EssayZap  
Enter Topic  

» Get Technology Papers

Reality - What It Is And How It Works

... Jaron Lanier first coined the phrase "virtual reality" around 1989, and it has stuck ever since. Unfortunately, this catchy name has caused people to dream up incredible uses for this technology including using it as a sort of drug. This became evident when, among other people, Timothy Leary became interested in VR. This has also worried some of the researchers who are trying to create very real applications for medical, space, physical, chemical, and entertainment uses among other things. In order to create this alternate reality, however, ...

Number of words: 3113 | Number of pages: 12

Identity Theft

... crime as well as cyber criminals.With so many new users signing on everyday the cyber world has become a tourast trap so to speak where nameless faceless conartists work the crowds. Ghosts.Anybody can fall victem to a ghost. Nobody is really truely safe because our personal information is distrubted like candy on halloween. We use our social security numbers as identification numbers Credit card numbers are printed on every receipt. And our liscense number is used on a daily basis. Despite this there are ways to prevent yourself from fa ...

Number of words: 696 | Number of pages: 3

The Central Processing Unit

... team of scientists at Bell Laboratories in New Jersey. Ever since 1947 transistors have shrunk dramitically in size enabling more and more to be placed on each single chip. The transistor was not the only thing that had to be developed before a true CPU could be produced. There also had to be some type of surface to assemble the transistors together on. The first chip made of semiconducitve material or silicon was invented in 1958 by Jack Kilby of Texas Instruments. Now we have the major elements needed to produce a CPU. In 1965 a compan ...

Number of words: 516 | Number of pages: 2

Computers And The Disabled

... for their every need. Windows 95 has made many interesting developments toward making life easier for the nearly blind and for the deaf, including on screen text to synthesize speech or Braille, and adaptive hardware that transforms a computers audible cues into a visual format. Computers have given the limited back their freedom to be an active part of the human race. According to the Americans with Disabilities Acts, any office that has a staff of more than fifteen people now has to provide adaptive hardware and software on their comp ...

Number of words: 824 | Number of pages: 3

Review Of On-line Publications

... radio and print journalism but also establish them as the only medium that is using interactive reporting. Representing the continent of Asia and the city of Hong Kong is the South China Morning Post. It is one of only a few English language news papers in the republic. The post has an air of journalistic freedom the other news papers do not seem to have. One of the lead articles outlined this concern and dispelled the rumor that China would censor the paper when the city is turned over in July. The Morning Post is a very up to date pap ...

Number of words: 955 | Number of pages: 4

Laws Must Be Passed To Address The Increase In The Number And Types Of Computer Crimes

... gender is the only bias. The profile of today's non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be "between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willin ...

Number of words: 1340 | Number of pages: 5

Cryptography

... turn back the encrypted message into its original form and read it. If the message is intercepted on the way by a third party, they will only have unreadable data and will have gained nothing, unless they can figure out the decryption algorithm and obtain the key. This is why the key is never to be sent with the message, and has to be kept secret at all cost. If the key is compromised, the sender and the encrypted data is no longer safe. The sender and the receiver then usually agree on a new key to prevent any further damage. In ancient Gre ...

Number of words: 3143 | Number of pages: 12

Internet Applications In Business

... have come is storing a customer’s shipping information. The result was $67 Million in sales last year. That doesn’t come close to an Internet only retailer like Amazon.com, but it is a phenomenal success for Depot’s first year in the Internet market. Increased sales revenue is not the only benefit that this marketing plan has reaped. A new level of efficiency has also been reached. The leading benefit that has created such efficiency is the number of customer orders that Depot does not have to: 1. Take up more of a salesperson†...

Number of words: 540 | Number of pages: 2

The Inter(esting)net

... to design a computer networking system that could withstand an attack such as a nuclear war. In the 1980's, the National Science Foundation built five Superconductor Computer Centers to give several universities academic access to high powered computers formerly available to only the United State's military (Krol). The National Science Foundation then built its own network chaining more universities together. Later, the network connections were being used for purposes unrelated to the National Science Foundation's idea such as the univ ...

Number of words: 966 | Number of pages: 4

Battle Of The Bytes: Macintosh Vs. Windows 95

... much harder. Windows 3.x have been great improvements over the earlier versions of Windows, and of course over DOS, but it still didn't compete against the ease of use on a Mac. The Windows 95 interface is much better than Windows 3.x. It borrows some from the Macintosh interface and has improved on it. Some improvements are the ability to work with folder icons that represent directories and subdirectories in DOS. Windows 95, unlike the Mac, logically groups data and resources. A Taskbar menu lets you call up and switch between any s ...

Number of words: 1131 | Number of pages: 5

History Of Telecommunications

... Or Integrated Services Digital Network. I will further explain these and more through out this report. Chapter 2 History of Telecommunication The history of telecommunication dates back as far as 490 BC. At this time there was no electricity, or any type of technology but there was a form of telecommunication. This for is called the Drum Telegraph. The drum telegraph was developed as a means of telecommunication. The natives of Africa introduced drum telegraphy. This roaring of drums is how messages were spread for far distance ...

Number of words: 2827 | Number of pages: 11

The Arrival Of Email

... BusinessWeek, June 8, 1998, pp. 72-74) In the past it was handwritten memos, file documents, letters and tape recorded conversations-for example President Nixon's Watergate related tapes-that have sometimes been used by external parties to take companies to task in court. With the digital communication methods of the Information Age, organizational managers are finding that E-mail archives and files are telling sources of information about an organization's policies and actions. In the antitrust case against Microsoft "E-mail mes ...

Number of words: 439 | Number of pages: 2

Pages: 1 ... 42 43 44 45 46 47 48 49 50 51 52 next »