|
Papers on Technology
The Electronic Computer
Number of words: 1885 | Number of pages: 7.... century. But it was only in the 1904s, when electronics was applied to the task of automatic computing, that fast, reliable computers became possible. Early computers were used mainly for scientific and technical calculations. In the 1950s, businesses, universities and government began using computers to store and process such nonmathematical data as orders, invoices, and personnel records. The use of computers for business data processing expanded enormously in the 1960s and has continued to increase at a rapid path ever since.
The computers of the 1940s to 1960s were complex, expansive machines that were practical only for organi .....
Get This Essay
|
|
The Telephone System
Number of words: 904 | Number of pages: 4.... plastic held above a thicker, hollow metal disk. This plastic disk
is electrically charged, and creates an electric field. The sound waves from
the caller's voice cause the plastic disk to vibrate, changing the distance
between the disks, thus changing the intensity of the electric field. These
variations are translated into an electric current which travels across the
telephone lines. The receiver of a telephone is composed of a flat ring of
magnetic material. Underneath this magnetic ring is a coil of wire where the
electric current flows. Here, the current and magnetic field from the magnet
cause a diaphragm bet .....
Get This Essay
|
|
Radar: A Silent Eye In The Sky
Number of words: 948 | Number of pages: 4.... will bounce back to the source of the echo. If you count
the number of seconds from when the sound was made to when the sound was heard,
you can figure out the distance the sound had to travel. The formula is:
(S/2) X 1100 = D (Half of the total time times 1100 feet
per second equals the distance from the origin to the reflection point)
Of course, radar is a much more complicated system than just somebody
shouting and listening for the echo. In fact, modern radar listens not only for
an echo, but where the echo comes from, what direction the object is moving, its
speed, and its distance. There are two types of modern radar .....
Get This Essay
|
|
Computer Crimes
Number of words: 1157 | Number of pages: 5.... Center for Computer Crime Data in Santa Cruz, Calif. By 1989, that number jumped to 500 prosecutions. that year cost businesses and banks - and, ultimately, consumers - about $500 million. "As the use of computers has increased, so has their criminal misuse" (Bowers 54:g13). Computers are used to obtain credit card numbers, which are then used to order thousands of dollars worth of whatever the hackers want.
"In recent years, individual outlaws and entire "gangs" have broken into computers all over the U.S., using their wits and wiles to pilfer and destroy data"(Behar p62). In a case of a 14 year old high school freshman .....
Get This Essay
|
|
The Linux Operating System
Number of words: 747 | Number of pages: 3.... it to meet their individual needs. At this time, there are dozens of ongoing projects for Linux to different hardware configurations and purposes.
Linux has an official mascot, the Linux Penguin, which was selected by Linus Torvalds to represent the image he associates with the operating system he created. Although many variations of the word Linux exist, it is most often pronounced with a short " i " and with the first syllable stressed, as in LIH-nucks.
Advantages: Linux is cheap, fast, flexible, efficient, stable, secure, reliable, legal, easy to install, low maintenance, thoroughly tested, and currently running somewhere .....
Get This Essay
|
|
Optical Storage Mediums
Number of words: 997 | Number of pages: 4.... not touch the disk surface, thereby not creating
friction, which leads to wear, so the life of an average optical disk is far
longer than that of a magnetic medium. Also, it is impossible to ÒcrashÓ an
optical disk (in the same sense as crashing a hard drive), since there is a
protective layer covering the data areas, and that the ÒheadÓ of the drive can
be quite far away from the disk surface (a few millimeters compared to
micrometers for a hard drive). If this medium is so superior, then why is it
not standard equipment? It is. Most of the new computers have a CD-ROM drive
that comes with it. Also, it is only recently th .....
Get This Essay
|
|
DNA Technology
Number of words: 427 | Number of pages: 2.... one may not be to another. So, specific restrictions must be made on the uses; such as, it must only be used on a life threatening disease or life altering problem. However, even these restrictions could be used to ones discretion, obstacles such as these are problematic and must be dealt with carefully and monitored closely.
Human cloning is a major ethical problem. There are many issues in the arena of human cloning. One argument against it is that there is absolutely no need for human cloning, why would one need a duplicate of themselves? Another argument is that what if this technology fell into the wrong hands. However if hu .....
Get This Essay
|
|
Artificial Intelligence
Number of words: 420 | Number of pages: 2.... to generate grammatically correct sentences and to establish linkages between words, ideas, and associations with other ideas. Research has shown that whereas the logic of language structure—its syntax—submits to programming, the problem of meaning, or semantics, lies far deeper, in the direction of true AI.
In medicine, programs have been developed that analyze the disease symptoms, medical history, and laboratory test results of a patient, and then suggest a diagnosis to the physician. The diagnostic program is an example of so-called expert systems—programs designed to perform tasks in specialized areas as a human would. .....
Get This Essay
|
|
Parity/Non-parity Check
Number of words: 236 | Number of pages: 1.... was developed.
Each character is represented by a byte consisting of a combination of
intelligence bits (seven bits in ASCII and eight bits in EBCDIC) and an
additional bit called a check or parity bit.
Even parity codes place a check bit with each byte that contains an
uneven number of 1 bits. (Remember that a bit is either 1 or o). Because
the check bit is transmitted only with characters composed of an uneven
number of 1 bits,all characters transmitted will have n even number of 1
bits. The check bit is transmitted to and from the computer along with
character code. If a bit is lost (or added) in transmission, the syst .....
Get This Essay
|
|
Identity Theft
Number of words: 696 | Number of pages: 3.... likes easy prey. They don't want to have to work for
it. It's like locking your car at the mall, sure someone might break in anyway,
but chance are if your doors are lock the will probably move on to another car.
First off... Never give your credit card number online out unless you are
positive that the company you are dealing with is legitimate and reputable. If
you aren't sure call the better burough of business. Never give out your social
security number unless you absolutly have to, the only times you are legally
obligated to give out your social security number is when you are requesting
government aid of some kind or fo .....
Get This Essay
|
|
|