EssayZap  
Enter Topic  

» Get Technology Papers

Knowledge Is Power: How To Buy A Computer

... the best processor to buy, the right size for a hard drive, or how much memory he or she really needs. Just because buying a computer can be confusing does not mean one should throw up his hands and put himself at the mercy of some salesman who may not know much more than he does. If one would follow a few basic guidelines, he could be assured of making a wise purchase decision. A computer has only one purpose; to run programs. Some programs require more computing power than others. In order to figure out how powerful a computer the consumer ...

Number of words: 1563 | Number of pages: 6

Internet

... have the finances. Then by the time they save sufficient money, they again had forgotten too much. I believe I have found the answer. On the Internet your students will be able to find literally thousands of links to help them with their future enterprises. In almost every city all across North America, no matter where these students move to, they are able to link up and find everything they need. They can find links like "Creative Ideas", a place they can go and retrieve ideas, innovations, inventions, patents and licensing. Once they com ...

Number of words: 594 | Number of pages: 3

An Insight Into Virtual Reality

... generated graphics. He built a see-through helmet that used television screens and half-silvered mirrors, so that the environment was visible through the TV displays. It was not yet designed to provide a surrounding environment. It was not until the mid '80's that virtual reality systems were becoming more defined. The AMES contract started in 1985, came up with the first glove in February 1986. The glove is made of thin Lycra and is fitted with 15 sensors that monitor finger flexion, extension, hand position and orientation. Connecte ...

Number of words: 1218 | Number of pages: 5

Business And The Internet

... is a computer application that connects tens of thousands of interconnected computer networks that include 1.7 million host computers around the world. The basis of connecting all these computers together is by the use of ordinary telephone wires. Users are then directly joined to other computer users at there own will for a small connection fee per month. The connection conveniently includes unlimited access to over a million web sites twenty-four hours a day, seven days a week. Since the Internet can be accessed by millions of people ...

Number of words: 1077 | Number of pages: 4

Victims In Progress Of Technology

... Victims in Progress, relates how technological societies are in fact destroying, rather than advancing our world. Using tribal civilizations who had survived thousands of years only to be wiped out by technology, Bodley demonstrates the negative backlash that unregulated science can have. Industrialization societies are portrayed as being able to support all of their citizens and more, when in fact, nothing could be further from the truth. The reason that societies aid "undeveloped" countries is to gain access to their resources. ...

Number of words: 301 | Number of pages: 2

Computer Integrated Manufacturing

... computing techniques now permit analysis and solution of problems never before possible. What is Computer-Integrated Manufacturing? Utilizing the computer to integrate the fragmented operations of manufacturing into a single, smoothly operating, manufacturing system with reduced total manufacturing costs and turnaround times, and improved quality is generally termed Computer-Integrated Manufacturing (CIM). Another definition that is more precise might be the utilization of computers to control the integration and flow of information bet ...

Number of words: 1569 | Number of pages: 6

Maglev Consequences

... As populations have grown the traditional systems have become stressed. Congestion on highways and at airports not only wastes time and fuel and increases pollution, but constrains mobility to the extent that economic growth and productivity are adversely affected. Increased demand. Between 1980 and 1990, with deregulation and consumer demand for fast inner-city travel leading to lower airline fares, commercial air traffic has increased by 56 percent. Adding to the congestion and delay is increased commuter and regional air traffic. Those s ...

Number of words: 689 | Number of pages: 3

Technology

... factories have begun to use "smart-technology" and "artificial- intelligence" to replace thousands of workers worldwide. Robot machines that produce a better product in a shorter span of time. Is the world on the brink of yet another industrial revolution? Where shall this advance take us? Into a global system of social relation and peace--where people from all over the world can intertwine within a perfect Utopia? Or will it cause pain and suffering due to a worldwide depression? A scale that would be twenty-times the size of the Gr ...

Number of words: 799 | Number of pages: 3

Electronic Monitoring Vs. Health Concerns

... searching through the files on their hard drive (Paranoid 435). A poll by MacWorld states that over twenty-one percent of all employees are monitored at work, and the larger the company, the higher the percentage (Privacy 445). Unaware of this electronic monitoring, most employees often are not working at their peak performance due to this type of scrutiny. The majority of Americans believe that electronic monitoring should not be allowed. Supreme Court Justice Louis D. Brandeis states that of all of the freedoms that Americans enjoy, pr ...

Number of words: 608 | Number of pages: 3

Computer Viruses

... most common classification relates to the sort of executable code which the virus attaches itself to. These are: ¨ Partition Viruses ¨ Boot Viruses ¨ File Viruses ¨ Overwriting Viruses As well as replicating, a virus may carry a Damage routine. There is also a set of programs that are related to viruses by virtue of their intentions, appearances, or users likely reactions. For example: ¨ Droppers ¨ Failed viruses ¨ Packagers ¨ Trojans ¨ Jokes ¨ Test files THE DAMAGE ROUTINE Damage is defined as something that you wou ...

Number of words: 1615 | Number of pages: 6

The Growth Of The Internet

... with the DOD (Department of Defense) in 1996. After the Cold War the Government wanted a reliable line of communication. If a network link became damaged by enemy attack, the information on it could be rerouted automatically to other links. This was the birth of the Internet. In order to use anything on the Internet, it is required that you learn to operate a separate program, one for the mail, one for news groups, and several different programs for accessing databases. This all changed in 1989. A researcher at CERN (a big European physic ...

Number of words: 555 | Number of pages: 3

Hacking To Peaces

... because many do it out of curiosity. Hackers seek to fulfill an emptiness left by an inadequate education. Do hackers have the right to explore wherever he or she wants on the Internet (with or without permission), or is it the right of the general population to be safe from their trespasses? To tackle this question, people have to know what a hacker is. The connotation of the word 'hacker' is a person that does mischief to computer systems, like computer viruses and cybercrimes. "There is no single widely-used definition of computer-re ...

Number of words: 1293 | Number of pages: 5

Pages: 1 ... 24 25 26 27 28 29 30 31 32 33 34 next »