Search Essays
ESSAYPAL:  home join now members questions contact us  
 
     categories
   American History
   Arts and Plays
   Book Reports
   Creative Writing
   Economics
   English
   Geography
   Government
   Legal
   Medicine
   Miscellaneous
   Music
   People
   Poetry
   Religion
   Science
   Society
   Technology
   World History

Essays on Technology

The Internet Contributes To The Process Of Globalization
Download This PaperWords: 895 - Pages: 4

... hypothesizes the convergence of all the worlds institutions, thus creating emancipatory markets and an informal, non state, non economic, political zone. The increasing prominence of the Internet in the day to day lives of people across the globe and the growing reliance on information disseminated via the Internet illustrates the ability of the Internet to span the globe and in essence create a unified sense of shared memories. Furthermore it is immutable proof that the Internet is perhaps the most powerful tool of globalization It has been argued that the opening presumption that there exists a "coercive, sometimes wholly unconscious force of American imperial ...



Software And High School
Download This PaperWords: 609 - Pages: 3

... especially for beginners. Their first encounter with the computer should be exiting and fun. It should stimulate their interest in the computing field. First and foremost is the fact that computer software is a very important educational tool. Students in high schools experience computers for the first time through games and other entertaining software. These help develop youth's mental pathway in the way of logic, reflexes and the ability to make quick and concrete decisions [Lipcomb, 66]. The next step requires them to think more seriously about the machines. Secondary students learn the first steps in computer programming by creating simple programs. ...



Censorship On The Internet
Download This PaperWords: 3158 - Pages: 12

... over the computer in the early 1980's. People would pay to down load pornographic pictures and talk dirty to each other. Usenet groups took control of porn after the Internet came about. They did not charge people to down load picture and to interact with others. In result, Internet porn grew (Rosen 16). Things have changed drastically since then with over a million different sites available to access porn. Now it is not just for adults. Children are accessing the obscene materials. This brings rise to issues of how to protect them from problems that can arise. The materials they view, could influence children. They could also be subjected to cybersex in a ...



The Internet, Pornography, And Children
Download This PaperWords: 2091 - Pages: 8

... to children who are viewing the Internet, what pornography is, and laws concerning child pornography (in general and over the Internet). Additionally, the number, content, and accessibility of pornographic sites will be discussed. Lastly, this paper will discuss what measures can be taken to protect children from pornographic Internet sites. What exactly is the Internet? It is a global network of computers used to transmit all types of data between computers. Text, numbers, programs, illustrations, photographs, audio, animation, and video can all be transmitted over the Internet. Contrary to what some people may think, the Internet is not a single computer nor is ...



The Internet
Download This PaperWords: 1203 - Pages: 5

... I'm lost. Similarly, browsing the web without a very specific subject in mind (as the majority of our fellow humans do) turns this tool into a horrific waste of time. And the vast information stored here is useless, as if it wasn't there. Secondly, to get anything interesting or informative from the web, no matter what the subject, one must know its exact location, else one is compelled to dive into a muddy flood of shit. This leads me to the point of clarifying the term "information": This word usually has two meanings, a fact that contributes to misunderstandings. It can mean a piece of wanted, useful and understandable data or it can also mean any piece of ...



Will Computers Control Humans In The Future?
Download This PaperWords: 866 - Pages: 4

... people being educated by computer programs designed to educate effortlessly a person. According to the Profession story people would no longer read books to learn and improve their knowledge. People would rely on the computers rather than "try to memorize enough to match someone else who knows" (Nine Tomorrows, Profession 55). People would not chose to study, they would only want to be educated by computer tapes. Putting in knowledge would take less time than reading books and memorizing something that would take almost no time using a computer in the futuristic world that Asimov describes. Humans might began to rely on computers and allow them to control themse ...



The Modem
Download This PaperWords: 474 - Pages: 2

... and from there they rapidly developed the first modem speed was 300 baud and from there a 600 baud than 1200 and so on. The fastest modem made today is a 56k which is very fast. Not as fast as ISDN (The Wave offered through Rogers cable) or even as advanced as Satellite modem. Most people now have 14.4 or 28.8 baud modems (Baud is "Slang" for Baud Rate Per Second) the reason for the increase in 14.4 and 28.8's is that they are cheap and fairly recent and haven't gone out of date yet. There are two types of modem external and external modems internal plugs into a 16 bit port inside your computer and external connects through either a serial (mouse)port or a ...



Auditing Computer Security
Download This PaperWords: 1201 - Pages: 5

... log becomes you tool for tracking the events that you specify. On a domain controller, the audit policy determines the amount and type of security logging that window nt server performs on all domain controllers in the domain. On windows nt workstation or on member servers, the audit policy determines the amount and type of security logging performed on the individual computer. You will first plan the policy, then implement it, and finally view the results. You can set up on audit policy for a domain to: track the success and failure of events, such as when users attempt to log on, read a file, make changes to user and group permissions, change the secu ...



Internet Censorship
Download This PaperWords: 1406 - Pages: 6

... of speech on the Internet quote from the first amendment of the Constitution. In addition, many groups are in favor of restricting the Internet, similarly to how television is regulated in the United States. In favor of this regulation are groups emphasizing values and some foreign governments. In the latter, often the government does not want the citizens being introduced to new ideas, which may cause discontent and unrest in some cases. Whether the Internet should and can be censored is one debate which affects much of the modern world. Though there are strong arguments on both sides, by examining evidence it can be decided that there is no feasible way to regu ...



Ultrasonic Radar For A Home PC System
Download This PaperWords: 2068 - Pages: 8

... to have huge structures that could send out signals to find out if any aircraft were approaching. This technology is now offered to people who have a computer with microsoft's quick basic, or a Macintosh, and space (equivalent to that of a coffee-pot) to spare. Ultrasonic radar is now a small component for your computer, giving computer operators a chance to see low flying objects, household furniture, and even themselves on their PC screen. Just to impress a neighbour or friend is reason enough to build your own ultrasonic radar station. Similar to that of a Polaroid, ultrasonic transducers are used in this type of radar. A rangefinder emits a brief pulse ...




Browse: « prev  61  62  63  64  65  more »

 

home | cancel subscription | contact us

Copyright © 2024 Essay Pal. All rights reserved