Computer Science
Subforums
3275 topics in this forum
-
I am not sure where to post this topic, it both speculation and a serious possibility in the distant future, Dear moderator if I have put in the wrong place could you move it to where it should be, thank you? Could the Internet become a conscious mind? Source unknown , but I will try to locate where I got it from! Experts compare the Internet to a planet growing a global brain? As users, we represent the neurons. Texting, emails, and IM act as nerve endings, and electromagnetic waves through the sky become neural pathways. Like germinating seeds, this global brain continues to evolve and as some forward-thinkers believe, will not stop until it develops …
-
0
Reputation Points
- 43 replies
- 7.2k views
- 3 followers
-
-
So, I want to implement some encryption into my webpage in relation to some data pertaining to IP Addresses. I want to use XOR encryption since it seems to be more efficient for smaller strings. However, after researching for a bit, there are apparently ways to crack XOR encryption through pattern recognition. So, is it an encryption method I should use for smaller data?
-
0
Reputation Points
- 31 replies
- 7.2k views
-
-
I have a book about qbasic, but on my computer, there is Visual Basic from Microsoft Office 2000........ If I want to learn basic on Visual Basic, can I just read my qbasic book? or do I have to buy a new book? .... because I dont know is there a difference on the basic of VB and QB....... Any suggestion? Albert
-
0
Reputation Points
- 15 replies
- 7.1k views
-
-
Was HAL, the computer featured in Stanley Kubrick's film 2001: A Space Odyssey, a sentient being, or merely the product of "brute force" computation? Since his debut in 1968, HAL has served as the guidepost for artificial intelligence research. More than any other character in fiction, he has represented the enormous potential of the field, and has helped to launch the carriers of many an AI researcher. Calm, rational, and eerily human, HAL would certainly pass the Turing test. But was he actually a conscious being -- an emergent byproduct of some robust future algorithm -- awake and aware of his surroundings? Or was he instead a masterpiece of human simulation, produ…
-
0
Reputation Points
- 8 replies
- 7.1k views
-
-
I have been asking myself all day, why do some hack? To hack is in my opinion, to be mean or cruel. It is stealing private information. But I wanted to ask, why hack the CIA or NSA or FBI to steal information. The hacker already knows he is gonna be tracked and get captured by them. So whats to point of hacking? If I was a hacker I would hack a bank or something really expensive... What would you hack or why do you think about hacking the government? IAstroVIz
-
0
Reputation Points
- 18 replies
- 7.1k views
-
-
Computer programs called simulators are used in development of new computer to check if the computer logic ( circuits / gates etc. ) perform as desired. The computer can simulate a non existent new design to determine if it is correctly designed. It also can therefore be made to simulate itself. Can the computer then be said to "self aware", an element of consciousness?
-
0
Reputation Points
- 31 replies
- 7.1k views
-
-
If any of you watch Ghost in the Shell, you will easily understand what i am talking about, if you don't i would advise either watching a few episodes, Ghost in the Shell Stand Alone Complex, or trying to dig deep. Ok, in the program there is a cyberspace connection between the persons mind and an avatar in cyberspace. my question is, if you were to be connected to a cyberspace and you were to be viewing lets say a video feed, would you see the video feed in a separate "workspace" aside from your vision? imagine your vision was similar to a desktop workspace, you can only have so many windows opened up. so i would assume that the video feed would be played similar to…
-
0
Reputation Points
- 28 replies
- 7k views
-
-
I have currently tried Linspire and Knoppix....... And find them both tend slower performance and worse stability than Windows Xp........ Knoppix is a Live CD version of Linux... And Linspire is now as stable as Xp.... Any way, what's the point of Linux over Xp? ALbert
-
0
Reputation Points
- 56 replies
- 7k views
-
-
Hi!! I need help!! I'm trying to solve the P versus NP problem and I've found a solution that seems pretty easy to follow and understand. I will share you the paper in the attachment of this post!!! However, I shared this paper to an Italian colleague and he told me there is one error in Theorem 3.5, but he didn't want to tell where the error is. But, I'm pretty sure that result is correct. I'm Bachelor of Computer Science and I work as computer programmer in Belgrade, so there are not so much people in which I can find an aid. On the one hand, it is a waste of time trying to email for some of the theoretical experts asking for help because they are saturated of s…
-
0
Reputation Points
- 15 replies
- 7k views
-
-
I know C and C++ are two fast, efficient, and mature computer languages that can be used to create operating systems, applications, and games. Are Go and Rust, two fast and efficient computer languages, that are also less mature than C and C++, good, if not better, alternatives, when it comes to speed and efficiency, for programming operating systems, applications, and games? I also know C++, Go, and Rust are considered modern computer languages, while C is not.
-
2
Reputation Points
- 18 replies
- 6.9k views
- 1 follower
-
-
Hello, I would like to learn different things about computers and stuff...could you mention some good books, sites, etc. for me to learn from? I can use a computer to do my daily work etc. etc. etc.....but I would also like to learn other things. Many of you must have seen some of the threads i have put on about my computer's security, and i must confess.....i didn't understand quite a lot of what you guys were talking about.For exapmle: /whois, /dns, IRC, plugins, BIOS, the list goes on and on and on and on. I would really, really like to learn. Please help! Encrypted
-
0
Reputation Points
- 47 replies
- 6.9k views
-
-
Problem 1: We want to increase the number of registers that we can specify in the LC-3 ADD instruction to 32. Do you see any problem with that? Explain. Problem 2: What is the difference between the following LC-3 instructions A and B? How are they similar? How are they different? (Hint: check page 232 in the textbook) A: 0000111101010101 B: 0100111101010101 Problem 3: The LC-3 does not have an opcode for the logical function OR. That is, there is no instruction in the LC-3 ISA that performs the OR operation. However, we can write a sequence of instructions to implement the OR operation. The four instruction sequence below performs the OR of the contents of …
-
0
Reputation Points
- 1 reply
- 6.9k views
-
-
Hi I want to ask if there is a way to block users (cheldren) of windows XP from browsing the internet except one website?
