Home Computers

2021 ◽  
pp. 119-136
Author(s):  
Gerard O’Regan
Keyword(s):  
1981 ◽  
Author(s):  
David R. Pedrick ◽  
Richard S. McCurdy

Advances in computer technology continue to expand the every-day application of electronic calculation and programming. With everything from home computers to automotive diagnostic devices, hand-held Pong games, and calculator wristwatches now being big sellers, it is no surprise that computer-based marine instruments have increased in capability and popularity. This paper describes some current developments in electronics to evaluate the performance of sailing yachts, ranging from basic digital displays to full-blown shoreside computers.


2021 ◽  
pp. 55-59
Author(s):  
O.G. Vasyukov ◽  

Examines the positive and negative sides of distance education in aspects of quality of education and economic efficiency of the distance learning software that are used in the training for the selected training areas/specialties. In the course of the research conducted by the method of questioning students, it was revealed that at the current time, 69.7% of students have none of the programs they need for further direct training of their profession on their home computers. Considering the provision of students with the software they need to study basic subjects, it was found that 24.5% of students have Microsoft Office 2007 or earlier installed on their personal computers (PCs) or laptops, that is, SOFTWARE that is already considered obsolete. Thus, almost every fourth student, when performing practical, laboratory, course work using a software package for working in the office, experiences difficulties. In the course of the research conducted by the method of questioning students, it was revealed that at the current time, 69.7% of students have none of the programs they need for further direct training of their profession on their home computers. Considering the provision of students with the software they need to study basic subjects, it was found that 24.5% of students have Microsoft Office 2007 or earlier installed on their personal computers (PCs) or laptops, that is, SOFTWARE that is already considered obsolete. Thus, almost every fourth student, when performing practical, laboratory, course work using a software package for working in the office, experiences difficulties. Why the computer works even slower and with various failures and failures. Moreover, the specified percentage may also be even higher, since 8.6% of students could not answer what OS they have installed. Studying in the traditional form of training, this lack of hardware and SOFTWARE is eliminated, since in the University’s computer classes, there are PCs that support reliable operation with Windows 10 and Microsoft Office 2010 and are protected from viruses and attacks by installed and constantly updated antivirus programs. The article reveals the problems that affect the quality of students’ education when switching to distance learning. Namely, the absence or non-compliance of Hardware and SOFTWARE for students’ computers and laptops with modern requirements for Hardware and SOFTWARE for performing teachers’ tasks. The author concludes that when switching to full distance education in technical specialties, the state will lose, according to the most optimistic forecasts, from 19.8 to 69.7% of well-prepared students only because their education does not meet modern requirements.


2011 ◽  
Vol 6 (1) ◽  
pp. 79-98
Author(s):  
Mark Guttenbrunner ◽  
Mihai Ghete ◽  
Annu John ◽  
Chrisanth Lederer ◽  
Andreas Rauber

Rescuing data from inaccessible or damaged storage media for the purpose of preserving the digital data for the long term is one of the dimensions of digital archaeology. With the current pace of technological development, any system can become obsolete in a matter of years and hence the data stored in a specific storage media might not be accessible anymore due to the unavailability of the system to access the media. In order to preserve digital records residing in such storage media, it is necessary to extract the data stored in those media by some means.One early storage medium for home computers in the 1980s was audio tape. The first home computer systems allowed the use of standard cassette players to record and replay data. Audio cassettes are more durable than old home computers when properly stored. Devices playing this medium (i.e. tape recorders) can be found in working condition or can be repaired, as they are usually made out of standard components. By re-engineering the format of the waveform and the file formats, the data on such media can then be extracted from a digitised audio stream and migrated to a non-obsolete format.In this paper we present a case study on extracting the data stored on an audio tape by an early home computer system, namely the Philips Videopac+ G7400. The original data formats were re-engineered and an application was written to support the migration of the data stored on tapes without using the original system. This eliminates the necessity of keeping an obsolete system alive for enabling access to the data on the storage media meant for this system. Two different methods to interpret the data and eliminate possible errors in the tape were implemented and evaluated on original tapes, which were recorded 20 years ago. Results show that with some error correction methods, parts of the tapes are still readable even without the original system. It also implies that it is easier to build solutions while original systems are still available in a working condition.


2019 ◽  
Author(s):  
Justin Fanelli ◽  
John Waxler

Hundreds of thousands of home users are victimized by cyber-attacks every year. Most experts agree that average home users are not doing enough to protect their computers and their information from cyber-attacks. Improperly managed home computers can lead to individuals losing data, systems performing slowly, loss of identity, and ransom payments; en masse attacks can act in concert to infect personal computers in business and government. Currently, home users receive conflicting guidance for a complicated terrain, often in the form of anecdotal 'Top 10' lists, that is not appropriate for their specific needs, and in many instances, users ignore all guidance. Often, these popular ‘Top 10’ lists appear to be based solely on opinion. Ultimately, we asked ourselves the following: how can we provide home users with better guidance for determining and applying appropriate security controls that meet their needs and can be verified by the cyber security community? In this paper, we propose a methodology for determining and prioritizing the most appropriate security controls for home computing. Using Multi Criteria Decision Making (MCDM) and subject matter expertise, we identify, analyze and prioritize security controls used by government and industry to determine which controls can substantively improve home computing security. We apply our methodology using examples to demonstrate its benefits.


Sign in / Sign up

Export Citation Format

Share Document