Search Essays
ESSAYPAL:  home join now members questions contact us  
 
     categories
   American History
   Arts and Plays
   Book Reports
   Creative Writing
   Economics
   English
   Geography
   Government
   Legal
   Medicine
   Miscellaneous
   Music
   People
   Poetry
   Religion
   Science
   Society
   Technology
   World History

Essays on Technology

The Arrival Of Email
Download This PaperWords: 439 - Pages: 2

... have sometimes been used by external parties to take companies to task in court. With the digital communication methods of the Information Age, organizational managers are finding that E-mail archives and files are telling sources of information about an organization's policies and actions. In the antitrust case against Microsoft "E-mail messages dashed off years ago by the Microsoft Corp. chairman and his top lieutenants now figure prominently as digital "smoking guns" . . . Trustbusters say electronic messages, perhaps more than any paper document, could help them prove that Microsoft sought to crush competitors and monopolize access to the Internet." Howeve ...



Network Security And Firewalls
Download This PaperWords: 1777 - Pages: 7

... locks, people or physical barriers that stand in the way of a desired location or object. Computer security uses much of the same utilities. Passwords take the place of keys, security analysts take the place of guards, and firewalls take the place of physical barriers. Passwords and firewalls are the two most common ways to secure a computer system. Passwords are the most common forms of computer and network security. They are the most common because of three main reasons. First of all, passwords are cheap to implement. Virtually all computers have a password system built into it already. Every home computer can have a password to lock out certain programs ...



Media Influence
Download This PaperWords: 382 - Pages: 2

... the Serbs and the Albanian Kosovars, she is informing the war which is materialise in the desk by singing an agreement. Although there is an agreement waiting for to sign, but Yugoslav President Slobodan Milosevic resist singing it. And also she is giving the information about the position of Albanians and the NATO's attack. (Johanna Mcgeary, Standoff in Kosovo,Time weekly news magazine, March 29,1999) A person who doesn't know anything about the Kosovo events and read Johanna Mcgeary will hate from Yugoslav President Slobodan Milosevic . Most of the people who read this media item may feel hostility to the Serbs and may try to help Muslims. And also support t ...



The Year 2000 Computer Problem
Download This PaperWords: 2304 - Pages: 9

... This only allows 2 digits for the year. January 1, 2000 would be stored as 01/01/00. But the computer will interpret this as January 1, 1900- not 2000" (de Jager 1). The '19' is "hard-coded" into computer hardware and software. Since there are only 2 physical spaces for the year in this date format, after '99', the only logical choice is to reset the number to '00'. The year 2000 problem is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. "Time is running out- the Year 2000 is inevitable! The problem will occur simultaneously worldwide, time zones withstanding. It affects all languages and plat ...



Lasers And Their Uses
Download This PaperWords: 843 - Pages: 4

... are at higher energy levels than are at lower energy levels. If a photon whose frequency corresponds to the energy difference between the excited and ground states strikes an excited atom, the atom is stimulated, as it falls back to a lower energy state, to emit a second photon of the same frequency, in phase with and in the same direction as the bombarding photon. This process is called stimulated emission. The bombarding photon of the emitted photon may then strike other excited atoms, stimulating further emission of photons, all of the same frequency and phase. This process produces a sudden burst of coherent radiation as all the atoms discharge in a rapid c ...



Digital Block For A Function Generator
Download This PaperWords: 2356 - Pages: 9

... and sent out as digital signals to other parts of this function generator namely the amplifier module. Also a filter selector circuit is built in after the digital block. The user inputs controlling frequency and symmetry are also built into this control block. Therefore it is clear that the digital block can be divided into 4 distinct blocks, each with its own functionality. These blocks are the control module, counter module, filter control module and 8-bit D/A. The D/A chosen is the DAC0801LCN. It’s specifications can be found in the appendix. The layout of this design is shown below. The interconnections will be discussed later but the ...



The Evaluation Of The Microprocessor.
Download This PaperWords: 1306 - Pages: 5

... their has been a constant battle over cutting edge technology. In the 80's Motorola won the battle, but now in the 90's it looks as Intel has won the war. The microprocessor 68000 is the original microprocessor(Encarta 95). It was invented by Motorola in the early 80's. The 68000 also had two very distinct qualities like 24-bit physical addressing and a 16-bit data bus. The original Apple Macintosh ,released in 1984, had the 8-MHz found at the core of it. It was also found in the Macintosh Plus, the original Macintosh SE, the Apple Laser-Writer IISC, and the Hewlett-Packard's LaserJet printer family. The 68000 was very efficient for its time for example it ...



Telnet
Download This PaperWords: 669 - Pages: 3

... around the globe. A common program feature is the ability to emulate several diverse types of terminals-- ANSI, TTY, vt52, and more. In the early days of networking some ten to fifteen years ago, the "internet" more or less consisted of telnet, FTP (file transfer protocol), crude email programs, and news reading. Telnet made library catalogs, online services, bulletin boards, databases and other network services available to casual computer users, although not with the friendly graphic user interfaces one sees today. Each of the early internet functions could be invoked from the UNIX prompt, however, each of them used a different client program with its ow ...



Computer Viruses
Download This PaperWords: 1753 - Pages: 7

... to deny is that the nature of their actions are slowly consuming the fabric of our country’s moral and ethical trust in the information age. Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we are left feeling isolated and vulnerable. I do not feel that this defensive posture is effective because it is not pro-active. Society is still being attacked by highly skilled computer criminals of which we know very little a ...



CAD/CAM Systems
Download This PaperWords: 881 - Pages: 4

... are basically three types of CAD models. The first type is wire frame models, just a wire of zero thickness displaying the designed shape for the intended designer. The second type of model is the surface model, a series of small and large sheets connected to one another like a quilt blanket, displaying the shape the designer intended. Lastly, is the solid model. It is represented in the computer as solid shape, as if it were, for example a solid piece of steel All data concerning its shape is known by the computer software, and can be manipulated in more of an automated way rather than every surface or every wire frame requiring individual shaping (Unigraphics 1 ...




Browse: « prev  31  32  33  34  35  more »

 

home | cancel subscription | contact us

Copyright © 2024 Essay Pal. All rights reserved