Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.



Ryan McCallum | Technology Integration Specialist | Buffalo-Hanover-Montrose Schools

Jason Lee

on 28 April 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of COMP SCI

The Usage of Computers
In WAR Jason Lee, Connor Mailloux and Alexandros Sabalis Precision-guided Munition
UAV's Computers and Communication Since 1950, a revolutionary use of computers, in the sense of war were introduced, Unmanned Aerial Vehicles, or more commonly known as UAVs. UAVs are remotely piloted, or self piloted. Requiring no human crew onboard the vehicle, hence the “unmanned.” These vehicles are mostly used in the military. The purpose of UAVs is for reconnaissance or gathering of information, but now is also commonly used to combat missions. There are 2 types of UAVs: the first that is controlled remotely from a far, the second flies around by preprogrammed using more complex automation systems.
As of right now, the military are using UAVs for reconnaissance and attack missions in Afghanistan.

The MQ-9 Reaper is a common UAV predator used in combat. It is used by the United States Air Force, United States Navy, Italian Air Force, and Royal Air Force. It is the first killer UAV for long endurance and surveillance. The MQ-9 is a larger and more capable UAV that is controlled remotely. It can fly 221 mph.

UAV predators/reapers main weapon are hellfire missiles, here are some photos of them. Computers are used in many different ways in the U.S. military. Communication is probably one of the bigger uses, such as spys sending vitial data across the globe. In WWII the Americans tricked the Japanese with alteration of communication. The Japanese were eavesdropping on the Americans and the Americans knowing this sent false information to decieve the Japanese. We use computer to communicate everyday. Via Facebook, Twitter, and Myspace not to mention the countless amount of chat sites. The computer has made communication an all time high in human history.

Also known as PGMs, smart bombs, smart weapons, smart munitions, guided bomb units, or GBUs are basically weapons used to accurately hit only the desired targets while diminishing damage to other objects but the target. There are eight types of precision-guided munition but I will go over four steps that I feel are the most significant to PGM history.

(1.) Radio-controlled weapons- First PGMS's and they were used by the Germans in 1943. The Fritz X successfully attacked the Italian battleship Roma.
(2.) Infrared-guided weapons- PGM's used in World War II, the VB-6 Felix was invented by the U.S. National Defense Research Committee. It was primarily used to destroy ships. It was being built in 1945 but was never used.
(3.)Radar, infrared, IR imaging and electro-optical guided weapons- Guiding technology then applied to weapons other than bomb warheads. The Raytheon Maverick was built which was an anti-tank missile that had some new technology such as electro-optical (AGM-65A), imaging infra-red (AGM-65D), and laser homing (AGM-65E).
(4) Millimeter-wave radar- This was used in the Lockheed-Martin Hellfire II that had the radar on the Boeing AH-64D Apache Longbow to provide fire-and-forget guidance for that weapon.

The basic concept of a bomb could hardly be simpler. A normal bomb consists of some explosive material packed into a sturdy case with a fuze mechanism. The fuze mechanism has a triggering device -- typically a time-delay system, an impact sensor or a target-proximity sensor -- which sets the bomb off. When the trigger goes off, the fuze ignites the explosive material, resulting in an explosion. The extreme pressure and flying debris of the explosion destroys surrounding structures -Information from Howstuffworks.com

The following content may not be suitable for young children, immature individuals and for corrupted people.
It contains frightening scenes, disturbing contents and information that could potentially destroy the world.
Viewer discretion is advised.
Presentation done by Jason Lee fin. As you can see, computers have had and still does a significant role in warfare and combat. The ever developing technology is creating a big impact on how war is fought. We no longer have to worry about sacrificing millions upon millions of lives as we did in WWI and WWII. We can now use technology more specifically computers to do our bidding. But the positive aspects of developement in the usage of computers in warfare comes with negative aspects as well. By this I mean this new technology/power is made available not only to us but the enemy as well. I guess it's as the saying goes: "with great power comes great responsibility." Conclusion Introduction Computers have changed modern warfare entirely. Soldiers no longer line up in rows and mindlessly shoot at another, it is now more complicated than that. We can now have UAV's inflitrate an enemy's base and attack them from afar. We can now program intelligence in projectiles to hit targets of our choosing. We can even detect the enemy's nuclear weaponary experiments. In this presentation, we will explain three
uses. First is the Smart bomb, then the communtication aspect and then the UAV's. Please brace yourself for this
action packed presentation. Credits to Jason Lee Designed by Jason Lee
Full transcript