Preview

how computers are used in military

Good Essays
Open Document
Open Document
2119 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
how computers are used in military
Computers In Military Applications

Computers have given the modern military a degree of efficiency and effectiveness that has completely changed the way the military operates at sea, in the air, and on the ground. The fast computational abilities and the accuracy of digital computing enable the military to perform more quickly with less risk to themselves and with less cost to their government. Wars fought prior to the advent of digital computing could take years to complete and resulted in tremendous loss of property on both sides.
Weapons of mass destruction used to be the fastest way to achieve the objective. A discussion with Dan Carroll, Vietnam war veteran and current contract engineer for major aerospace companies revealed that in World War
II and in Vietnam, American forces employed a technique known as carpet bombing to wipe out enemy troops and resources. Many large bombers would overfly an area and drop thousands of bombs in an effort to destroy the enemy. This proved to be very costly for both sides in terms of property and human life. The attacking force had to expend many bombs and put many aircraft and their crews at risk by exposing them to enemy anti-aircraft artillery and ground to air missiles. But this technique was far worse for the people on the ground. Entire cities were leveled in one pass and their populations decimated under a constant stream of falling bombs. During
World War II, the allied forces launched one such attack on Dresden,
Germany. The attack was so fearce that the entire city was set ablaze in one gigantic fireball. The heat was so intense that metal objects were melted and the rising thermal created by the fire created tremendous wind storms. Anyone in the city not burned to death was suffocated as the inferno consumed all of the nearby oxygen.

An even earlier example of the brutality of primitive warfare is the
American Civil War. Without computers and aircraft at their disposal,
other

You May Also Find These Documents Helpful

  • Powerful Essays

    Air Force IT Remedy System

    • 1457 Words
    • 6 Pages

    Information Technology (IT) Service Management is the framework and imbedded processes by which an IT organization both manages the services it provides and delivers those services to customers (Drogseth, 2015). There are many different approaches to Service Management but its overall effectiveness is the lifeblood of any IT organization. The United States Air Force utilizes the Remedy system to automate Service Management functions for its cyber enterprise networks. Remedy provides the various system users multiple features to streamline and optimize their respective Service Management functions. Without careful planning there are some problems Remedy can create; however, when utilized properly the system provides users with a powerful Service Management tool. Identifying the users who interface with Remedy is the first step to understanding its importance to Air Force IT organizations.…

    • 1457 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer System Scenarios

    • 674 Words
    • 3 Pages

    My recommendations for Sarah’s Flower Designs would include a workstation, a personal digital assistant, and a solid state storage device or compact disk (CD) recordable drive. I would consider updating their current computer system into a small workstation. According to Axia College Week One reading Computer Hardware Technologies (2008), “Computer companies design workstations for a specific purpose, such as developing architectural blueprints or processing DNA” (p. 54). This workstation will be specifically designed to handle all the financial duties, client information, and order histories. In order to do this, I recommend upgrading the hard drive and the central processing unit (CPU). This would allow the new computer to accommodate all the information that they need to store and have enough processor speed to run all of the needed programs. I would also suggest using a solid state storage device or CD recordable (CD-R) drive to help store records and provide a way to backup important business files. In order to help Kim keep track the addresses and delivery instructions, I would recommend using a hand held computer or a personal digital assistant. This would be an excellent way to keep track of the many addresses and delivery instructions that they may encounter.…

    • 674 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As a senior in high school there can be many stressful and obstacles that you will face. There are so many things that you have to handle all at one time. You have to balance your school work, social life, and factor in having a job if that applies to you. Two of the biggest matters you have to sort out are what college do you plan to attend, if you do plan on going to college, and what you want your career to be. As someone who has been in to hands-on activities and computers I have combined those two interests into one and have come to the decision that I would like my career to be a computer technician. I have done some research about this career and have learned about what colleges are best to attend and what exactly a computer technician is and does.…

    • 622 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Computers take part in a big role in the Criminal Justice Field. So far computers have allowed us to make it accessible for witnesses to go through and look for a suspect's picture on the screen. Computers have enabled us to be able to do DNA testing. Which now only takes the labs a short time to process, and finding criminals from cases 15+ years ago can now be charged for their actions. There are laptop computers in police vehicles; therefore, police officers can look up information right then and there instead of having to wait until they get back to the station. Some cars even have the wireless Internet connection that goes through satellite which allows them to do even greater things. Computers have also allowed the use of fingerprinting to expand. Agencies can now take someone’s fingerprints and send them through the computer and find out if they are linked to any other cases going on at the time, or any other cases in the past. A computer forensic scientist or technician is still considered a cutting edge profession in the criminal justice field. With the increase of cybercrime, cyberterrorism, identity theft, and Internet child predators, computer forensic scientists are needed to track seemingly traceless criminals. Computer forensic scientists work with law enforcement officials, legal teams, independent companies and the government to conduct investigations, retrieve evidence and sometimes even testify in court. Computer forensic scientists are in high demand because they need to have a very thorough, practical knowledge of computers, networks, hacking, data retrieval, information security, and computer surveillance, as well as criminal justice concepts like confidentiality, privacy laws, evidence handling and more. Generally, computer forensic scientists are supervised during their work by a forensic scientist, and they must have the ability to work well in stressful situations. Depending on the…

