EssayZap  
Enter Topic  

» Get Technology Papers

Hollywood And Computer Animation

... by painstakingly cutting and gluing film segments together, are now sitting in front of computer screens. There, they edit entire features while adding sound that is not only stored digitally, but also has been created and manipulated with computers. Viewers are witnessing the results of all this in the form of stories and experiences that they never dreamed of before. Perhaps the most surprising aspect of all this, however, is that the entire digital effects and animation industry is still in its infancy. The future looks bright. How It Was ...

Number of words: 2877 | Number of pages: 11

The Necessity Of Computer Security

... to handle. Now, it is clear that computers are not only here to stay, but they have a profound effect on society as well. As John McCarthy, Professor of Computer Science at Stanford University, speculated in 1966: "The computer gives signs of becoming the contemporary counterpart of the steam engine that brought on the industrial revolution - one that is still gathering momentum and whose true nature had yet to be seen." Today's applications of computers are vast. They are used to run ordinary household appliances such as televi ...

Number of words: 1815 | Number of pages: 7

The Internet: How It Works And How It Affects The World

... of the computers was under enemy attack, the information could be automatically transferred to other links. Fortunately, the Net is not usually under enemy attack. The ARPANET was very successful, and every university in the country wanted to sign up. Because so many people wanted to use the Net, ARPANET started getting hard to manage, especially with many university sites on it. Therefore, it was broken into two parts: MILNET, which had all the military sites, and ARPANET, which had all the nonmilitary sites. "The two networks remai ...

Number of words: 1655 | Number of pages: 7

Computer Viruses

... virus, file virus, and Trojan horse virus. A boot sector virus infects the boot program used to start the system. When the infected boot program executes, the virus is loaded into the computer's memory. Once a virus is in memory, it can spread to any floppy disk inserted into the computer. A file virus inserts virus code into program files. The virus then spreads to any program that accesses the infected file. A Trojan horse virus (named after the Greek myth) hides within or is designed to look like a legitimate program. Some viruses inter ...

Number of words: 466 | Number of pages: 2

Modernization Of Air Warfare

... a success. The Advanced Tactical Fighter program was started to make an aircraft that could supercruise, the ability to cruise at supersonic speeds, and didn't cost very much. The YF-22 and YF-23 were the first planes to accomplish this. With all the planes we know of, there are also top secret programs probably going on right now. A new fighter that has never been heard of before has been spotted. As John Welch, the assistant secretary of Air Force said, "Stealth gives us back that fundamental element of war called surprise" (Goodal ...

Number of words: 1521 | Number of pages: 6

Communication Over The Internet, And The Effects It Will Have On Our Economy

... this. - When you log on to the internet chances are that you are logging on through a local internet provider. You will use your computer modem to dial up and create and data link with your net provider. Where does the net provider get his super fast net connection from? He gets the connection from the local phone company. · How logging on the internet is almost like logging right onto the local telephone company. -It all boils down to, the local phone company approving the use of the internet for any means. · How phone companies ...

Number of words: 806 | Number of pages: 3

OpenVMS: Using A Virtual Operating System By The International Securities Exchange

... us examine the origins of OpenVMS, its scalability, and reliability. This way we can get a better understanding of why the International Securities Exchange wants to implement this virtual operating system. Where and what is OpenVMS? OpenVMS was originally called VMS (Virtual Memory System); it was first brought into existence in 1976 as a new operating system for Digital's new, 32-bit, virtual memory line of computers, named VAX (Virtual Address eXtension). The designers of OpenVMS were Dave Cutler and Dick Hustvedt, it was de ...

Number of words: 961 | Number of pages: 4

The Future Of The Internet

... been the target of several lawsuits over this because when it changed it's pricing plan, so many new users came on, and so many people started staying on longer, that it's system couldn't handle the strain and would run very slow and give busy signals to almost everyone that tried to log on. As a result people started staying online because they were afraid that if they logged off, they would never get back on. This forced America Online to upgrade enormous amounts of equipment, lease new telephone lines, and issue commercials apologizing f ...

Number of words: 1054 | Number of pages: 4

Information About Viruses

... to a floppy disk when written to by the infected computer. Computers can also be infected when a disk that is infected with a virus is used to boot the computer. When this computer is infected, every one who writes a floppy disk on this computer gets their floppy disk contaminated, and risks getting this virus on their computer, which may not have good virus protection. On IBM-Compatible PCs, viruses will only infect executable programs, such as the .EXE and .COM files. On a Macintosh, any file can be contaminated. A disk can also be inf ...

Number of words: 326 | Number of pages: 2

Improving Cyberspace

... censorship. B. It is possible for America to censor the Internet. 1. All sites in America receive their address from the government. 2. The government could destroy the address for inappropriate material. 3. Existing federal laws regulate BBS's from inappropriate material. III. Censoring the Internet would establish moral standards. A. Pornography online is more harsh than any other media. ...

Number of words: 2068 | Number of pages: 8

An Insight Into Virtual Reality

... generated graphics. He built a see-through helmet that used television screens and half-silvered mirrors, so that the environment was visible through the TV displays. It was not yet designed to provide a surrounding environment. It was not until the mid '80's that virtual reality systems were becoming more defined. The AMES contract started in 1985, came up with the first glove in February 1986. The glove is made of thin Lycra and is fitted with 15 sensors that monitor finger flexion, extension, hand position and orientation. Connec ...

Number of words: 1304 | Number of pages: 5

Auditing Computer Security

... is the Audit Policy? You use the audit policy to select the types of security events that will be audited. When such an event occurs, an entry is added to the computer’s security log. The security log becomes you tool for tracking the events that you specify. On a domain controller, the audit policy determines the amount and type of security logging that window nt server performs on all domain controllers in the domain. On windows nt workstation or on member servers, the audit policy determines the amount and type of security log ...

Number of words: 1201 | Number of pages: 5

Pages: 1 ... 33 34 35 36 37 38 39 40 41 42 43 next »