EssayZap  
Enter Topic  

» Get Technology Papers

Steam Turbines

... and is also used as a means of jet propulsion. The action of the steam turbine is based on the thermodynamic principle that when a vapor is allowed to expand, its temperature drops. In turn, its internal energy is decreased. This reduction in internal energy is transformed into mechanical energy in the form of an acceleration of the particles of vapor. The transformation that occurs, provides a large amount of available work energy. The essential parts of all steam turbines consist of nozzles or jets through which the steam can flow and ex ...

Number of words: 452 | Number of pages: 2

Technological Literacy

... being raised about new information technologies and . What is intereresting in the current debate is that researchers and social commentators are looking at much broader social and cultural consequences of the impact of computer mediated communication and, even among educationists, concerns are not confined exclusively to pedagogical and curriculum issues. It seems that what is on everyone's mind are questions of significant and permanent social change seeping into every crevasse of our everyday work and private lives. Many of the issues that ...

Number of words: 10060 | Number of pages: 37

Othello: Game Strategy

... So, do not make very long moves at the beginning of the game. Keep yourself to making short moves, and NEVER put a stone where the computer has another one on the end. Example:You see a row of 5 black stones, with a white stone on the end, and beside that white stone a black. You of course, would put a white stone at the end with the 5 black stones, but that is a bad mistake. Go to the side with the one black (a setup move so the computer cannot capitalize when you turn 5 black stones white, and the computer your seven whites black. ...

Number of words: 695 | Number of pages: 3

Parity/Non-parity Check

... on the other end of the lime was incorrect. To Prevent this from happening, a parity check system was developed. Each character is represented by a byte consisting of a combination of intelligence bits (seven bits in ASCII and eight bits in EBCDIC) and an additional bit called a check or parity bit. Even parity codes place a check bit with each byte that contains an uneven number of 1 bits. (Remember that a bit is either 1 or o). Because the check bit is transmitted only with characters composed of an uneven number of 1 bits,all ch ...

Number of words: 236 | Number of pages: 1

Internet Censorship

... can readily access this material. Around the world, the call has gone out for restriction and censorship of the Internet. This rally has been met with mixed results. People who support freedom of speech on the Internet quote from the first amendment of the Constitution. In addition, many groups are in favor of restricting the Internet, similarly to how television is regulated in the United States. In favor of this regulation are groups emphasizing values and some foreign governments. In the latter, often the government does not want ...

Number of words: 1406 | Number of pages: 6

The Evaluation Of The Microprocessor.

... the central processing unit)and without the microprocessor the computer is more or less useless. Motorola and Intel have invented most of the microprocessors over the last decade. Over the years their has been a constant battle over cutting edge technology. In the 80's Motorola won the battle, but now in the 90's it looks as Intel has won the war. The microprocessor 68000 is the original microprocessor(Encarta 95). It was invented by Motorola in the early 80's. The 68000 also had two very distinct qualities like 24-bit physical add ...

Number of words: 1306 | Number of pages: 5

Brief History Of Library Automation: 1930-1996

... "Book Indicator", developed by Albert Cotgreave in 1863. It housed miniature books to represent books in the library's collection. The miniature books were part of a design that made it possible to determine if a book was in, out or overdue. These and many more examples of early ingenuity in library systems exist, however, this paper will focus on the more recent computer automation beginning in the early twentieth century. The Beginnings of Library Automation: 1930-1960 It could be said that library automation development began in the 19 ...

Number of words: 1647 | Number of pages: 6

Escapism And Virtual Reality

... terms is also included. Computers as Machines The progression of the machine into all aspects of human life has continued unabated since the medieval watchmakers of Europe and the Renaissance study of science that followed Clocks . Whilst this change has been exceedingly rapid from a historical perspective, it can nevertheless be divided into distinct periods, though rather arbitrarily, by some criteria such as how people travelled or how information was transferred over long distances. However these periods are defined, their lengths ...

Number of words: 4882 | Number of pages: 18

Modems

... back into digital data, and sends the data to the receiving CPU. At connection time, modems send tones to each other to negotiate the fastest mutually supported modulation method that will work over whatever quality line has been established for that call. There are two main differences in the types of modems for PC, internal and external modems. Evolution of Modems In the last 10 years, modem users have gone from data transfer rates of 300bps to 1,200 bps to 2,400 bps to 9,600 bps to 14.4Kbps to 28.8Kbps to, and to 33.6Kbps. Now new ...

Number of words: 2432 | Number of pages: 9

How To Maintain A Computer System

... disk. At a minimum, you should have a system disk with your command.com, autoexec.bat, and config.sys files. If your system crashes, these files will help you get it going again. In addition, back up any files with an extension of .sys. For Windows systems, all files with an extension of .ini and .grp should also be backed up. Next any time you work inside you computer turn off the power and disconnect the equipment form the power source. Before you touch anything inside the computer, touch and unpainted metal surface such as the power s ...

Number of words: 384 | Number of pages: 2

Computers

... As did the gold miners set out to California on carriages to stake their claim in the gold rush, business and entrepreneurs are rushing to stake their claim on the information superhighway through Gopher sites, World-Wide Web sites, and electronic mailing lists. This article explains how businesses and entrepreneurs are setting up information services on the Internet that allows users to browse through picture catalogues, specification lists, and up to the minute reports. Ever since Sears Roebuck created the first pictorial ...

Number of words: 911 | Number of pages: 4

Viruses

... your computer to "Hack" your way into another. They use programs called scanners which randomly dials numbers any generating tones or carriers are recorded. These numbers are looked at by hackers and then used again, when the hacker calls up the number and gets on he's presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens ar ...

Number of words: 3001 | Number of pages: 11

Pages: 1 ... 15 16 17 18 19 20 21 22 23 24 25 next »