EssayZap  
Enter Topic  

» Get Technology Papers

Computer Languages

... a result of one of these three languages, but are greatly improved. Both turbo pascal and basic are languages that are easy to understand and the syntax is very easy and straightforward. In Basic when printing to the screen you simply type the word 'print', in turbo pascal you would type 'writeln'. These are very simple commands that the computer executes. To execute a line of code in a language such as C, or C++, you would have to type in much more sophisticated lines of code that are much more confusing than the previous two. The forma ...

Number of words: 489 | Number of pages: 2

Noise Reduction In Hearing Aids

... to accomplish the sifting and sorting that is carried out in the human brain. While a person with normal hearing sits in a restaurant, he can distinguish a conversational speech signal that is as little as three decibels greater than the ambient noise. On the other hand, a person with a 30-decibel sensorineural loss might need the speech signal to be 15 or more decibels greater than the ambient noise. The hearing aid’s task is to acoustically or electronically compensate for both the neurological shortcomings of the hearing impaired per ...

Number of words: 2400 | Number of pages: 9

The Vast Cyber-frontier Is Being Threatend With Censorship From The Government

... Censorship Software. C. Civil Rights. * Conclusion. After threatening the Communications Decency Act with a vetos of the past versions, President Bill Clinton signed the bill into law on February 8, 1996.1 Before hand, congress approved the largest change of the nation's communications laws in 62 years. One of the largest controversial topics included in the bill is the censorship of pornography, which now is a strenuously enforced crime of distributing knowingly to children under 18. The congress overwhelmingly pas ...

Number of words: 2556 | Number of pages: 10

Technological Advances In Agriculture Since The 1600's

... upon the degree of civilization enjoyed by that society. For example, the hunter-gatherer cultures of prehistoric times were constantly moving about and lacked the stability necessary for the development of civilization. However, as advances were made in tools and discoveries were made in cultivation, these cultures became more stationary and more time was diverted from the pursuit of nutrition to the development of civilization. This can clearly be demonstrated through the fact that all major ancient civilizations including Egypt, Me ...

Number of words: 995 | Number of pages: 4

Internet Access

... 180 countries and there were over 30 million users. It is expected that 100 million computers will be connected to the public Internet by the year 2000. The public Internet can be accessed in several different ways: through a LAN, by a host, terminal access or gateway access. A LAN is a Local Access Network where there are a group of computers and other devices that are spread over a relatively limited area and connected by a communications link. This also allows you to communicate with any other computer on the network. If you acc ...

Number of words: 691 | Number of pages: 3

Software Piracy: A Big Crime With Big Consequences

... of commercial software don't even know they are committing a crime. Software piracy is a very serious and widespread crime that must be acknowledged and dealt with. Software piracy is the unauthorized duplication and or distribution of copyrighted programs. There are two ways to be involved in software piracy. The first is facilitation. Facilitation is the deliberate copying of copyrighted software and distributing it. An example would be an MIT student named David LaMacchia. This individual served and maintained a computer that ...

Number of words: 2190 | Number of pages: 8

Bulletproof Vests

... "flak jackets" were flexible enough to permit relatively free movement by the wearer while affording him adequate protection against fragments from artillery shells, mortar shells, and anti-aircraft shells. They could not stop armor piercing bullets however. In the 1960's new types of vests were developed whose plates were made of composite layers of steel or a very hard ceramic, boron carbide. However, the discovery that numerous layers of nylon fabric could dissipate the energy of the bullet revolutionized the use of modern bo ...

Number of words: 366 | Number of pages: 2

Ethernet

... network over coaxial cabling, and published the "Blue Book Standard" for Ethernet Version 1. This standard was later enhanced, and in 1985 Ethernet II was released. The IEEE's (Institute of Electrical and Electronics Engineers') Project 802 then used Ethernet Version 2 as the basis for the 802.3 CSMA/CD network standard. The IEEE 802.3 standard is generally interchangeable with Ethernet II, with the greatest difference being the construction of the network packet header. This method consists of multiple workstation that accesses a transm ...

Number of words: 836 | Number of pages: 4

America Online To Unveil Flat Fee For Internet Access

... they will switch their price plan for internet access.to a flat-fee rate of $19.95 per month. After the changed in price (decrease), the Supply curve "S" will shift to "S1". An increase in Supply curve will increase (Quantity) people using America Online and decrease Price. America Online has announced a change to their price plan for internet access. before they charged a rate of $19.95 for only 20 hours of internet access. One of the many reasons is that it could help t ...

Number of words: 278 | Number of pages: 2

People And Machines

... The longer the people have worked on a single machine, the more they become adept in the use of the machine. When the time comes for a more advanced machine to be installed, such as a computer, the worker may not be able to cope with the massive change. The computer is an example of a new machine that has created new jobs while driving out workers who were either unwilling or unable to deal with the new technology. Computers have drastically changed many of the jobs on the market. Twenty years ago you could leave high school and bec ...

Number of words: 269 | Number of pages: 1

The Four-Stroke Cycle Of An Engine

... and to expel burned gases on the exhaust(second up) stroke. The ports are opened and closed at the proper times by the intake and exhaust valves, which close against the sides of the ports" (Doyle 128). The controlling of the valves start with a cam shaft. A cam shaft has lobes on it which are all shaped differently, but resemble an oval. On a camshaft lobe there rests a lifter. A lifter is cylinder shaped and pushes up on a push rod when the lobes are rotating. A push rod, which is connected to a rocker arm, then "rocks" down ...

Number of words: 797 | Number of pages: 3

"Computer Security" By Time Life Books

... they cannot do anything at all. This is what computer security is meant to do. It is done by making it only possible for someone to access a computer by using a password or by locking it up. Computer security works by many ways of password use or by locking it up. The password method is enforced by prompting a computer user to enter a password before they can access any programs or information already contained within the computer. Another password security method would be to have the computer user carry a digital screen that fits in yo ...

Number of words: 528 | Number of pages: 2

Pages: 1 ... 10 11 12 13 14 15 16 17 18 19 20 next »