EssayZap  
Enter Topic  

» Get Technology Papers

Radar Detector

... Co. offers drivers a solution to escape getting the ticket. This device is called the Phazer. The Phazer makes your vehicle electronically invisible to the police speed-detecting equipment. It mixes a portion of the radar signals with background clutter and bounces it back to the squad car by way of wave guide antenna, which effectively confuses the computer inside the radar gun. Police radar takes five to ten speed measurements per second of the vehicle. The Phazer sends two different signals to the radar, so the final result is that po ...

Number of words: 387 | Number of pages: 2

Power Generation In The Future What We Should Do In Australi

... but methods of storing it can be developed later. Coal The coal infrastructure is already in place so we should make use of it, but it does pollute the environment so that is why we should reduce the amount of operating plants. Doing this will reduce the amount of pollution that is released into the atmosphere. Coal power is also reliable. Solar Solar should only generate 15% because it is not a reliable power source: the sun does not shine 24 hours a day, 7 days a week in one spot. If the weather does change and the panels can’t g ...

Number of words: 319 | Number of pages: 2

You've Got Mail

... business memos. They read newspapers and magazines. They call each other on the telephone and even leave each other messages on answering machines. They watch television and movies. Through their eyes, ears, and written words, people have found ways to share and exchange ideas. With the birth of the Internet, the world has found new ways to communicate with one another. Just a few short clicks of a mouse, and people can send e-mail, talk in a chat room, and look at personal or corporate homepages. People in one country can talk to people in ...

Number of words: 395 | Number of pages: 2

Computer Protection

... of a oil company or some secret intelligence of the military department. A lot of important information can be found in the memory of computer. So, people may ask a question: Can we make sure that the information in the computer is safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer ...

Number of words: 2497 | Number of pages: 10

Computer Viruses: Past, Present And Future

... add years to your life, prudent and cost-effective anti-virus strategies can minimize your exposure to computer viruses. · A history of computer viruses · Who writes viruses - and how they can reach you · The early warning symptoms of virus infection · The real numbers behind the growth of viruses and their costs · How viruses work - and how virus protection can stop them What, Exactly, Is A Computer Virus? A computer virus is a program designed to replicate and spread, generally with the victim being oblivious to its existence. Comp ...

Number of words: 4592 | Number of pages: 17

The Recent Negative Effect Of Technology On Society

... robots into society. Battles over land brought on the need for sophisticated weapons. The agricultural system brought on a revolution. The invention of the television can bring media and other forms of entertainment into your house with video and audio combined. Before 1950, newspapers and radio were the only ways to bring media or entertainment into the house. Mass production and other job opportunities brought many people from the suburbs and farms into the city. We can now have forms of electricity directed into our houses for h ...

Number of words: 1737 | Number of pages: 7

Videoconferencing

... is enhanced, will be possible and affordable using standard telephone lines. Description The primary components of a simple system are television cameras, monitors, microphones, speakers, and a communications network. Facsimile machines, telephones, and computer-based switchers may be added to more complex systems. The communications network can be as simple as a pair of coaxial cables running between the court and the jail, or as complicated as satellite transmission and reception facilities. Unless the organizations wanting to commun ...

Number of words: 1456 | Number of pages: 6

The Internal Combustion Engine

... the valve). That is the first stroke. The second is the compression stroke. This is when the piston moves up and compresses the air/fuel mixture. The mixture is compressed from atmospheric pressure to between 70 and 125 lb/sq inch. Then the power stroke is when the spark plug releases a spark inside the cylinder igniting the compressed air/fuel mixture causing the piston to fire downward at a very high speed. And finally, the exhaust stroke. This is when the piston moves up and pushes the burnt gas through a one-way valve, which then ...

Number of words: 1509 | Number of pages: 6

Manual Labor To Industrial Automation

... there is not much as a society that can be done to solve this dilemma. Not only in the large corporation, loss of jobs to machines is also apparent in the small work place as well. One of the problems that are arises from automation is the tendency to raise average wages over time, but in reality a lowering of wages for people with obsolete skills is taking place. The image that keeps popping up is the one of the elimination of the need for human work. This bleak picture is probably never going to occur on such a drastic scale, but it has ...

Number of words: 399 | Number of pages: 2

Masters Of Deception (MoD)

... It was a commodore 64. It was the "affordable computer." It was more than what he could ever ask for. This was how Paul, a middle class boy from New York, got started with computers. Almost the same story goes for Mark, Eli, John, Julio, and Allen. These are the boys who would come to be known as the "MOD BOYS" (Masters of Deception). They were the hacker gang who dominated the hacking underworld back in the late 1980s. They all met through the phone lines. Back then there was no Internet or AOL yet people could still communicate t ...

Number of words: 1215 | Number of pages: 5

Computer Security

... of a oil company or some secret intelligence of the military department. A lot of important information can be found in the memory of computer. So, people may ask a question: Can we make sure that the information in the computer is safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer ...

Number of words: 2495 | Number of pages: 10

Satellites

... there? Today's count is 4,914. The satellites begin with a launch, which in the U.S. takes place at Cape Canaveral in Florida, NASA's Wallops Flight Center in Virginia, or, for polar orbiters, Vandenberg Air Force Base in California. One satellite in 20 is crippled by the jolt of lift-off, or dies in the inferno of a defective rocket blast, or is thrust into improper orbit. A few simply vanish into the immensity of space. When a satellite emerges from the rocket's protective shroud, radiotelemety regularly reports on its health to round-the- ...

Number of words: 482 | Number of pages: 2

Pages: 1 ... 43 44 45 46 47 48 49 50 51 52 53 next »