|
Papers on Technology
The Y2k Bug
Number of words: 422 | Number of pages: 2.... cause computer systems to fail when the year 2000 rolled around because computers might fail to recognize that it is the year 2000 versus 1900. The problem is going to affect the whole world.
How does affect the average person? It is possible that the electric companyies’ computers could crash, which could cause either blackouts or brownouts. It would mean no heat for your house and no way to store perishable items. It would mean that water companyies could not operate, so there would be no running water. It could mean that grocery stores would have to be closed because they could not do any financial transactions. It cou .....
Get This Essay
|
|
Computers In Business
Number of words: 1011 | Number of pages: 4.... down the road before
spending thousands of dollars on the technology of today. The best way is
to prepare for the future such as making sure your mainframe is upgradeable
and contains at least 8 expansion slots, which should already be loaded
with enhanced graphics cards, the necessary amount of serial ports etc..
Networks are everywhere in the world of business. A network is a
series of computers throughout the company which rely on one or two
fileservers. Or it can be used in long distance communication through
modem. An example would be that a company located in Calgary can call up
its other branch in Toronto via mo .....
Get This Essay
|
|
Is Your Information Safe?
Number of words: 1521 | Number of pages: 6.... messages
travel through cyberspace every day, and every piece of information stored in a
computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank
robbers have become today's computer hackers. They can walk away from a computer
crime with millions of virtual dollars (in the form of information they can use
or sell for an enormous profit). Walking away is precisely what they do. The
National Computer Crimes Squad estimates that 85-97 % of the time, theft of
information from computers is not even detected (Icove-Seger-VonStorch 1).
Home computer users are vulnerable, not only for credit card information .....
Get This Essay
|
|
Airbags - Pop Em' Or Keep Em'
Number of words: 1314 | Number of pages: 5.... as a result of airbags. The time has come to ask ourselves,
"Do airbags really work?"
First off, most people feel that airbags are a great safety device.
They let people walk away from an accident without a scratch, right? They
protect everybody, right? People don't need seatbelts if their car has an
airbag, right? Wrong. Airbags cause injuries, airbags kill, and airbags don't
work unless seatbelts are worn. In a rollover accident, people still have a
chance of being thrown from the car even if their car has airbags. Not only are
the airbags dangerous, they are also a key target for thieves. The easy to
remove airbags .....
Get This Essay
|
|
Biometric Systems
Number of words: 484 | Number of pages: 2.... to allow students
to get their meals, and in a Maryland day care center to ensure that the right
person picks up the right child. In Los Angeles, they are using fingerprints to
stop welfare fraud. And they're also being used by frequent business travellers
for rapid transit through immigration and customs in Holland, and now at JFK and
Newark airports in the United States. It could also be used to simply prevent
one employee from "punching in" for some one else, or to prevent someone from
opening up an account at a bank using a false name. Then there is also the
security access market, access to computer databases, to prem .....
Get This Essay
|
|
Airships
Number of words: 1766 | Number of pages: 7.... depends
on the pressure created by a series of air diaphragms inside its gas space to
maintain the shape of its fabric hull. Inventors sought to combine the best
features of these models in a semirigid type, but it met with only limited
success. Today only the nonrigid airship is used.
Rigid Airship
The rigid airship's structure resembled a cage that enclosed a series of
balloons called gas cells. These cells were tailored to fit the cylindrical
space and were secured in place by a netting that transmitted the lifting force
of their gas to the structure. Each gas cell had two or more valves, which
operated automatically t .....
Get This Essay
|
|
Technology And The Future Of Work
Number of words: 4372 | Number of pages: 16.... industry
and a movement to global politics, economics and world government.
In particular this paper will suggest that the Christian Judao work ethic with
society's goals of full employment in the traditional sense is no longer
appropriate, necessary or even possible in the near future, and that the
definition of work needs to be far more liberal. It argues that as a post market
era approaches, that both government and society will need to recognise the
effects of new technology on social structure and re-distribute resources, there
will need to be rapid development of policies to assist appropriate social
adjustments .....
Get This Essay
|
|
How To Maintain A Computer System
Number of words: 384 | Number of pages: 2.... that could damage internal
components.
Now you should periodically, defragment your hard disk. Defragmenting
your hard disk reorganizes files so they are in contiguous clusters and makes
disk operations faster. Defragmentation programs have been known to damage
files so make sure your disk is backed up first.
A good thing to do now would be to protect your system from computer
viruses. Computer viruses are programs designed to infect computer systems by
copying themselves into other computer files. The virus program spreads when
the infected files are used by or copied to another system. Virus programs are
dangerous b .....
Get This Essay
|
|
Uses Of Networking
Number of words: 1843 | Number of pages: 7.... Data E-Mail
Programs Bulletin boards
Storage Tele-computer-conferencing
Printer Information
Scanner Fax
Electronic diaries
Allows Allows
Fast information exchange Electronic funds transfer
Real time database’s Electronic data interchange
Distributed databases Electronic point of sale
Electronic links Business links
Some dis-advantages of networks
Insecurity Data corruption
Hacking Garbled transmission
Data theft Lost transmission
Commercial espionage
Cost Frustration
Can be expensive to install Leads to time wasting
Need to train staff to operate Anti social
-Resource sharing -Automa .....
Get This Essay
|
|
Computer Programmer
Number of words: 777 | Number of pages: 3.... A simple misspelling of one word, can make a program worthless. Errors such as these must be identified and corrected before a program can successfully accomplish its assigned task.
There are many types of jobs a can do. One is designing programs, or portions of programs. The primary job here is to analyse what the program is supposed to do, and write the code for it. Some problems need to be creatively solved. Most times, a program is so large, that you must work in teams, and divide the work. Working as a team, programs are designed with the end user in mind and are made as simple as possible.
Another job that is common, is .....
Get This Essay
|
|
|