Search Essays
ESSAYPAL:  home join now members questions contact us  
 
     categories
   American History
   Arts and Plays
   Book Reports
   Creative Writing
   Economics
   English
   Geography
   Government
   Legal
   Medicine
   Miscellaneous
   Music
   People
   Poetry
   Religion
   Science
   Society
   Technology
   World History

Essays on Technology

Morality And Ethics And Computers
Download This PaperWords: 1652 - Pages: 7

... that make the practice okay? According to Kenneth Goodman, director of the Forum for Bioethics and Philosophy at the University of Miami, who teaches courses in computer ethics, "There's hardly a business that's not using computers."1 This makes these questions all the more important for today's society to answer. There are also many moral and ethical problems dealing with the use of computers in the medical field. In one particular case, a technician trusted what he thought a computer was telling him, and administered a deadly dose of radiation to a hospital patient.2 In cases like these, it is difficult to decide who's fault it is. It could have been the co ...



Airbags - Pop Em' Or Keep Em'
Download This PaperWords: 1314 - Pages: 5

... year old, expecting more screaming. Nothing. Nothing happens. She shakes her little girl and realizes that something is drastically wrong. Mica is dead. At last count, this scenario has happened 31 times. How many more times does it have to happen before the automotive industry does something about it? Children are not the only victims, though. Small women and the elderly have also been killed as a result of airbags. The time has come to ask ourselves, "Do airbags really work?" First off, most people feel that airbags are a great safety device. They let people walk away from an accident without a scratch, right? They protect everybody, right? People don't ...



Hacking
Download This PaperWords: 3551 - Pages: 13

... with their pursuit of information, so are we. The thrill of the hack is not in breaking the law, it's in the pursuit and capture of knowledge. To this end, let me contribute my suggestions for guidelines to follow to ensure that not only you stay out of trouble, but you pursue your craft without damaging the computers you hack into or the companies who own them. I. Do not intentionally damage *any* system. II. Do not alter any system files other than ones needed to ensure your escape from detection and your future access (Trojan Horses, Altering Logs, and the like are all necessary to your survival for as long as possible.) III. Do ...



What Is A Robot
Download This PaperWords: 2328 - Pages: 9

... "A reprogrammable, multifunctional manipulator designed to move material, parts, tools or specialized devices, through variable programmable motions, for the performance of a variety of tasks." The key wor ds in their definition are "reprogrammable" and "multifunctional." By "reprogrammable" they mean that if a robot gets a new assignment, it will need new instructions, but its basic structure will not change (except maybe a new mechanical hand). By "multifunctional" they mean a robot is the mechanical counter part of a computer that can handle various problems without any major hardware modifications. The only thing that change ...



Battle Of Computer Bytes
Download This PaperWords: 1008 - Pages: 4

... is much better than Windows 3.x. It borrows some from the Macintosh interface and has improved on it. Some improvements are the ability to work with folder icons that represent directories and subdirectories in DOS. Windows 95, unlike the Mac, logically groups data and resources. A Taskbar menu lets you call up and switch between any software application at any time. Thus feature is better than the Mac's because its use is more obvious. It clearly shows what is running and allows you to switch programs with a single click of the mouse. Control panels have been added so you can configure your hardware. There is easy access to frequently used files. You can ma ...



How The Internet Got Started
Download This PaperWords: 887 - Pages: 4

... puzzle in deep military secrecy, and arrived at a daring solution made in 1964.The principles were simple . The network itself would be assumed to be unreliable at all times . It would be designed from the get-go to tyranscend its all times . It would be designed from the get-go to transcend its own unrreliability. All the nodes from computers in the network would be equal in status to all other nodes , each node with its own authority to originate , pass , and recieve messages. The messages would be divided into packets, each packet seperatly addressed. Each packet would begin at some specified source node , and end at some other specified destination node . Ea ...



Othello: Game Strategy
Download This PaperWords: 695 - Pages: 3

... 5 black stones, with a white stone on the end, and beside that white stone a black. You of course, would put a white stone at the end with the 5 black stones, but that is a bad mistake. Go to the side with the one black (a setup move so the computer cannot capitalize when you turn 5 black stones white, and the computer your seven whites black. Always play within your set "square". If you had on the bottom row 3 white, and on the second row 2 blacks, you would only play within that designated square, which is 3 x 3 stones. (see diagram.) This ensures that the computer can only play one stone past the square at any time, which will help you in predicting ...



The Year 2000 Problem
Download This PaperWords: 2118 - Pages: 8

... 2 digits for the year. January 1, 2000 would be stored as 01/01/00. But the computer will interpret this as January 1, 1900- not 2000” (de Jager 1). The ‘19’ is “hard-coded” into computer hardware and software. Since there are only 2 physical spaces for the year in this date format, after ‘99’, the only logical choice is to reset the number to ‘00’. is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. “Time is running out- the Year 2000 is inevitable! The problem will occur simultaneously worldwide, time zones withstanding. It affects all languages and platforms, hardware & software. The demand ...



As A Technology, It Is Called Multimedia
Download This PaperWords: 1636 - Pages: 6

... We can expect to see: movies-on-demand, video games, databases, educational programming, home shopping, telephone services, telebanking, teleconferencing, even the complex simulations of virtual reality. This souped-up television will itself be a powerful computer. This, many believe, will be the world's biggest media group, letting consumers tune into anything, anywhere, anytime. The most extraordinary thing about the multimedia boom, is that so many moguls are spending such vast sums to develop digital technologies, for the delivering of programs and services which are still largely hypothetical. So what is behind such grand prophecies? Primarily, two ...



Now Is The Time To Be Computer Literate
Download This PaperWords: 836 - Pages: 4

... the entire mall in a comfortable in front of your computer. Push a button and the entire stock of a store will be at your finger tips. When you do go to a store to shop you will not use money. You will use either a credit card or debit card which will automatically deduct the amount if you purchase from your bank account. Our homes will be run by computers. Computers will adjust the temperature. Home appliances will be linked to the computer. Imagine driving home from work and calling your computer and having it start dinner for you. Have it adjust the temperature so your home will be a comfortable temperature when you arrive. Window covering will be adjusted t ...




Browse: « prev  6  7  8  9  10  more »

 

home | cancel subscription | contact us

Copyright © 2024 Essay Pal. All rights reserved