EssayZap  
Enter Topic  

» Get Technology Papers

Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection

... this case, infected files contained on a diskette (including, on occasion, diskettes supplied by software manufacturers) are loaded, and used in a previously uninfected system thus allowing the virus to spread. 2. Local Area Network: a LAN allows multiple computers to share the same data, and programs. However, this data sharing can allow a virus to spread rapidly to computers that have otherwise been protected from external contamination. 3. Telecommunications: also known ...

Number of words: 548 | Number of pages: 2

Bridge Structures

... types of bridges are still in use. Wooden-beam bridges appear to have been the most common type known to the ancients, although according to the tradition a brick-arch bridge was built about 1800 BC in Babylon. Other forms, such as simple suspension and cantilever bridges, are known to have been used in ancient India, China, and Tibet. Pontoon bridges were used in the military expeditions of the Persian monarchs Darius I and Xerxes I. The Romans built many timber-trestle bridges. Surviving roman bridges, however usually have a level ro ...

Number of words: 485 | Number of pages: 2

Technological Developments

... The amount and availability of information seem to be increasing at an exponential rate. We feel that our entire world is moving, changing, mutating, at an accelerated pace. Our interactions with this world of information seem plagued by an increasing sense that we cannot keep up, can\'t take it all in, that we are being overwhelmed by information, deluged by data: the sense of an \"information overload.\" One of the first attempts to represent this kind of information overload appears in Ted Mooney\'s 1981 novel, Easy Travel to O ...

Number of words: 973 | Number of pages: 4

Cable Modems And ADSL

... speed than ADSL, but that advantage is compromised by inevitable reductions in available cable modem speed. Cable modems share a line with tens of other users; as more users join a line, the capacity available to any one inevitably drops. The top speeds of both technologies will not be usable for years anyway. Internet server speeds, network delays, and personal computer limitations will hold usable rates at or below 2 Mbps for some time. ADSL offers higher security and reliability profiles. Both technologies are at about the same state of ma ...

Number of words: 1447 | Number of pages: 6

Floating Point Coprocessors

... To increase the power of a microprocessor, it does not suffice to add a few more instructions to the instruction set, but it involves adding an auxiliary processor that works in parallel to the MPU (Micro Processing Unit). A system involving concurrently operating processors can be very complex, since there need to be dedicated communication paths between the processors, as well as software to divide the tasks among them. A practical multiprocessing system should be as simple as possible and require a minimum overhead in terms of both har ...

Number of words: 2861 | Number of pages: 11

Definition Of An IP Address

... address, too. You register your address with InterNIC as both a name , which is referred to as the domain name , and a number ( 198.137.240.100 ) , which is generally referred to as the IP address or IP number. Most likely, the InterNIC will assign you a Class C address, which consists of 255 unique IP numbers for you to assign to your employees. If you need more than 255 IP address, you can apply for a Class B address, which will give you over 65,000 unique IP addresses. Class A addresses are for very large companies. Both Class A an ...

Number of words: 213 | Number of pages: 1

Biometric Systems

... will be to accept it. Retina pattern devices are the most reliable but most people hate the idea of a laser shooting into their eye. Yet something such as monitoring keystroke patters people don't mind, but it's not nearly as effective. Biometric verification is forecast to be a multibillion dollar market in this decade. There is no doubt that financial credit and debit cards are going to be the biggest part of the biometric market. There are also many significant niche markets which are growing rapidly. For example, biometric ident ...

Number of words: 484 | Number of pages: 2

Computer Aided Drafting And Design

... which is the standard method, and some might use inches or centimetres. The standard method of co-ordinates gives a product which is compatible with other systems. One co-ordinate point might represent 1/10 of a millimetre in actual space. Then 1 millimetre is 10 co-ordinate points. CADD systems were developed along with the computer. They were developed very slowly. They went from being very large, clumsy, elaborate machines which needed lots of human intervention to one program on a floppy disk. When the power of computers inc ...

Number of words: 780 | Number of pages: 3

Computer Crimes

... largely a computer society everyone is at risk, experts say, and should protect information about themselves, such as credit card numbers (Bowers 54:G14). Armed with a computer rather than a gun hackers, who say they’re doing the world a favor by pointing out security loopholes, have a slew of ways to break the law (White 67:c11). Computer crime becomes a larger and more prevalent issue as there is more value to criminally gain and the stakes raise in the hacker’s ego game. Only seventy five computer crime prosecutions were reported i ...

Number of words: 1157 | Number of pages: 5

Exploring The Career Of A Computer Programmer

... that write the programs for these machines are computer programmers. Computer programmers write, code, test, and debug detailed instructions for the computer known as programs. Programs list in a logical order the steps a computer must execute to perform their function. Programmers often are categorized as technicians. However, many technical innovations in programming such as advanced computing technologies, sophisticated new languages, and programming tools, have cahnged the role of a programmer and elevated much of the programming wo ...

Number of words: 2652 | Number of pages: 10

Which Computer Is The Fastest

... 1995, using 10 applications available for both Macintosh, and Windows 3.1 systems, the 120-megahertz Power Macintosh 9500/120 was, on average, 51 percent faster than a 120-megahertz Pentium processor based PC. The 132-megahertz Power Macintosh 9500/132 was 80 percent faster when running scientific and engineering applications, and 102 percent faster when running graphics and publishing applications. You can understand why the education market is almost entirely apple based. Recent surveys confirm that from kindergarten through college, Apple ...

Number of words: 1135 | Number of pages: 5

Nuclear Power Plants

... to use nuclear plants, then there is a great danger of toxic waste invading our rivers, and also the chance of a spill similar to Chernobyl. As we saw in the Chernobyl video, there is great danger when using nuclear energy. If this were to happen is the United States, the risk of mortality is much higher because the area’s in which there would be a plant such as a big city are very densely populated. Because of these facts, I do not think that the U.S. should renew its efforts to develop more nuclear plants. The United States should put t ...

Number of words: 430 | Number of pages: 2

Pages: 1 ... 12 13 14 15 16 17 18 19 20 21 22 next »