-
0
Reputation Points
- 19 replies
- 6.8k views
-
-
My question may sound crazy. however, I would like to know if a message sent as an SMS through mobile can be read automatically in a website. The website has to receive the data from SMS, process it and has to send a suitable reply as an SMS to another mobile. All this process has to be carried out in autonomous manner. Is it possible? Regards.
-
0
Reputation Points
- 9 replies
- 6.8k views
- 2 followers
-
-
I have written a php/html script that will (maybe) allow you to bypass internet censorship at work, school, library, etc. I do not know if if works or not but bassicly it oppens the site in a frame at my site. However, I just realized that censorship programs might be able to track the URL of where the frame is at? So I'm working on something new that will completely send a site through mine w/o a frame but I cannot make images and apps show up on the page; jsut the raw html of a requested page. Another problem is that links would have to go through framed.php and I do not want the url tagging the end of it. This ultimately results in two diferent methods to…
-
0
Reputation Points
- 43 replies
- 6.8k views
-
-
Assume that you have discovered a method that can determine a very efficient route for any given set of cities every time, but your not sure if its the most efficient route. How can we know if the resulting route is the most efficient? i.e. how can we test the method we have discovered to be the solution without actually solving all permutations for every problem? Is their some formula that produces the minimum distance without giving the route?
-
0
Reputation Points
- 25 replies
- 6.7k views
- 2 followers
-
-
It occurs to me that the principles behind the selection of the lottery numbers are quite simple. We have a near spherical box containing about thirty ping pong balls which are rolled around and then one at a time is selected. The physics is very simple. 1. If two balls of equal mass collide then they move off at ninety degrees to each other. 2. When a ball strikes a solid surface the angle of reflection is the same as the angle of incidence. 3. Gravity operates. Surely with those three very simple, irrefutable laws of physics it should be easy to predict next week lottery numbers.
-
0
Reputation Points
- 32 replies
- 6.7k views
- 1 follower
-
-
Is brain computer interfacing safe for human beings? What are the health risks tied into such technology?
-
0
Reputation Points
- 48 replies
- 6.7k views
-
-
I've started reading a book about concurrent programming and found the part about critical reference quite difficult to understand. - Definition 1: An occurrence of a variable v is defined to be a critical reference if a) it is assigned to in one process and has an occurrence in another process b) if it has an occurrence in an expression in one process and is assigned to in another - Definition 2: A program satisfies limited-critical-reference (LCR) if each statement has at most 1 critical reference. "Concurrent programs that satisfy the LCR restriction yield the same set of behaviors whether the statements are considered atomic or are compiled to a machine ar…
-
0
Reputation Points
- 1 reply
- 6.7k views
-
-
hey all, i am (hopefully) buying a computer soon and i wanted to ask a few things. first of all, how good is compaq? secondly which company produces the best LCD monitors (considering price and such) thanks everyone!
-
0
Reputation Points
- 40 replies
- 6.6k views
-
-
So, I like using LYX. Thing is, it won't give me two line breaks. Kind of how I'm breaking my sentences at this very moment. See! Another break! Ok, but really. I've been trying to go through the documentation, and I can't figureit out. I really don't like each of my sentences being so close, especially when I break off into a different topic. Anyone know how to manipulate LYX so I can get two line breaks?
-
0
Reputation Points
- 5 replies
- 6.6k views
-
-
I've been a long time member, but since been in the background. I ordered a new PC from "CyberPower PC" and want to get some feedback. In my opinion, you can't beat this PC for the price ***1,249.00***. I OWNED this config. What you people think. Half-life, here I come. Athlon 64 PCI-E Custom Build Configurator (NO MONITOR) *BASE_PRICE: [+509] CAS: NZXT Nemesis Elite Aluminium Mid-Tower Case 420W W/Window, Temp.Display & Fan Control [+51] (BLACK COLOR) CD: SONY DWD26A DUAL FORMAT 16X DVD+/-R/+/-RW + CD-R/RW DRIVE DUAL LAYER [+39] (BLACK COLOR) CPU: (939-pin) AMD ATHLON64 3200+ CPU w/ HyperTransport Technology [+46] FLASHMEDIA: INTE…
-
0
Reputation Points
- 29 replies
- 6.6k views
-
-
This is just a tidbit. Not really a post, just some information. The person who originally invented e-mail did it for his computer company for sending messages from one computer to another. Then he linked them up for sending to another company. Patented the idea, and his company madea fortune selling it. Ironicly, Hes a multi-millionaire, but he still drives some beat up old car, and lives in a small house. Thats a real nerd.
-
0
Reputation Points
- 21 replies
- 6.6k views
-
-
hello guys, i am trying to recover my win xp home password. i used this thing that i got from loginrecovery.com. the bad thing is that i have to wait 48 hours and i dont have time. as far as i know the tool already knows the password but it's encrypted. here is what the file reads: i have figured out that the family and administrator password is nothing that is why it says ":0:0:::" does anyone know what the owner password is.(is anyone good at decrypting codes) what is the pattern? if you cant figure out the pattern then please post a link to a program that i can use to recover the password instently. thanks fell free to pm me also
-
0
Reputation Points
- 39 replies
- 6.6k views
-
-
Hello Which type of computer are used in bank what type of software hardware
-
0
Reputation Points
- 38 replies
- 6.6k views
- 1 follower
-