EssayZap  
Enter Topic  

» Get Technology Papers

Airbags - Pop Em' Or Keep Em'

... nearly as quickly as they inflate, and Sean begins to scream. His mother is fine. The seatbelt along with the airbag saved her from any serious harm. She is still dazed as she looks over to her two year old, expecting more screaming. Nothing. Nothing happens. She shakes her little girl and realizes that something is drastically wrong. Mica is dead. At last count, this scenario has happened 31 times. How many more times does it have to happen before the automotive industry does something about it? Children are not the only victims, thou ...

Number of words: 1314 | Number of pages: 5

Robotics

... world over which they cannot keep control. The history of real robots is rarely as dramatic, but where developments in robotics may lead is beyond our imagination. Robots exist today. They are used in a relatively small number of factories located in highly industrialized countries such as the United States, Germany, and Japan. Robots are also being used for scientific research, in military programs, and as educational tools, and they are being developed to aid people who have lost the use of their limbs. These devices, however, are ...

Number of words: 1238 | Number of pages: 5

HDTV

... is a 525 line/60 field per second based system called the NTSC (National Television systems Committee) . This committee was established to insure order in the development process within the industry that would be accepted by the FCC. This standard was created in the 40's and 50's. Each receiver sold to the American public must conform to received the NTSC signal. This signal has proved to be a durable way of transmitting information for 50 years. But with today's technology, a new standard has been in the works, HDTV. In September 1992 ...

Number of words: 688 | Number of pages: 3

The Telephone System

... a receiver, that amplifies sound from an incoming call. In the transmitter there are two common kinds of transmitters: the carbon transmitter, and the electret transmitter. The carbon transmitter uses carbon granules between metal plates called, electrodes, with one consisting of a thin diaphragm that moves by pressure from sound waves and transmits them to the carbon granules. These electrodes conduct electricity flowing through the carbon. The sound waves hit the diaphragm causing the electrical resistance of the carbon to vary. The el ...

Number of words: 904 | Number of pages: 4

Protocols And Interfaces

... connection is essentially a Layer 1 (physical) connection, much like an existing landline modem connection. Except for wireless LANs, which are not discussed here, it is uncommon to use a bridge between a wireless network and a fixed-en d network. Our profiles of specific networks further below explain what specific protocols are used. But the general pattern for the wireless link is as follows. Physical layer An RF carrier signal that is digitally modulated to create a bit stream. This bit stream incorporates forward error correctio ...

Number of words: 604 | Number of pages: 3

Information Technology And Quality Customer Service

... This where the BAS or (Business Applications and Support) division enters the picture. The mission of BAS is to provide quality computer software support through a customer service oriented methodology. A while back, before ITSD, there were ASU (Automated Systems Unit) analysts who lead and coordinated automation projects. They would gather up the requests from the different SSG divisions/departments, do a preliminary analysis, write a work order stating the request and/or problem that was to be solved through automation. The work ...

Number of words: 602 | Number of pages: 3

The Future Of Computer Crime In America

... institutions are jumping to make the use of these services has put a much wider range of information at the finger tips of those, often select and few individuals whom know how to access, understand and use these information sources. Often times today this information is of a very sensitive and private nature on anything from IRS Tax returns, to Top Secret NASA payload launch information. Piled on top of that many times the individuals accessing these information sources are doing so by illegal means and are often motivated by deviant ...

Number of words: 916 | Number of pages: 4

Computers In The Workplace: Are They Used Ethically?

... in the workplace? Information technology is replacing energy as society's main resource. Many people are concerned that too much emphasis has been put on what the computer can do to streamline business and too little on how it may be affecting the quality of our lives. For example, is it distorting the meaning of thought? That is, is it absurd and dangerous to attribute the capabilities of thinking and creativity to a computer? People have experience, convictions, and cultural traditions. Are these qualities being devalued? If so, perhaps ...

Number of words: 860 | Number of pages: 4

Data Storage Devices

... term papers are modern examples of data storage that can later be retrieved using optical technology. Although it consumes physical space and requires proper care, non-acidic paper printouts can hold information for centuries. If long-term storage is not of prime concern, magnetic medium can retain tremendous amounts of data and consume less space than a single piece of paper. The magnetic technology used for computer data storage is the same technology used in the various forms of magnetic tape from audiocassette to videocassette recorde ...

Number of words: 791 | Number of pages: 3

Complete Car Stereo

... options. Vehicle owners have a solution to spending 1000 dollars on a factory installed sound system. They can use the same amount of money charged by the vehicle manufacturer for the factory-installed sound system to buy an aftermarket system that has more power, features and notably better quality sound(Battle IV). Another choice is leasing a car. The factory ships it with the stereo installed. People want to upgrade their stereo without voiding the lease contract. The only way to do this is have someone professionally install a stere ...

Number of words: 2401 | Number of pages: 9

Computer Crime

... There are those "hackers" who break their way into computers to learn the system or get information. I found out in the book Computer Crime written by Judson, Karen: That "Salami Slicers" steal small amounts of money from many bank customers this adding up to a great deal of money. I also read about phone phreaks more known as "Phreakers." They steal long distance phone services. Phreakers commit many other crimes against phone companies. In the book Computer Crime it states, most people commit thesis crimes, because they where cari ...

Number of words: 465 | Number of pages: 2

Ibm

... companies. After further acquisitions, it absorbed the International Business Machines Corporation in 1924 and assumed that company's name. Thomas Watson arrived that same year and began to build the floundering company into an industrial giant. soon became the country's largest manufacturer of time clocks and developed and marketed the first electric typewriter. In 1951 the company entered the computer field. The development of 's technology was largely funded by contracts with the U.S. government's Atomic Energy Commission; close parallel ...

Number of words: 1295 | Number of pages: 5

Pages: 1 ... 27 28 29 30 31 32 33 34 35 36 37 next »