|
Papers on Technology
You've Got Mail
Number of words: 395 | Number of pages: 2.... in real time, through video conferencing. What people need to communicate is no longer limited by the size of the paper, length of the tape, or cost of the call.
As with all forms of communication, people are always concerned with how secure things are. With traditional forms of communication, even with the highest level of security, things are easily stolen - letters and memos can be easily copied; audio and video recordings can be quickly recorded; hard copies of any kind can be easily destroyed. As for the technology-based forms of communication, things are a lot more secure through the use of encryption technology. However, .....
Get This Essay
|
|
Computer Piracy
Number of words: 1959 | Number of pages: 8.... CDs” that can contain thousands of dollars worth of products.” There are many ways that an individual can commit computer/software piracy. There are six different methods that you can pirate software. The first method of software piracy is called End User Copying. This is the most common method of software/. In order to do this, the individual who purcahsed the software at the local retail/department store must share this product with a neighbour, co-worker, or colleague. An example of this type of piracy is the following: Joe went to his local computer store bought Norton Anti-Virus, installed it on his computer, told hi .....
Get This Essay
|
|
Robotics
Number of words: 1238 | Number of pages: 5.... or humanlike robots, and other
robots of fiction. They rarely take human form, they perform only a limited
number of set tasks, and they do not have minds of their own. In fact, it is
often hard to distinguish between devices called robots and other modern
automated systems.
Although the term robot did not come into use until the 20th century,
the idea of mechanical beings is much older. Ancient myths and tales talked
about walking statues and other marvels in human and animal form. Such objects
were products of the imagination and nothing more, but some of the mechanized
figures also mentioned in early writings could well .....
Get This Essay
|
|
Windows 95
Number of words: 569 | Number of pages: 3.... tolerance for file names in
plain English" (29-30). Traditionally, users had to think of file names that
summed up their work in eight letters or less. This was a constant problem
because frequently a user would look at a list of files to retrieve and think
"now what did I save that as?". Those days are over. Windows 95 will let the
user save his or her work with names like "New Speech" or "Inventory Spreadsheet
No. 1", making the contents of those files obvious. Much to the annoyance of
software developers, Windows 95 incorporates many features that previously
required add-on software. One such feature is the Briefcase- a progr .....
Get This Essay
|
|
The Internal Combustion Engine
Number of words: 1509 | Number of pages: 6.... exhaust manifold and exhaust tubes and the leads out of the car. At 2200 RPM the entire four-stroke cycle is completed 18 times per second in each cylinder. The term V8 L6 and V6 refer to the number and configuration of engines cylinders. While the V8 is more popular for hot-rodding and for fast sports cars. The in-line six is common found in older cars that weren't that powerful. Inline fours and V6's are usually used in newer cars (V8, V10 and V12 are also used in newer cars, but they are meant for more power and for speed). Flat fours are found mostly in Volkswagen Beatles. Flat sixes are found mostly in Porsches and C .....
Get This Essay
|
|
Napster Vs Riaa
Number of words: 782 | Number of pages: 3.... the platform, not the actions, and that as the blurb states it’s up to the people. Napster is not at fault because the RIAA has overstepped their boundaries and infringed on first amendment rights online.
Should the owner of the gun shop be charged with murder if a man he sold a gun to decides to shoot another man in cold blood? Of course not, if the shop owner followed all of the laws that govern him. Should the car dealership be charged with vehicular felonies every time one of their vehicles is involved in a crime? Certainly not. So why should software’s originator be responsible for what their software is used for? .....
Get This Essay
|
|
Why Y2K?
Number of words: 1386 | Number of pages: 6.... what your thinking: "Its not going to happen, someone is going to make some "wonder program" that will fix all the bugs" Well let me tell you something...There are over 500 programming languages, many in foreign languages. Other programs like BASIC and Cobol, are still being used, and those that know it are either Retired, Senile, or dead! In Some cases, the source code no longer exists, which means the language that some computers still use, cannot be gotten into, and repaired. Lets not forget that there are Millions of lines of Code, that the programmers have to go into, find each mistake, correct it, then test it to make sure .....
Get This Essay
|
|
Computer Crime In The 1990's
Number of words: 2399 | Number of pages: 9.... automated branch exchange known as a "PABX" or "PBX". One of these can
be found in any company with twenty or more employees. A "PABX" is a computer
that manages the phone system including it's voice mail. Once inside a "PABX" a
hacker looks for a phone whose voice mail has not yet been programmed, then the
hacker cracks it's access code and programs it's voice mail account to accept
charges for long distance calls, until the authorities catch on, not for a few
days, hackers can use voice mail accounts to make free and untraceablecalls to
all over the world. The hackers that commit this type of crime are becoming
increasingly o .....
Get This Essay
|
|
Internal Combustion Engines
Number of words: 3046 | Number of pages: 12.... because of the small standby losses with these engines
during the shutdown period.
History
The first experimental internal combustion engine was made by a Dutch
astronomer, Christian Huygens, who, in 1680, applied a principle advanced by
Jean de Hautefeuille in 1678 for drawing water. This principle was based on the
fact that the explosion of a small amount of gunpowder in a closed chamber
provided with escape valves would create a vacuum when the gases of combustion
cooled. Huygens, using a cylinder containing a piston, was able to move it in
this manner by the external atmospheric pressure.
The first commercia .....
Get This Essay
|
|
How Cell Phones Work
Number of words: 999 | Number of pages: 4.... much higher power, can transmit perhaps 5 miles. Someone using a cell phone, on the other hand, can drive clear across a city and maintain a conversation the entire time. Cells are what give a cell phone its incredible
range (Anonymous #2).
The genius of the cellular system is the realization that a city can be chopped up into small cells, and that the cells allow extensive frequency reuse across a city. Frequency reuse is what lets millions of people own cell phones without problems. It works because the carrier chops up an area to about 10 square miles (Dang).
In the dark ages before cell phones, people used radiotelephones i .....
Get This Essay
|
|
|