Preview

use of computer

Good Essays
Open Document
Open Document
566 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
use of computer
10/18/13

What are the uses of computers in defence

GO

Ask us anything
ANTI-VIRUS SOFTWARE

AUDIO EDITING AND RECORDING

CLOUD COMPUTING

Sign In | Sign Up

MORE

Answers.com > Wiki Answers > Categories > Technology > Software and Applications (non-game) > What are the uses of computers in defence?

What are the uses of computers in defence?
See what questions your friends are asking today.
Legacy account member?
Sign in.

Categories
Anti-Virus Software
Audio Editing and Recording
Cloud Computing
Computer Aided Design
Cydia

In: Software and Applications (non-game) [Edit categories]
Ads

Uses in defense

Translate any word into hundreds of foreign languages on 1 click www.howtheysay.com/uses+in+defense Answer:
There are many uses computers in defence such as:
1) Controlling UAV or unmanned air-crafts an example is Predator. If you have cable I would recommend watching the shows " Future Weapons" and " Modern Marvles". The show future weapons gives an entire hour to the predator.
2) They are also used on Intercontinental Ballistic Missiles (ICBMs) that uses GPS and Computers to help the missile get to the target.
3) Computers are used to track incoming missiles and help slew weapons systems onto the incoming target to destroy them.
4) Computers are used in helping the military find out where all their assets are (Situational Awareness) and in Communications/Battle Management Systems.
5) Computers are used in the logistic and ordering functions of getting equipments to and around the battlefield. 6) Computers are used to hold records of personnel and very useful in field hospitals.
7) Computers are used in tanks and planes and ships to target enemy forces, help run the platform and more recently to help diagnose any problems with the platforms.
8) Computers are used as gateways between different computer networks and to host security functions
(crypto systems).
9) Computers help design and test new systems.

You May Also Find These Documents Helpful

  • Powerful Essays

    12. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices. 13. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. A. languages B. methods C. CPUs D. storage devices 14. Servers are computers that provide resources to other computers connected to a: A. network. B. mainframe. C. supercomputer. D. client. 15. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. A. supercomputers B. clients C. laptops D. mainframes…

    • 5339 Words
    • 22 Pages
    Powerful Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    CIS 110 Assign 2

    • 551 Words
    • 1 Page

    and ships. When there are delivery men driving trucks, planes, or ships they use computers to…

    • 551 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Blue Chromite Training

    • 502 Words
    • 3 Pages

    It is speculated next conflict will have ulitization of the electronic and Aritifical intelligence technology againt the enemy. It is clear for the past 15 years the new generation technology and capabilities have been significantly advanced.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This risk assessment was to identify threats and vulnerabilities related to the Department of the Army (DoA) Information Technology (IT) systems. It will be utilized to identify vulnerabilities in the Computer Network Defense (CND) Capabilities and mitigation plans related to DoA’s IT systems. It was realized that this was a potential high-risk system as noted by the Department of Defense (DoD) Chief Information Officer (CIO). (DoD, 2012)…

    • 1633 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    E-8C STARS

    • 459 Words
    • 2 Pages

    2. The main mission of the E-8C Joint STARS is intelligence, surveillance, and reconnaissance (ISR). Gathering information from the battlefield is this weapon system’s specialty. This platform is an airborne battle management system and has the capabilities to command and control. The crew compliment of the aircraft is two pilots, a navigator, and a flight engineer. The mission aspect of the weapon system is normally crewed by 15 Air Force and three Army specialists. The E-8C Joint STARS has a powerful radar capable of covering over 19,000 square miles up to 155 miles away. The weapon system disseminates the information it collects to…

    • 459 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Navy Technology History

    • 549 Words
    • 3 Pages

    Eighty percent of the world’s population lives near the sea, 90 percent of all world trade travels by ocean. Our defenses rely on technology to maintain accountability for all actions happening in open waters. Using radar and sonar systems to detect threats is a primary example of information technology. Also the Navy’s aircrafts use mostly computer based systems. Technology has made for a faster more efficient outcome of data analyzation, communication, and anti-warfare operations. The Navy has created the Office of Naval Research who commits their studies to finding how science and technology can help advance our military. Their studies rang from personal development by enhancing fundamental information-processing abilities to autonomy and unmanned systems. Programs like this let technology help advance our…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 221

    • 481 Words
    • 2 Pages

    The computer can be used for many different things. There are many different purposes for a computer, they can vary from producing documents, sending information to the printer, browsing the internet and managing applications. At work, one of the main reasons we use a computer every day is that we can monitor the security surveillance through the PC and we can see who enters and leaves the building with a magnetic key which must be scanned to use the doors to the building.…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Research About Drone

    • 2751 Words
    • 12 Pages

    Similarly, the military also use drones in combat, invasion and surveillance. Drones are used for tasks which are dangerous for a soldier to perform. Different types of drones are used for different purposes in the military. For instance, “The MQ-1B predator (formerly called the RQ-1 predator) was originally designed as an aircraft for intelligence-gathering, surveillance and identifying target and reconnaissance” (“Drones: What are”). Therefore, the predator drones are useful for locating enemy’s bases and…

    • 2751 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer – The computer can be used for many different things. There are many different purposes for a computer, they can vary from producing documents, sending information to the printer, browsing the internet and managing applications. At work, one of the main reasons we use a computer every day is that we can monitor the security surveillance through the PC and we can see who enters and leaves the building with a magnetic key which must be scanned to use the doors to the building.…

    • 1681 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    “We are at risk. Increasingly, America depends on computers. They control power delivery, communications, aviation, and financial services. They are used to store vital information, from medical records to business plans to criminal records. Although we trust them, they are vulnerable - to the effects of poor design and insufficient quality control, to accident, and perhaps most alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb.”(1)…

    • 2101 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    The first digital computers were created during the 1940s and1950s.computer that was regarded to be boon to human race soon became a threat. In an era which is mostly regulated by science and technology computers became a smooth and an effective to conduct battles and cause mass destruction in a very little time.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Crime and Security

    • 7738 Words
    • 31 Pages

    The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters.…

    • 7738 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    Love

    • 2785 Words
    • 12 Pages

    With the start of the Second World War, the countries involved in the war machine tried to their potential strategic importance of developing computer misuse.…

    • 2785 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    what to know

    • 1321 Words
    • 6 Pages

    Computers is one of the most commonly used technology in learning and in aiding the needs of our commercial businesses.…

    • 1321 Words
    • 6 Pages
    Good Essays