Search Essays
ESSAYPAL:  home join now members questions contact us  
 
     categories
   American History
   Arts and Plays
   Book Reports
   Creative Writing
   Economics
   English
   Geography
   Government
   Legal
   Medicine
   Miscellaneous
   Music
   People
   Poetry
   Religion
   Science
   Society
   Technology
   World History

Essays on Technology

What Is Virtual Reality
Download This PaperWords: 4298 - Pages: 16

... generating visual, auditory or other sensual outputs to the user of a world within the computer. This world may be a CAD model, a scientific simulation, or a view into a database. The user can interact with the world and directly manipulate objects within the world. Some worlds are animated by other processes, perhaps physical simulations, or simple animation scripts. Interaction with the virtual world, at least with near real time control of the viewpoint, in my opinion, is a critical test for a 'virtual reality'. Some people object to the term "Virtual Reality", saying it is an oxymoron. Other terms that have been used are Synthetic Environments, Cyberspace, ...



Freedom Of Speech & Censorship On The Internet
Download This PaperWords: 2293 - Pages: 9

... on their home page that there may be pornographic material on the Internet. Pornographic material is not the only material to be found on the net which can raise questions of censorship and control: discussion of racial, political, religious and sexual topics all run the risk of offending someone, somewhere, leading to demands for control of the Internet. The question of censorship may also be raised in some unexpected places: one newsgroup is the rec.humor list, which is a collection of jokes submitted to subscribers. There are straightforwardly rude jokes but others are politically incorrect, focusing on sexual stereotypes, mothers-in-law, women and so on. It h ...



Development Of The Submarine
Download This PaperWords: 1443 - Pages: 6

... capability to level entire countries. However, after a series of innovations in nuclear missile and submarine designs, the submarine-launched ballistic missile has become an integral part of our naval weapons arsenal. To understand the need for the development of nuclear missile submarines, there is a need to examine the political climate of the world in the era after World War II. The realignment of the superpowers after the war resulted in a unique situation. The two major naval powers of the day, Great Britain and the United States, were now allied against the greatest land power in history in the Soviet Union. In the period from 1955 to 1965, the advantage ...



Linux Operating System
Download This PaperWords: 998 - Pages: 4

... so they can run Linux on their computers (Windows can only run on Intel Based PCs). Because of this Linux has the potential to be more attractive to a larger number of users and a larger variety of users. (Linux.com) Linux has a powerful security system. It is almost impossible to write a virus for Linux because it must be 30-40 MB. Also, it has firewall system to protect the network from hackers. This minimizes the number of viruses capable of affecting a Linux system. If we think about it, there are many viruses for Windows that can harm your system. Linux is a stable Operating System. You can kill an individual process that is not replying with kill c ...



Superconductors
Download This PaperWords: 514 - Pages: 2

... all changed in 1986 when Karl Muller and George Bednorz were working at the IBM Research Division in Zurich, Switzerland. They found a material that reached superconductivity at around 35 degrees Kelvin or –238 degrees Celsius. In the next year, a team of Chinese-American physicists declared that they had found a material that reached superconductivity at 92 degrees Kelvin. This was a big improvement. 92 degrees Kelvin is not a very high temperature, in fact, it is the equivalent of –181 degrees Celsius. Locating superconducting material above 77 degree Kelvin is a good thing because it means that the material will be easily produced and used. A theoretical unde ...



The Bulgarian And Soviet Virus Factories
Download This PaperWords: 9220 - Pages: 34

... za vas" ("Computer for you") [KV88] in a paper, translated from the German magazine "Chip" [Chip]. Soon after that, the same Bulgarian magazine published an article [KV89]], explaining why computer viruses cannot be dangerous. The arguments presented were, in general, correct, but the author had completely missed the fact that the majority of PC users are not experienced programmers. A few months later, in the fall of the same year, two men came in the editor's office of the magazine and claimed that they have found a computer virus. Careful examination showed that it was the VIENNA virus. At that time the computer virus was a completely new idea fo ...



Internet And Censorship
Download This PaperWords: 946 - Pages: 4

... activists for censorship of the Internet mainly have one thing on their minds. They want to protect children from pornography. Although I view this as a big concern, there is a greater issue at hand. Since censorship encompasses all forms of expression, censoring the Internet would hurt many people. Since the Internet is an international community, we must view it as pertaining to other countries; not just the United States. Not all countries have the privilege of living in a democracy and under the Bill of Rights. As a result, the Internet as brought newfound freedom to most people who are oppressed by tyrannical governments, or those that disagree with gov ...



“Sin In The Global Village”: Privacy In Cyberspace
Download This PaperWords: 970 - Pages: 4

... user gets access to the private preferences and thoughts of the public. Wright suggests that people should be careful when publishing a Web page containing personal thoughts because anyone with Web-authoring software can easily trace the URL (electronic address) back to its origin. In short, people’s visions about a totally anonymous Internet are false because of the electronic trail that is left for others to find. Linda Tripp, who taped her conversations with the former White House intern Monica Lewinsky, exposed President Clinton’s recent oral sex scandal by means of surveillance. Wright is suggesting that this could happen to anyone. Computer surveillance isn’t ...



Identity Theft
Download This PaperWords: 696 - Pages: 3

... can fall victem to a ghost. Nobody is really truely safe because our personal information is distrubted like candy on halloween. We use our social security numbers as identification numbers Credit card numbers are printed on every receipt. And our liscense number is used on a daily basis. Despite this there are ways to prevent yourself from falling victem to identity theft. you see a criminal likes easy prey. They don't want to have to work for it. It's like locking your car at the mall, sure someone might break in anyway, but chance are if your doors are lock the will probably move on to another car. First off... Never give your credit card number online ou ...



Internet Regulation: Policing Cyberspace
Download This PaperWords: 1332 - Pages: 5

... and operated by the government, which gives them the obligation to restrict the materials available through it. Though it appears to have sprung up overnight, the inspiration of free-spirited hackers, it in fact was born in Defense Department Cold War projects of the 1950s.2 The United States Government owns the Internet and has the responsibility to determine who uses it and how it is used. The government must control what information is accessible from its agencies. This material is not lawfully available through the mail or over the telephone, there is no valid reason these perverts should be allowed unimpeded on the Internet. Since our initiative, the ind ...




Browse: « prev  58  59  60  61  62  more »

 

home | cancel subscription | contact us

Copyright © 2024 Essay Pal. All rights reserved