Search Essays
ESSAYPAL:  home join now members questions contact us  
 
     categories
   American History
   Arts and Plays
   Book Reports
   Creative Writing
   Economics
   English
   Geography
   Government
   Legal
   Medicine
   Miscellaneous
   Music
   People
   Poetry
   Religion
   Science
   Society
   Technology
   World History

Essays on Technology

Osi Model
Download This PaperWords: 583 - Pages: 3

... be divided into layers, with each layer adding its own set of special, related functions. Each user is at a computer equipped with these seven layers of function. So, in a given message between users, there will be a flow of data through each layer at one end down through the layers in that computer and, at the other end, when the message arrives, another flow of data up through the layers in the receiving computer. The actual programming and hardware that makes these seven layers of function is usually a combination of the computer OS, applications, TCP/IP and the software and hardware that enable you to put a signal on one of the lines attached to your computer. O ...



Computer - Hacking
Download This PaperWords: 471 - Pages: 2

... Often they do not know what kind of problems they will have to face. An example for this would be a little boy of twelve years of age, who managed to enter into the database of an important stock exchange computer. His parents will probably be fined, also if this boy did not do any real harm. As I already mentioned, hackers are in most cases only interested in the so called “cracking” of passwords without wanting to destroy anything. There is definitely also a great competition under the top-hackers of the world. Hackers often gain entrance because of a lack of security. This brings me to my second point which deals with passwords. Very often Passwords are writt ...



Netspeak: An Analysis Of Internet Jargon
Download This PaperWords: 1716 - Pages: 7

... the shuffle. "Netspeak" is evolving on a national and international level. The technological vocabulary once used only by computer programmers and elite computer manipulators called "Hackers," has spread to all users of computer networks. The language is currently spoken by people on the Internet, and is rapidly spilling over into advertising and business. The words "online," "network," and "surf the net" are occuring more and more frequently in our newspapers and on television. If you're like most Americans, you're feeling bombarded by Netspeak. Television advertisers, newspapers, and international businesses have jumped on the "Information Superhighway" bandwago ...



Victims In Progress Of Technology
Download This PaperWords: 301 - Pages: 2

... by technology, Bodley demonstrates the negative backlash that unregulated science can have. Industrialization societies are portrayed as being able to support all of their citizens and more, when in fact, nothing could be further from the truth. The reason that societies aid "undeveloped" countries is to gain access to their resources. Technological cultures are ones of mass consumption. As we have learned over the past few decades, are resources are limited and must be conserved properly. Tribal societies are a shining example of how to manage these resources, because they only use and eat what they need without wasting valuable resources. To demons ...



Computer Piracy
Download This PaperWords: 1959 - Pages: 8

... do not know what computer/software piracy is nor do they understand it if they do. The Software Publisher’s Association defines computer/software piracy as “the unauthorized use or illegal copying of a software product. It occurs in a number of forms, from the sharing of floppy disks to mismanagement of network software licenses and the production of counterfeit CD-ROMs, including “compilation CDs” that can contain thousands of dollars worth of products.” There are many ways that an individual can commit computer/software piracy. There are six different methods that you can pirate software. The first method of software piracy is called End User Copying. This is th ...



Investigative Report Of Internet Addiction
Download This PaperWords: 3525 - Pages: 13

... ..........................................................8 One Last Interesting Question .......................................9 REFERENCES ..........................................................10 LIST OF ILLUSTRATIONS Figures 1. The number of networks connected to the Internet vs. Time. 2. The percentage of the Internet domains 3. Will the equation people = Internet Users be true in 2001? ABSTRACT The problem of Internet addiction is not very noticeable now and that's why not many people are taking it seriously, but what these people are failing to see is the connection between the very rapid growth of the Internet and the addiction problem. It is r ...



AIBO And Robotics
Download This PaperWords: 432 - Pages: 2

... are not fully automatic because a human is remotely controlling them using a TV or any other device to get feedback from the robot. Some other devices used to send feedback are radio signals, sonar, optical fiber, and sensors. Powerful computers with Artificial Intelligence programs control robots that are fully automatic. Robots are taught to perform repetitive tasks. Intelligent robots incorporate the other disciplines of Artificial Intelligence like, human sensory simulation for touch, sight, and hearing. Our future will definitely have a place for robots. Some radicals believe that robots will eventually take over our planet. “Fifty years, tops, unti ...



History Of Telecommunications
Download This PaperWords: 2827 - Pages: 11

... far as 490 BC. At this time there was no electricity, or any type of technology but there was a form of telecommunication. This for is called the Drum Telegraph. The drum telegraph was developed as a means of telecommunication. The natives of Africa introduced drum telegraphy. This roaring of drums is how messages were spread for far distances. In similar state, the old China used a sort of drum telegraph which was that of the "Tamtam". This was a big, free hanging, circular metal plate. The keystroking, as it is called, of this plate would create a far-reaching audible tone. This is the drum telegraph and the start of telecommunication. Fire Signaling ...



Radio - Making Waves In America
Download This PaperWords: 1502 - Pages: 6

... instrumental to AmericaÕs move into the Information Age. The invention of radio is commonly credited to Guglielmo Marconi, who, starting in 1895, developed the first ÒwirelessÓ radio transmitter and receiver. Working at home with no support from his father, but plenty from his mother, Marconi improved upon the experiments and equipment of Hertz and others working on radio transmission. He created a better radio wave detector or cohere and connected it to an early type of antenna. With the help of his brothers and some of the neighborhood boys he was able to send wireless telegraph messages over short distances. By 1899 he had established a wireless communications ...



Computer Crimes
Download This PaperWords: 1512 - Pages: 6

... hackers and then used again, when the hacker calls up the number and gets on he's presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are doing", I have a hard time belie ...




Browse: « prev  47  48  49  50  51  more »

 

home | cancel subscription | contact us

Copyright © 2024 Essay Pal. All rights reserved