|
Papers on Technology
Computer Software Piracy
Number of words: 1506 | Number of pages: 6.... programs, as defined by Funk and Wagnalls Standard Desk Dictionary. When we purchase computer software, we purchase it with the understanding that it will be for use on a single computer, once installed on that system, it is not to be loaded on any other computer. However many people are not aware of this understanding, and many load a program on a couple of computers or on a whole network of computer systems not aware that they are committing a crime. Even though you probably will not be prosecuted for loading a program on a friends computer, this is where your ethics come in. Do you consider anything when you share a progra .....
Get This Essay
|
|
MMX Technology
Number of words: 1403 | Number of pages: 6.... of even non-MMX applications, and it makes use of Single Instruction Multiple Data (SIMD) for more efficient data processing. The 57 new and powerful instructions are specifically designed to process and manipulate audio, video, and graphical data much more effectively. Intel, having doubled its on-chip cache size from 16 KB on non-MMX processor chips to 32 KB on MMX enhanced chips, now allows more instructions and data to be stored on the chip reducing the number of times the proces! sor must access slower, off-chip memory areas for information. The multimedia and communication applications of today often use repetitive loops t .....
Get This Essay
|
|
Home Computer Network
Number of words: 684 | Number of pages: 3.... and file server effectively, you can have a high degree of reliability, security, and efficiency.
Second, an in- can allow you to have only one Internet connection while giving Internet access to all computers on your network. This is very important if you only have one phone line. If you were to add an additional phone line for each computer you wanted to be connected to the Internet, well, let’s just say that this would be a costly alternative. By using your file server on your network, as a PROXY server, you can just use one phone line to connect to the Internet. All you have to do is install a small PROXY program that say .....
Get This Essay
|
|
Computer Viruses
Number of words: 729 | Number of pages: 3.... These "cures" are called vaccines. A vaccine is a
program that watches for typical things viruses do, halts them, and warns the
computer operator.
"Put a kid with the chicken pox together with a bunch of healthy kids and not
all of them will get sick." But that is not the case with computer viruses.
You see when a computer virus passes on a virus it never fails unless the
computer is protected with a vaccine. A typical computer virus spreads faster
than the chicken pox too. Now as I said before when a computer virus attempts
to infect another computer the attack is not always successful. However that
does not mean the infec .....
Get This Essay
|
|
History Of Computers
Number of words: 821 | Number of pages: 3.... all-electronic machine.
This project was taken up by Dr. J. Presper Eckert Jr., and Dr. John W. Mauchly, with help from a few of their colleagues, in the spring of 1946. For two and a half years, they work diligently to construct a machine called the Electronic Numerical Integrator and Calculator, or ENIAC. This machine was a complex of 500,000 connections that linked over 18,000 vacuum tubes, weighed 30 tons, and occupied a room the size of an average three-bedroom home. ENIAC was capable of performing 5,000 additions in one second.
At around the time ENIAC was being created, a man by the name of John Atanasoff was hung up on .....
Get This Essay
|
|
Knowledge Is Power: How To Buy A Computer
Number of words: 1563 | Number of pages: 6.... programs he wants
to run. For many buyers, this creates a problem. They cannot buy a computer
until they know what they want to do with it, but they cannot really know all
of the uses there are for a computer until they own one. This problem is not as
tough as it seems, however. The consumer should go to his local computer store,
and look at the software that's available. Most programs explain their minimum
hardware requirements right on the box. After looking at a few packages, it
should be pretty clear to the consumer that any mid-range system will run 99% of
the available software. A person should only need a top-of-the-l .....
Get This Essay
|
|
Cognitive Artifacts & Windows 95
Number of words: 854 | Number of pages: 4.... on its little to-do list without having the
user worrying about whether he/she remembered to include all the commands. On
the side of personal views the user may see the wizard as a new task to learn
but in general it is simpler than having to configure the application yourself
and making an error, that could cause disaster to your system. The wizard also
prevents the user from having to deal with all the internal representation of
the application like typing in command lines in the system editor.
Within Windows 95 most of the representation is internal therefore we
need a way to transform it to surface representation so it .....
Get This Essay
|
|
What Is Changing In The Technology Of Heavy Construction Mac
Number of words: 1449 | Number of pages: 6.... design ideas. However; with all that our society is accomplishing and inventing everyday, it is easy to visualize the possibilities that we may be looking forward to in the coming years.
Causes: Some theoretical explanations
There is no exact, scientific reason for which manufactures are looking to the future of construction machinery and seeing the equipment being run by computers, not operators. But there are some theoretical reasons why.
To begin with, there is currently a shortage of skilled operators being felt by many companies; including ours. Along with this shortage of skilled operators, follows a shorta .....
Get This Essay
|
|
How Magnets Affect Computer Disks
Number of words: 1142 | Number of pages: 5.... the temperature of 50° to 140° Fahrenheit and the disk
must never be bought near a magnet! (3M Diskettes)
There are many such hazards to computer disks. Problems caused by
magnets are very common. A floppy can be damaged unknowingly if it is kept near
a magnet, that may be in the open or inside any device, such as a speaker phone
in computer speakers or stereo or a telephone. And becuase of the common use of
magnets in everyday life, more and more floppies are damaged everyday.
Even though protective coverings against magnets and other electrical
hazards, are available for floppies, they are not used very commonly. Therefo .....
Get This Essay
|
|
Assistive Technology
Number of words: 664 | Number of pages: 3.... available on the "information highway".
Researchers and educators today recognize four types of technology: the technology of teaching, medical technology, instructional technology, and (Blackhurst & Cross, 1993):
· The technology of teaching includes systematically
designed procedures and strategies that are applied in
precise ways. They typically include well-defined
objectives; precise instructional procedures based on
the tasks students are required to learn; small, sequenced
units of instruction; a high degree of teacher activity;
high levels of student involvement; liberal use of
reinforcement; and careful .....
Get This Essay
|
|
|