    • 1441 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Question 3. 3. (TCO3) Known as 'connectionless networking', this protocol employs a method where IP datagram are sent over a network using a 'best-effort' approach. The recipient would not know if the packets sent were received by the intended recipient. (Points : 5)…

    • 1156 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Cyber Warfare

    • 896 Words
    • 4 Pages

    “Cyber warfare is a term used to describe the use of the Internet to wage war in the virtual world, often with real effects in the physical world,” (McGuigan). In the past recent years, cyber warfare has become a pertinent issue among the major nations on the planet; this issue has forced militaries, all over the world, to incorporate a new branch that is devoted to both conducting and protecting against cyber warfare. Cyber warfare is also used to define attacks amongst corporations, form radical organizations, and/or attacks by hackers, who are perceived as being warlike in their intent. Most situations pertaining to cyber warfare are attacks from one “sovereign state,” to another virtually in cyberspace (McGuigan).…

    • 896 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Cyber Defense

    • 459 Words
    • 2 Pages

    I also need to spend time helping my wife with the household chores, which includes cooking, cleaning, and laundry. My wife also works 40-50 hours a week at the Fenton Post Office as a city carrier. So we both need to help one another, with all the necessities, so we can get done faster. We need to spend more quality with the kids. I am hopeful this job will let me work less so we can achieve this.…

    • 459 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    computer aplications

    • 313 Words
    • 2 Pages

    In addition to your athletic feats and academic performance, we recognize your other achievements, particularly:…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Malcolm, P. (2011, August 16). The history of laptops [Web log post]. Retrieved from http://pc-internet-tips.blogspot.com/2011/08/history-of-laptops.html.…

    • 2551 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    ABC Corporation is a financial consulting organization based out of Jaffna, Srilanka with four satellite offices located throughout Srilanka. The company has 300 full-time employees, 20 of whom travel to various office locations 2 to 4 days a week. These 20 employees do not have access to email and other company programs when they are traveling.…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In the modern military, emphasis is shifting from combat arms roles dominating the armed forces to roles that may be considered more so support, chief among which is cybersecurity. Cybersecurity units have been having trouble recruiting people who meet the qualifications to serve as a cyber operations officer, but also meet physical standards set by the military. In “The Pentagon Should Adjust Standards For Cyber Soldiers - As it Has Always Done” by Major Crispin Burke, an officer in the U.S. Army. The Author describes how in his mind, the best way to get qualified people into cybersecurity positions is to lower physical standards for this branch and allow people who would otherwise be disqualified from military service to serve in this branch.…

    • 1758 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Different Types of Computer Systems  This is a presentation describing the purposes of PCs, laptops, netbooks, PDAs, tablets & servers. PCs General purpose computer This computer is designed to perform and is capable of performing in a reasonably efficient manner, the functions required by both scientific and business applications.…

    • 361 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This week we were introduced to the basic functions of our computers. The three things I learned are:…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Computer and Its Uses

    • 1006 Words
    • 5 Pages

    PRI: We introduce a probabilistic version of the well-known Rand Index (RI) for measuringthe similarity between two partitions, called Probabilistic Rand Index (PRI), in which agreements and disagreements at the object-pair level are weighted according to the probability of their occurring by chance. We then cast consensus clustering as an optimization problem of the PRI value between a target partition and a set of given partitions, experimenting with a simple and very efficient stochastic optimization algorithm. Remarkable performance gains over input partitions as well as over existing related methods are demonstrated through a range of applications, including a new use of consensus clustering to improve subtopic retrieval.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Use of Computer Systems

    • 357 Words
    • 2 Pages

    Computer systems are a very important part of our world today and are seen almost anywhere. It has got to that stage where computer systems are a part of pretty much all we do. In this same sense, anybody who has no computer knowledge whatsoever would be regarded as an illiterate in full years to come and with this regard; we can say that not having any knowledge of computers is like not attending a school at all. This article explains how and where computer systems are important to our lives and different sectors or environments.…

    • 357 Words
    • 2 Pages
    Satisfactory Essays