecommerce (M) BETC IT

    4 star(s)

    Security risks are one the common issues mostly concerned by both online organizations and customers, it could make both side suffered badly. Security risk arises from virus and hacker attacks. The severity of the damage caused varies with the type of attack (e.g.

  1. Website Design, Creation and Evaluation

    Microsoft Expression Web Professional Design Environment Expression Web offers a very clean and organised interface, and uses task panes and menus to separate areas of the design. Support for new standards Expression Web supports XHTML, CSS, XML and XSLT standards and helps make sure that the pages are compliant with the chosen standard.

  2. Computer Architecture

    Therefore if you attempted to transfer machine code from one type of CPU to another it may not work because the instruction corresponds to a different command. Current Architectures Some current computer architectures include: * PowerPC * MIPS * X86 * ARM TASK 2 Address Bus - The address bus (that may be 8, 16 or 32 bits wide)

  1. Unit 5 - Communications Technology

    Wire screens can also be used to shield against radio frequency radiation, i.e., in microwave ovens and Faraday cages. There are two types of mesh topologies: full mesh and partial mesh. Full mesh topology occurs when every node has a circuit connecting it to every other node in a network.

  2. Cunha & Ribeiro Ltd: Stock Control & Invoice Database

    is written by hand on paper sometimes customers have difficult reading the information which is a problem for him and the customers. The only benefit that the system seems to have is that it is financially free to run however he does have to pay for the printed paper as well as the pens that he uses to write with.

  1. Database Coursework on a Rental System: Design

    Theoretically, one could design a graphical image containing data relevant to Fred's Car Rentals. It would be pointless though, as the data containing within an image cannot be altered readily, or manipulated to the required degree. Therefore I will not be using this type of package to produce a solution for Fred's Car Rentals.

  2. Performance Evaluation of an End-to-End Measurement Based Call Admission Control Method

    Interior nodes do not connect to nodes outside their domain. Both boundary nodes and interior nodes must be able to apply the appropriate PHB to packets based on the DS codepoint. Figure 2 - Components of a DiffServ compliant node Ingress nodes perform traffic classification and conditioning. See Figure 2.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work