Search Essays
ESSAYPAL:  home join now members questions contact us  
 
     categories
   American History
   Arts and Plays
   Book Reports
   Creative Writing
   Economics
   English
   Geography
   Government
   Legal
   Medicine
   Miscellaneous
   Music
   People
   Poetry
   Religion
   Science
   Society
   Technology
   World History

Essays on Technology

Snowmachines: How It Started
Download This PaperWords: 877 - Pages: 4

... I thought that I new basicly what I would find in my project and so it was off to my first opservation. Finding Out What It Is About In the first observation I was with some friends who were going back and forth about whose machine was the best when right then I thought to my self that both of those machines were very good. Then I discoved what I should focuse on in project it was the loaltiy to a brand I thought that this is true for so many different things such as cars skiies and just about any thing eles. After the first observation the reat were very clear to how it was going to be and then I did a interview. This is how it went. Finding Out More What ...



Telecomuting And Us
Download This PaperWords: 1088 - Pages: 4

... desire to attempt working in the home, for some reason or another, many factors should be considered. What kind of schedule does the employee feel constitutes telecommuting? Generally speaking, telecommuting is defined as spending at least one day out of a five day work week working in the home. Is one day home enough for the employee? Or, too little? How does the employer decide how many days to allow? Does the employee's job lend itself well to telecommuting? Some jobs, obviously, can't be accomplished using a telecommuting format. Does the employee have a good track record for working unsupervised? This relates back to readiness levels. An employee who isn't ...



Computer System Analysts
Download This PaperWords: 1669 - Pages: 7

... interrelations are evaluated and programmed, with the aid of mathematics, into a compete and Integrated system." While it is true that today's high-technology world demands the competitive organization employs computer systems analysts in order to integrate their information, management, accounting, manufacturing and distribution sales systems. This analysis will describe the typical responsibilities of the computer systems analyst, including the job market and outlook for the career that may be one of the most misunderstood occupations in modern times. The computer systems analysts is often misunderstood because they speak a techno-language that sounds more G ...



Ethernet
Download This PaperWords: 836 - Pages: 4

... and Electronics Engineers') Project 802 then used Ethernet Version 2 as the basis for the 802.3 CSMA/CD network standard. The IEEE 802.3 standard is generally interchangeable with Ethernet II, with the greatest difference being the construction of the network packet header. This method consists of multiple workstation that accesses a transmission medium called Multiple Access. Here the medium listen until no signals are detected. This is known as Carrier Sense. After checking to see if more than one signal is present they transmit. This is called Collision Detection. When a collision occurs the station then has to retransmit. The most important part of CSMA/C ...



History Of The Internet
Download This PaperWords: 279 - Pages: 2

... to Internetwork. Resons of security made Internetwork anarchistic.It wasen`t supose to be any cental computer wich controlled Internetwork and the computertrafic was supose to direct it self so if a thought road suddenly wasen`t accessible the trafic should find a new way by it self. Because of this the enemy couldent in war strike out Intenetwork by bombing individual servers and main computers. In the end of the 1970`s was almost all american Universities and majority connected to it so called protocol TCP/IP wich to day is the main glue in Internet. In 1985 Internet had grovn to the wolds gratest network and more and more organisation o ...



Computers In Business
Download This PaperWords: 1011 - Pages: 4

... A one to three gigabyte hard drive would be most common for businesses. To keep these applications on the computer, you need a fair amount of RAM memory as well as hard disk space. An application developed in 1993, probably will be to powerful and run quite slow on a previous system that was 'top of the line' in 1991. That's why it is important for companies to understand that they must think years down the road before spending thousands of dollars on the technology of today. The best way is to prepare for the future such as making sure your mainframe is upgradeable and contains at least 8 expansion slots, which should already be loaded with enhanced graphics car ...



Is Your Information Safe?
Download This PaperWords: 1521 - Pages: 6

... of credit card numbers, bank statements and other financial and personal information transmitted over the Internet. It's hard to imagine that anyone in today's technologically oriented world could function without computers. Personal computers are linked to business computers and financial networks, and all are linked together via the Internet or other networks. More than a hundred million electronic messages travel through cyberspace every day, and every piece of information stored in a computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank robbers have become today's computer hackers. They can walk away from a computer crime with million ...



Knowledge Is Power: How To Buy A Computer
Download This PaperWords: 1563 - Pages: 6

... put himself at the mercy of some salesman who may not know much more than he does. If one would follow a few basic guidelines, he could be assured of making a wise purchase decision. A computer has only one purpose; to run programs. Some programs require more computing power than others. In order to figure out how powerful a computer the consumer needs, therefore, a person must first determine which programs he wants to run. For many buyers, this creates a problem. They cannot buy a computer until they know what they want to do with it, but they cannot really know all of the uses there are for a computer until they own one. This problem is not as tough as it see ...



As A Technology, It Is Called Multimedia
Download This PaperWords: 1635 - Pages: 6

... We can expect to see: movies-on-demand, video games, databases, educational programming, home shopping, telephone services, telebanking, teleconferencing, even the complex simulations of virtual reality. This souped-up television will itself be a powerful computer. This, many believe, will be the world's biggest media group, letting consumers tune into anything, anywhere, anytime. The most extraordinary thing about the multimedia boom, is that so many moguls are spending such vast sums to develop digital technologies, for the delivering of programs and services which are still largely hypothetical. So what is behind such grand prophecies? Primarily, two technologi ...



Computer Security
Download This PaperWords: 2026 - Pages: 8

... the information in the computer is safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers ...




Browse: « prev  21  22  23  24  25  more »

 

home | cancel subscription | contact us

Copyright © 2024 Essay Pal. All rights reserved