EssayZap  
Enter Topic  

» Get Technology Papers

How To Computerize Your Accounts

... you cannot help but see the use of computers in modern society. Many fields in business such as accounting depend on the convenience, speed, accuracy, and reliability that computers have become known for. But not all companies are large enough to benefit from the use of computers. First a company must research the impact a computer will have on keeping track of its accounts. Then they must choose the correct hardware and software that's best for their needs, while at the same time making themselves familiar with the new enhancements that incre ...

Number of words: 819 | Number of pages: 3

What Is A GDSS?

... anonymous manner. Second, is the ability of the GDSS to perform as a DSS in that it allows multiple scenarios to be run with varying data inputs. Third, the GDSS records all inputs / comments so that all input is maintained for future discussion and evaluation. To achieve these three abilities, GDSS's are generally able to be divided into three basic configurations; the single-computer, software only, the single-computer and keypad response system, and the multiple computer / workstation network system (Donelan, 1993). Each with its corres ...

Number of words: 788 | Number of pages: 3

Secure Electronic Transactions

... Instead of going from store to store, you can navigate through the World Wide Web with the comfort of being at your own home. Before you buy a certain item, you can receive product information and give yourself a price comparison from many different resellers. Another feature of shopping online is transactions with other country’s. Those countries can provide you with the best exchange rate of your currency into the exchange of your merchants currency. Shopping online can be very private as long as you use a secure browser. This softw ...

Number of words: 1023 | Number of pages: 4

Computers, I Don't Like Computers. So Why Can't I Get A Job?

... he was born near the technology age he might of been more succceptable to computers and would therefore have more experience with them thus having more of a chance of getting a high paying job. However computers are getting easier to operate as we speak. William Gates said that microsoft's key role of Windows 95 was to make the operating system easier for the average person to operate. My grandma is a key example, she was born way before there was any PC's or networked offices. She remembers the big punchcard monsters that she would have to ...

Number of words: 511 | Number of pages: 2

Object Oriented Analysis

... required that a number of formal phases be completed in the process of developing a software system. This approach required a lot of documentation, as completion of each phase was accompanied by many documents. This approach had one major flaw: because of its strict sequence, nothing of substance could be demonstrated to the end user until the final stage of the waterfall cycle was completed. During the 1970’s, a new approach was developed. Tom Demarco, is his book, Structured Analysis and System Specification, introduced model-based s ...

Number of words: 666 | Number of pages: 3

Internet Security

... "net." Security is a major issue with the Internet because the general public now has access to it. When only the government and higher education had access, there was no worry about credit card numbers and other types of important data being taken. There are many advantages the Internet brings to its users, but there are also many problems with the Internet security, especially when dealing with personal security, business security, and the government involvement to protect the users. The Internet is a new, barely regulated frontier, an ...

Number of words: 1849 | Number of pages: 7

The Internet

... before the essay is due. There is no hope of getting a passing grade, right? But wait, you have a computer, a modem, and the internet! You are saved! All you have to do is log on the internet, type in a keyword about your topic, and search. Instantly, you can get tons of information about your topic. The internet links people together into a web of networks and shared software using computer terminals and telephone lines or wireless radio connections.The basic internet was formed about 4 or 5 years ago by the United States government ...

Number of words: 240 | Number of pages: 1

Computer Crime In The 1990's

... and more destructive, governments, phone companies and businesses are struggling to defend themselves. Phone Fraud In North America the telecommunications industry estimates long distance fraud costs five hundred million perhaps up to a billion every year, the exact the exact figures are hard to be sure of but in North America alone phone fraud committed by computer hackers costs three, four maybe even up to five billion dollars every year. Making an unwitting company pay for long distance calls is the most popular form of phone frau ...

Number of words: 2399 | Number of pages: 9

Technology Transfer

... The Tools of Empire by Daniel R. Headrick and excerpts from both Technology in World Civilization by A. Pacey and Major Problems in the History of American Technology, I have formed some opinions of my own primarily based on my readings about nineteenth and twentieth century . During the nineteenth century two major events stand out in connection to technology. First the progress and power of industrial technology, second the domination and exploitation of Africa and Asia by Europeans. In the book The Tools of Empire, Headrick the author ...

Number of words: 768 | Number of pages: 3

Computer In The Classroom

... those who will learn from it? How are we going to be able to hear what is produced from our programs, and how will we prevent the computers from overbearing our voices? If there is more than one computer, how shall we network them? Possibly the last and most important question is how we make it available and easy for everyone who wants to use it? Traditionally, each student sitting at a computer would have a 14" or 15" conventional monitor sitting on the desk, taking up a good 50% of the workspace. These monitors are usually greater than a ...

Number of words: 1227 | Number of pages: 5

Media Influence

... "Communications were not controlled by a narrow elite group. (J.M.Starr,1997,The impact of sociology) In the Johanna Mcgeary's article "Standoff in Kosovo' , she is not informing reel war between the Serbs and the Albanian Kosovars, she is informing the war which is materialise in the desk by singing an agreement. Although there is an agreement waiting for to sign, but Yugoslav President Slobodan Milosevic resist singing it. And also she is giving the information about the position of Albanians and the NATO's attack. (Johanna Mcgeary, ...

Number of words: 382 | Number of pages: 2

Firewalls

... a damage-limiting device. The earliest use they found that seems to correspond to a security device was by Steve Bellovin, in some email to Phil Karn, in 1987. But the context suggests that Phil knew what Steve meant, yet Steve doesn't think he invented it. What is a network firewall? A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one that exists to blo ...

Number of words: 462 | Number of pages: 2

Pages: 1 ... 35 36 37 38 39 40 41 42 43 44 45 next »