Search Essays
ESSAYPAL:  home join now members questions contact us  
 
     categories
   American History
   Arts and Plays
   Book Reports
   Creative Writing
   Economics
   English
   Geography
   Government
   Legal
   Medicine
   Miscellaneous
   Music
   People
   Poetry
   Religion
   Science
   Society
   Technology
   World History

Essays on Technology

COMPUTER CRIME Hackers And Security Measures
Download This PaperWords: 4401 - Pages: 17

... should be made publicly available or not (centralise or decentralise government) and on issues of law enforcement. Hackers have raised serious issues about values and practices in an information society. Introduction It is true that computers and telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attract ...



Computers In Math
Download This PaperWords: 1114 - Pages: 5

... such as the one below, for several values of x. y= 6x4+4x3-5x2+6x+4 First to start with developing the power's of x to perform the necessary multiplications by the coefficients, and finally produce the sum. The following steps are the way the computer "thinks" when it is calculating the equation. 1.Select x 2.Multiply x by x and store x2 3.Multiply x2 by x and store x3 4.Multiply x3 by x and store x4 5.Multiply x by 6 and store 6x 6.Multiply stored x2 by 5 and store 5x2 7.Multiply stored x3 by 4 and store 4x3 8.Multiply stored x4 by 6 and store 6x4 9.Add 6x4 10.Add 4x3 11.Sub ...



Computer Crime 3
Download This PaperWords: 897 - Pages: 4

... and even worldwide connectivity and communication. With the introduction of the computer a new form of crime was born. These crimes referred to as computer crimes are varied and some are a lot more serious than others. Computer crime can involve criminal activities such as theft, fraud, forgery and mischief, all which are easily defined and subject to criminal sanctions. The computer has also brought along with it a host of potentially new misuses or abuses that may, or should be criminal as well. The problem with today’s computer crimes are that the criminal justice systems have not been able to keep up with the technological change. Only a few count ...



Virtual Reality
Download This PaperWords: 1543 - Pages: 6

... fantasizing. Probably none of these things are ever going to happen to you in real life. However, there is a way that you can experience the feeling that something like this is happening. If you're open to new ideas, and you have a good imagination, virtual reality may be a toy for you. What is VR? Virtual Reality grew out of flight simulation research during World War II and early computer graphics research in the 1960's. In 1965, computer scientist Ivan Sutherland published a paper describing "The Ultimate Display" and set the stage for research on the technology of Virtual Reality. Here's an excerpt from his paper: "The ultimate display ...



Computer Science
Download This PaperWords: 791 - Pages: 3

... hold information for centuries. If long-term storage is not of prime concern, magnetic medium can retain tremendous amounts of data and consume less space than a single piece of paper. The magnetic technology used for computer data storage is the same technology used in the various forms of magnetic tape from audiocassette to videocassette recorders. One of the first computer storage devices was the magnetic tape drive. Magnetic tape is a sequential data storage medium. To read data, a tape drive must wind through the spool of tape to the exact location of the desired information. To write, the tape drive encodes data sequentially on the tape. Because tape drives ...



Dell Computer Corporation
Download This PaperWords: 1036 - Pages: 4

... company designs and customizes products and service to the requirements of the organizations and individuals purchasing them, and sells an extensive selection of peripheral hardware and computing software through its DellWare program. Nearly two-thirds of Dell’s sales are to large corporations, government agencies and educational institutions. Dell also serves medium and small business and home-PC users. Dell’s award-winning customer service, industry-leading growth and financial performance continue to differentiate the company from competitors. At the heart of that performance is Dell’s unique direct-to-customer business model. “Direct” refers to the compa ...



Advances In AI
Download This PaperWords: 3659 - Pages: 14

... which may give us insight. Because these patterns of ‘intelligence’ could be linked to humanity’s evolution, much time is devoted to find what forces or factors are responsible for them. There are few who would still adhere to a model of Nature vs. Nurture rather substituting the vs. for via. Both environmental and genetic factors contribute to human intelligence, however which of these, if any, is more important in shaping intelligence is a source of fierce disagreement. It seems apparent that those who posses higher levels of intelligence are accorded a certain amount of privilege. Therefore where intelligence comes from is essential in determining the va ...



Speech Recognition Technology
Download This PaperWords: 2718 - Pages: 10

... ease of use, and decreasing price. Speech recognition is a "$50 million industry overall that will grow to $1 billion worldwide by the end of 1998" (Kolor, 3). The financial, travel, and telecommunications industries have already discovered the advantages of . Some of the larger companies that already utilize speech recognition are Charles Schwab & Co., American Express, United Airlines, NationsBank, United Parcel Service, British Airways, and Sears Roebuck and Co. These companies focus on the fastest growing parts of the speech market, where the caller's voice replaces punching in letters and numbers on the telephone keypad. The other applications of sp ...



Overview Of Video On Demand Systems
Download This PaperWords: 4294 - Pages: 16

... goal include: video content preparation, server storage, network throughput, latency, client interfaces, quality of service, and cost. This paper addresses the design considerations for a private video on demand implementation. INTRODUCTION The Initiative for Worldwide Multimedia Teleconferencing and Video Server Standards The market for multipoint multimedia teleconferencing and video server equipment is poised for explosive growth. The technology for this necessary and much- anticipated business tool has been in development for years. By the turn of the century, teleconferences that include any combination of video, audio, data, and graphics will be standard ...



Telecommunication
Download This PaperWords: 3597 - Pages: 14

... on May 24, 1844 when Samuel Morse sent the famous message "What hath God wrought" from the US Capitol in Washington D.C. across a 37 mile wire to Baltimore using the telegraph. The telegraph is basically an electromagnet connected to a battery via a switch. When the switch is down the current flows from the battery through the key, down the wire, and into the sounder at the other end of the line. By itself the telegraph could express only two states, on or off. This limitation was eliminated by the fact that it was the duration of the connection that determined the dot and dash from each other being short and long respectively. From these combinations of dot ...




Browse: « prev  34  35  36  37  38  more »

 

home | cancel subscription | contact us

Copyright © 2024 Essay Pal. All rights reserved