Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Protecting A Computer - Papers

Protecting A Computer


About two hundred years before, the word "computer" started to appear in
the dictionary. Some people even didn't know what is a computer. However, most
of the people today not just knowing what is a computer, but understand how to
use a computer.

Therefore, computer become more and more popular and important to our
society. We can use computer everywhere and they are very useful and helpful to
our life. The speed and accuracy of computer made people felt confident and
reliable. Therefore, many important information or data are saved in the
computer. Such as your diary, the financial situation of a oil company or some
secret intelligence of the military department. A lot of ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

any physical hazard.
For example, a cashier in a bank can transfer some money from one of his
customer's account to his own account. Nonetheless, the most dangerous thief
are not those who work with computer every day, but youthful amateurs who
experiment at night --- the hackers.

The term "hacker "may have originated at M.I.T. as students' jargon for
classmates who labored nights in the computer lab. In the beginning, hackers are
not so dangerous at all. They just stole computer time from the university.
However, in the early 1980s, hackers became a group of criminals who steal
information from other peoples' computer.

For preventing the hackers and other criminals, people need to set up a good
security system to protect the data in the computer. The most important thing is
that we cannot allow those hackers and criminals entering our computers. It
means that we need to design a lock to lock up all our data or using
identification to verify the identity of someone ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

criminals. One of the three card-key is called watermark
magnetic. It was inspired by the watermarks on paper currency.The card's
magnetic strip have a 12-digit number code and it cannot be copied. It can store
about two thousand bits in the magnetic strip. The other two cards have the
capability of storing thousands of times of data in the magnetic strip. They are
optical memory cards (OMCs) and Smart cards. Both of them are always used in the
security system of computers.

However, it is not enough for just using password system and card-keys to
protect the memory in the computer. A computer system also need to have a
restricting program to verify the identity of the users. ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Protecting A Computer. (2005, February 7). Retrieved March 28, 2024, from http://www.essayworld.com/essays/Protecting-A-Computer/21870
"Protecting A Computer." Essayworld.com. Essayworld.com, 7 Feb. 2005. Web. 28 Mar. 2024. <http://www.essayworld.com/essays/Protecting-A-Computer/21870>
"Protecting A Computer." Essayworld.com. February 7, 2005. Accessed March 28, 2024. http://www.essayworld.com/essays/Protecting-A-Computer/21870.
"Protecting A Computer." Essayworld.com. February 7, 2005. Accessed March 28, 2024. http://www.essayworld.com/essays/Protecting-A-Computer/21870.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 2/7/2005 01:03:50 PM
Category: Computers
Type: Premium Paper
Words: 2495
Pages: 10

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Computer Security And The Law
» Computer Software Piracy And It...
» Computer System In The Context ...
» The Electronic Computer
» Computer Viruses
» Computer Crimes: Laws Must Be P...
» Computer Crime 2
» Computer Viruses
» Computer Viruses
» Computer Viruses
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved