HomeJoin Now!QuestionsContact Us
SEARCH Papers



PAPER Topics

• American History
• Arts & Movies
• Biographies
• Book Reports
• Creative Writing
• English
• Geography
• Health & Medicine
• Legal
• Miscellaneous
• Money & Finance
• Music
• Poetry
• Political
• Religion
• Sciences
• Society
• Technology
• World History

MEMBERS Login
Username: 
Password: 



Forgot Password


Cancel Subscription



Technology Online Essays


The Vast Cyber-frontier Is Being Threatend With Censorship From The Government
Number of words: 2556 | Number of pages: 10

... the bill with a landslide 414-16 House vote and a 91-5 Senate vote.2 It seems now that the wide bill might not be what it cracked up to be, as it stands now, anyone who might upload James Joyce's Ulysses could be placed in jail for two years and have up to a $250,000 fine.3 Representatives of on-line services industries were concerned about the bill, and feared they could be held criminally responsible for Internet conversations.4 "We face a unique disturbing and urgent circumstance, because it is children who are the computer experts in our nations families," remarked a concerned Rep. Senator of India Dan Coats.5 Although in reality, censorship would do little to stop the pornography ...

New Weapons And Technology In World War I
Number of words: 1966 | Number of pages: 8

... were just normal cars converted in a tank. In 1915, Wolseley developed a thirty-cwt. lorry chassis with armored sides and a revolving turret with a Vickers-maxim machine gun. The first design of a tank known as “Little Willie” designed by Lieutenant W.G. Wilson and William Tritton. It consisted of an armored box encircled by caterpillar tracks. The first vehicle to be designed and completed as a tank was not very effective. It was too short to cross a German trench that was more than four-foot wide. An improved version of Wilson’s tank was developed in 1916. The Mark I had an armor plate varying from 12mm to 6mm in thickness. It had four Vickers water-cooled machine guns. ...

Robotics
Number of words: 1238 | Number of pages: 5

... most part quite different from the androids, or humanlike robots, and other robots of fiction. They rarely take human form, they perform only a limited number of set tasks, and they do not have minds of their own. In fact, it is often hard to distinguish between devices called robots and other modern automated systems. Although the term robot did not come into use until the 20th century, the idea of mechanical beings is much older. Ancient myths and tales talked about walking statues and other marvels in human and animal form. Such objects were products of the imagination and nothing more, but some of the mechanized figures also mentioned in early writings could well have been made ...

How To Surf The Internet
Number of words: 1265 | Number of pages: 5

... to the user's computer). A modem's quality and speed are measured as something called a baud rate (how fast the modem transmits data in bits and kilobits - similar to grams and kilograms). A kilobit is a term simply used to describe the speed of a modem. For example, if somebody was to go out and purchase a 2400 baud modem, they would be buying a modem that transmits data 2400 kilobits per second which is definitely not the speed of a modem you want if your thinking of getting onto the Internet. The speeds of modems then double in the amount of kilobits that can be transmitted per second going from 4800 baud to 9600 baud and so on eventually getting up to 28800 baud (which is the f ...

Polymorphic & Cloning Computer Viruses
Number of words: 1865 | Number of pages: 7

... spreads, first one must understand some basics about computers, specifically pertaining to the way it stores data. Because of the severity of the damage that these viruses may cause, it is important to understand how anti-virus programs go about detecting them and how the virus itself adapts to meet the ever changing conditions of a computer. In much the same way as animals, computer viruses live in complex environments. In this case, the computer acts as a form of ecosystem in which the virus functions. In order for someone to adequately understand how and why the virus adapts itself, it must first be shown how the environment is constantly changing and how the virus can interact and deal ...

Fast Car Physics
Number of words: 1557 | Number of pages: 6

... of a fluid, in gaseous or liquid state, varies inversely with speed or velocity and a slower moving fluid will exert more pressure on and object than the same fluid moving slower (Yager). The goal of car designers is to make the air passing under a car move faster than the air passing over the car. This causes the air passing over the car to create more downforce than the air passing under the car creates upforce creating a force additional to the car’s weight pushing the car to the road. Large amounts of downforce are needed to keep light cars grounded at high speed and keep to cars from sliding around turns at high speeds. The Venturi Effect is also an important in aerodynamic de ...

Being Digital
Number of words: 484 | Number of pages: 2

... he talks about the communication medium, and how information content is so much more important than bandwidth. If we would only transmit better-labelled bits, we could do so much more with the bandwidth we have today. More elaborately, on 'Bits are Bits' here, he reflects on the difference between bits and atoms: how the shift to an economy based on the transfer o f bits is affecting the structure of the information industry; how the transmission of bits is regulated; and how the major players- the telecommunications industry, cable operators, and electronics and computer companies- are reacting to the digital revo lution (and, in most cases, how they are focussing their ...

Ibm
Number of words: 1295 | Number of pages: 5

... existed between products made for government use and those introduced by into the public marketplace. In the late 1950s distinguished itself with two innovations: the concept of a family of computers (its 360 family) in which the same software could be run across the entire family and a corporate policy dictating that no customer would be allowed to fail in implementing an system. This policy spawned enormous loyalty to “Big Blue,” as came to be called. From the 1960s until the 1980s dominated the global mainframe market, although in the 1980s lost market share to other manufacturers in specialty areas such as high-performance computing. When minicomputers were introduced in the 1970 ...

Are "Good" Computer Viruses Still A Bad Idea?
Number of words: 4796 | Number of pages: 18

... paper also demonstrates that the main reason for the conflict between those supporting the idea of a "beneficial virus" and those opposing it, is that the two sides are assuming a different definition of what a computer virus is. 1. What Is a Computer Virus? The general public usually associates the term "computer virus" with a small, nasty program, which aims to destroy the information on their machines. As usual, the general public's understanding of the term is incorrect. There are many kinds of destructive or otherwise malicious computer programs and computer viruses are only one of them. Such programs include backdoors, logic bombs, trojan horses and so on [Bontchev94]. Furthermore, ...

You've Got Mail
Number of words: 395 | Number of pages: 2

... country over the telephone and even see them, in real time, through video conferencing. What people need to communicate is no longer limited by the size of the paper, length of the tape, or cost of the call. As with all forms of communication, people are always concerned with how secure things are. With traditional forms of communication, even with the highest level of security, things are easily stolen - letters and memos can be easily copied; audio and video recordings can be quickly recorded; hard copies of any kind can be easily destroyed. As for the technology-based forms of communication, things are a lot more secure through the use of encryption technology. However, there is ...

Browse: 1 ... 7  8  9  10  11  12  13  14  15  16  17  next »

Copyright © 2026 - Web Term Papers - All Rights Reserved