EssayZap  
Enter Topic  

» Get Technology Papers

Journalism On The Internet

... online broadcasting, and other online services. The next group is resource files and web pages. The third is discussion groups/forums and e-mail. I will investigate these areas of the net, showing the advantages and disadvantages of each in comparison to the conventional forms. In order to understand what all these topics are you must first understand what the internet is. The simple answer is that it is computers all over the globe connected together by telephone wires. It was first made by the military, "No one owns the Inter ...

Number of words: 1582 | Number of pages: 6

Living In A Virtual World

... to play the game. When Michael A. put the helmet on he had a minute to orient himself in cartoonlike world .The resolution was much lover the on the monitors that showed the bystanders what was going on ,in the HMD of each player. The game started and you should shoot the other players with a gun that was fired by your joystick. Not only you should kill the other players but you should watch out for a creature that could grab you and kill you. But after ending of the game he did not get isolated from the smell and sound of the bysta ...

Number of words: 814 | Number of pages: 3

Internet Regulation: Policing Cyberspace

... computer "red light district." On June 14, 1995, by a vote of 84-16, the United States Senate passed the amendment. It is now being brought through the House of Representatives.1 The Internet is owned and operated by the government, which gives them the obligation to restrict the materials available through it. Though it appears to have sprung up overnight, the inspiration of free-spirited hackers, it in fact was born in Defense Department Cold War projects of the 1950s.2 The United States Government owns the Internet and has the responsib ...

Number of words: 1332 | Number of pages: 5

Classification Analysis

... of a computer should not be done this way. In fact, a computer can be broken down into three distinct categories, namely output, input and CPU. The term 'output' consists of all components that display words and graphics so that a person can see them. Many people can easily understand why the monitor is a form of output device since it is the screen that tells them what the computer is actually doing. Simply put, without a monitor, the computer itself is basically useless. Another form of output, which is rarely noticed by many ...

Number of words: 565 | Number of pages: 3

What Should And Shouldn't Computer Be Allowed To Run

... involving that. What would happen if the doctor made a mistake? Could you sue the computer? What about the computer programmer? One error in the program could mean death for a patient. One job that I'm sure many people would give to a computer if they had the chance would be a lawyer. This eliminates the problem that occurs when someone with money is in trouble. They buy the best lawyer money can buy, but the person without any money cannot afford the great lawyers the other guy has. With this system, one single lawyer program cou ...

Number of words: 521 | Number of pages: 2

MMX Technology

... currently available in some well rounded, mid-priced system packages that are obtainable for most home users to take advantage of. is Intel's most recent processor enhancement, but what is it? How does it work? What does it mean as far as performance improvements? is the first new chip architecture from Intel in ten years. From a technological standpoint, there are significant changes: MMX defines a set of 57 new computer instructions that extend the x86 instruction set of approximately 80; it has 32 KB of on-chip cache, verses the non-MMX ...

Number of words: 1403 | Number of pages: 6

The History Of The Internet

... is a full one at that even though it has only been around for about 30 years. It has grown to be the greatest collection of networks in the world, its origins go back to 1962. In 1962 the original idea for this great network of computers sprung forth from a question "How could U.S. authorities successfully communicate after a nuclear war?" The answer came from the Rand Corporation, America's foremost Cold War think-tank. Why not create a network of computers without one central main authoritative unit (Sterling 1) The Rand Corporat ...

Number of words: 2332 | Number of pages: 9

Will Computers Control Humans In The Future?

... computers control humans. One of the images which Asimov describes in the book is that humans might become too dependent on computers. In one of the stories, Profession, Asimov writes about people being educated by computer programs designed to educate effortlessly a person. According to the Profession story people would no longer read books to learn and improve their knowledge. People would rely on the computers rather than "try to memorize enough to match someone else who knows" (Nine Tomorrows, Profession 55). People would not chose to st ...

Number of words: 865 | Number of pages: 4

The Evolution Of Apple - January 1976 To May 1995

... "Computers aren’t for nerds anymore," they announced. "Computers are going to be the bicycle of the mind. Low cost computers for everyone." From the first day on the founders of Apple kept their vision intact, and they spoke it at every turn. They only hired people into the company that had the same visions as they did. In early 1976 Wozniak and Jobs finish work on a preassembled computer circuit board. It has no Product keyboard, case, sound or graphics. They call it the Apple I. They form the Apple Computer Company on April Fool’s D ...

Number of words: 1347 | Number of pages: 5

Freedom Of Speech & Censorship On The Internet

... last week Towson State has prevented access to all of the alt.* groups on the Usenet which include alt.binaries.pictures.* which has sexually explicit pictures. Towson State has also included a warning on their home page that there may be pornographic material on the Internet. Pornographic material is not the only material to be found on the net which can raise questions of censorship and control: discussion of racial, political, religious and sexual topics all run the risk of offending someone, somewhere, leading to demands for control of th ...

Number of words: 2293 | Number of pages: 9

Computer Software Piracy

... age, the newness and power of information technology's tests the ethics of the average person, not just the criminal and cause thousands of computer crimes to be committed daily. Problems associated with the information age include the invasion of privacy, Computer virus, Internet scamming, Junk E-mails, Minors viewing pornography, Fraud Accounts, Illegal Downloading, Hacking, Cyber chat. The most common computer crime committed daily, some aware and many not, is the illegal sharing of computer software. Software is any of the programs u ...

Number of words: 1506 | Number of pages: 6

Fiber Optics

... methods create a highly focused beam of light that is cycled on and off at very high speeds. Computers at the transmitting end convert data or voice into "bits" of information. The information is then sent through the fiber by the presence, or lack, of light. Computers on the receiving end convert the light back into data or voice, so it can be used. ORIGIN OF FIBER OPTICS Information (data and voice) is transmitted through the fiber digitally by the use of high speed LASERs (Light Amplification through th ...

Number of words: 1222 | Number of pages: 5

Pages: 1 ... 25 26 27 28 29 30 31 32 33 34 35 next »