EssayZap  
Enter Topic  

» Get Technology Papers

Artificial Intelligence

... The First Steps 3 Computer-Synthesized Senses 4 Visual Recognition 4 Current Research 5 Computer-Aided Voice Recognition 6 Current Applications 7 Optical Character Recognition 8 Conclusion 9 Recommendations 10 Bibiography 11 INTRODUCTION Purpose The purpose of this study is to determine additional areas where artificial intelligence technology may be applied for positive identifications of individuals during financial transactions, such as automated banking transaction ...

Number of words: 2749 | Number of pages: 10

Isdn For Small Business

... Interface (BRI) which is the type that is most applied to small businesses and residential users. BRI ISDN was developed to be the digital connection replacing the now existing phone lines from users to the telephone company. There are many considerations and alternatives to ISDN. This can range form regular phone connections to a digital satellite dish. The article is offers a worthy discussion for anyone contemplating a higher speed internet connection in the near future. ABSTRACT ii LIST OF ILLUSTRATIONS iv INTRODUCTION 1 ISDN DEVELOP ...

Number of words: 2271 | Number of pages: 9

Computer Viruses

... look at it they still cause problems. There are many kinds of computer viruses. Three of the most common are the time bomb, the logic bomb and the Trojan horse. The time bomb is a virus triggered by the computers clock reaching a certain date and time (often Friday the thirteenth). The logic bomb is a virus triggered by a certain value appearing a certain part of the computers memory, either relevant to the viruses purposes or at random. The Trojan horse is an innocent seeming program deliberately infects with a virus and circulated publ ...

Number of words: 729 | Number of pages: 3

Computer Crimes: Laws Must Be Pass To Address The Increase In Computer Crimes

... According to experts, gender is the only bias. The profile of today's non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be "between the ages of 14-30, they are usually bright, eager, highly motivated, ...

Number of words: 1905 | Number of pages: 7

A System Analyst

... the system, which is to make a 'skeleton' of the project. They write specifications, of what is to be in the final report. They do flow charting, specifications for the programmers of the report, and development control. Development control is where the Systems Analyst works with the programmers along a critical path. A critical path is like a due date, if the report is to be done in thirty days, the Systems Analyst makes sure the report is done in thirty days. The Systems Analyst also follows the first analysis of when the proje ...

Number of words: 423 | Number of pages: 2

ITT Trip Scheduling

... trips. This system also allows them access to information about all of ITTs trips and the feedback from customers about each trip. In the next few paragraphs I go through the major steps in developing a system of this nature. A system of this type goes through several phases in its development. I start with the planning phase and go on to discuss research, analysis and conceptual design. Then I talk a little about the models used in this system. I finish by talking about the actual design, the construction, and the implementation of th ...

Number of words: 1411 | Number of pages: 6

Computer Programmer

... industry is the largest growing industry, and there is a high demand for qualified programmers. On a recent college tour of Cornell University Computer Science Department, I learned that the average graduate of this department earns $ 54,000 a year. A is a person who writes the coding of a program, in a language a computer can understand and follow. A program must be written in an exact and precise way, with absolutely no errors, for a computer to understand and execute the directions. An example would be telling a computer to "reed data", ...

Number of words: 777 | Number of pages: 3

Internet, Its Effects In Our Lives And The Future Of The Internet

... was dispersed across thousands of machines. A set of rules, of protocols, known as TCP/IP was developed to allow disparate devices to work together. The original network has long since been upgraded and expanded and TCP/IP is now a "de facto" standard. Millions of people worldwide are using the Internet to share information, make new associations and communicate. Individuals and businesses, from students and journalists, to consultants, programmers and corporate giants are all harnessing the power of the Internet. For many businesses ...

Number of words: 5816 | Number of pages: 22

Year 2000: Fiction, Fantasy, And Fact

... to be a costly "fix" for the industry to absorb. In fact, Mike Elgan who is the editor of Windows Magazine, says " . . . the problem could cost businesses a total of $600 billion to remedy." (p. 1) The fallacy that mainframes were the only machines to be affected was short lived as industry realized that 60 to 80 million home and small business users doing math or accounting etc. on Windows 3.1 or older software, are just as susceptible to this "bug." Can this be repaired in time? For some, it is already too late. A system that is devised ...

Number of words: 682 | Number of pages: 3

Computers And Society

... can be used for business, education, research, and warfare. The first mechanical calculator, a system of moving beads called the abacus, was invented in Babylonia around 500 BC. The abacus provided the fastest method of calculating until 1642, when the French scientist Pascal invented a calculator made of wheels and cogs. The concept of the modern computer was first outlined in 1833 by the British mathematician Charles Babbage. His design of an analytical engine contained all of the necessary components of a modern computer: input devices, ...

Number of words: 3172 | Number of pages: 12

Speeding Up Windows 95

... meg of video memory. Most of the following tips included here are for speedy application processes while others simply rewrites or bug fixes. One advantage Windows 95 has over its competitors is the user interface feature that comes built in with the operating system. User interface is a program within Windows 95 that allows customization of certain interface settings based on personal preference. About a year ago Microsoft released a small program called TweakUI that actually adds more flexibility and functionality to the already current us ...

Number of words: 806 | Number of pages: 3

The Internet: It Was To Be The Great Equalizer

... companies. After investing $50,000 just to get a seat at the commercial Internet table a year ago, Baxter Phillip sees the Internet-induced level playing field as myth. Net commerce still slants against the little guy, says the vice president of the Chicago-area-based Phillip's 1-800-FLORALS, and he faces a steeper incline all the time. "The Internet is like a huge mall in the middle of the Sahara desert," Phillip says. "Once you get there, which is the first hurdle, all the competitors are lined up together, one next to the other. So ...

Number of words: 1033 | Number of pages: 4

Pages: 1 ... 23 24 25 26 27 28 29 30 31 32 33 next »