Search Essays
ESSAYPAL:  home join now members questions contact us  
 
     categories
   American History
   Arts and Plays
   Book Reports
   Creative Writing
   Economics
   English
   Geography
   Government
   Legal
   Medicine
   Miscellaneous
   Music
   People
   Poetry
   Religion
   Science
   Society
   Technology
   World History

Essays on Technology

A Look Into The Computer Virus
Download This PaperWords: 720 - Pages: 3

... will be executed when the file is loaded into memory, allowing them to infect still other files, and so on. Viruses often have damaging side effects, sometimes intentionally, sometimes not. (Microsoft Encarta 1996) Most viruses are created out of curiosity. Viruses have always been viewed as a well written, creative product of software engineering. I admit there are many out there who create them out of malice, but far more people are just meeting a challenge in software design. The people who make anti-virus software have much more to benefit from the creation of new virii. This is not a slam, just an observation. A common type of virus would be a Trojan Hor ...



The Year 2000 Problem
Download This PaperWords: 852 - Pages: 4

... example, subtracting 06/30/98 from 06/30/00 in an amortization formula would yield negative 98 years, instead of two years. The negative answer would cause an incorrect calculation or even program failure. Typically, in scenarios of this nature, computers do one of two things: freeze up and/or shut down. Date computation functions are used on millions of software applications, thus affecting millions of computers world-wide. It not only affects calculations for interest rates, inventories, or insurance policies, but every major aspect of our modern economic infrastructure. Government agencies, businesses, and financial institutions use software applications that ...



Internet Censorship
Download This PaperWords: 1990 - Pages: 8

... that are meant for other types of communication will not necessarily apply in this medium. There are no physical locations where communications take place, making it difficult to determine where violations of the law should be prosecuted. There is anonymity on the Internet and so ages and identities are not known this makes it hard to determine if illegal activities are taking place in regards to people under the legal age. As well, it is difficult to completely delete speech once it has been posted, Meaning that distributing materials that are obscene are banned becomes easy The American Library Association (ALA) has a definition that states censorship is “ ...



Organic Molecules Challenge
Download This PaperWords: 2520 - Pages: 10

... few successes to date lead them to believe they were on the right track. "We have a long way to go before carbon-based electronics replace silicon-based electronics, but we can see now that we hope to revolutionize computer design and performance," said Robert R. Birge, a professor of chemistry, Carnegie- Mellon University, Pittsburgh. "Now it's only a matter of time, hard work, and some luck before molecular electronics start having a noticeable impact." Molecular electronics is so named because it uses molecules to act as the "wires" and "switches" of computer chips. Wires, may someday be replaced by polymers that conduct electricity, such as polyacetylene ...



Internet Censorship And The Communications Decency Act
Download This PaperWords: 676 - Pages: 3

... is or how it works, laws like these wouldn't work, and there are many alternatives to government enforced laws to protect children that would be much less invasive. The bills for laws aimed at regulating the Internet for the sake of child safety are, in my opinion, extremely vague and broadsided. They give absolutely no definition of what should be considered "obscene" or "harmful to minors." Definitions annexed on to them are extremely broadsided and could not only ban pornography but also things like information on AIDS and other sexually transmitted diseases, birth control, breast cancer, certain forms of artwork, and many other things that should never b ...



Viruses
Download This PaperWords: 3001 - Pages: 11

... then used again, when the hacker calls up the number and gets on he's presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are doing", I have a hard time believing that ...



Computer Crime: The Crime Of The Future
Download This PaperWords: 1120 - Pages: 5

... man. He is 31 and pending trial for computer fraud. When he was a teenager, he used his knowledge of computers to break into the North American Defense Command computer. Had he not been stopped, he could have caused some real national defense problems for the United States (Sussman 66). Other "small time" hackers affect people just as much by stealing or giving away copyrighted software, which causes the prices of software to increase, thus increasing the price the public must pay for the programs. Companies reason that if they have a program that can be copied onto a disc then they will lose a certain amount of their profit. People will copy it and give t ...



Computer Crimes
Download This PaperWords: 1157 - Pages: 5

... who say they’re doing the world a favor by pointing out security loopholes, have a slew of ways to break the law (White 67:c11). Computer crime becomes a larger and more prevalent issue as there is more value to criminally gain and the stakes raise in the hacker’s ego game. Only seventy five computer crime prosecutions were reported in the United States in 1986, according to the National Center for Computer Crime Data in Santa Cruz, Calif. By 1989, that number jumped to 500 prosecutions. that year cost businesses and banks - and, ultimately, consumers - about $500 million. "As the use of computers has increased, so has their criminal misuse" (Bowers 54:g13) ...



The Year 2000 Bug
Download This PaperWords: 1942 - Pages: 8

... banking systems. For example you have a credit card that you just got and it expires 05/02, the bank will think 05/02 means 05/1902, It is way overdue to be terminated and bam! There goes your credit card. This bug also affects other things in the city. For example, if a train is running on a track and the power cuts out, then the gates wont go down and people will be in a lot of trouble. (Also, what happens if the power goes out in a hospital? (Also see “WHAT IS Y2K” later on) Food is one essential thing that is crucial to survival and many people think that we may need lots of canned and dry goods. As in any crisis situation, some believe that the worst will hap ...



F117 Nighthawk Stealth Fighter
Download This PaperWords: 848 - Pages: 4

... 4˛ and the area of one wing is 1,140 ft. squared The speed of the Nighthawk is in the high subsonic range because the cruise speed is from Mach .8 to Mach .9 and the maximum speed is Mach 1 at 36,000 ft. The range of the Nighthawk is unlimited with air refueling from another plane. The engines of the Nighthawk are two 12,500lb. General Electric F404-F1D2 non-afterburning turbofan engines with 10,600 lbs. of thrust. The Nighthawk’s armament is a non-fixed internal weapons carriage and the primary weapons on the Nighthawk are the paveway series GBU-10 and GBU-27 laser guided bombs. There is usually one person to fly the Nighthawk and the cost to build each Ni ...




Browse: « prev  56  57  58  59  60  more »

 

home | cancel subscription | contact us

Copyright © 2024 Essay Pal. All rights reserved