HomeJoin Now!QuestionsContact Us
SEARCH Papers



PAPER Topics

• American History
• Arts & Movies
• Biographies
• Book Reports
• Creative Writing
• English
• Geography
• Health & Medicine
• Legal
• Miscellaneous
• Money & Finance
• Music
• Poetry
• Political
• Religion
• Sciences
• Society
• Technology
• World History

MEMBERS Login
Username: 
Password: 



Forgot Password


Cancel Subscription



Technology Online Essays


Computer Security
Number of words: 2496 | Number of pages: 10

... human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful amateurs who experiment at night --- the hackers. The term "hacker "may have originated at M.I.T. as students' jargon for classmates who labored nights in the computer lab. In the beginning, hackers are not so dangerous at all. They just stole computer time from the university. However, in the early 1980s, hackers became a group of criminals who steal information from oth ...

History Of Telecommunications
Number of words: 2827 | Number of pages: 11

... In similar state, the old China used a sort of drum telegraph which was that of the "Tamtam". This was a big, free hanging, circular metal plate. The keystroking, as it is called, of this plate would create a far-reaching audible tone. This is the drum telegraph and the start of telecommunication. Fire Signaling Fire signaling is another part of the telecommunication family. Also, the old Greece and the Roman Empire already posses a good organized telegraph system. Fire signaling was sited from mountain to mountain or from tower to tower. Especially sensible was a torch telegraph, which was invented about 2500 years ago. The receiving and transmitting station that wa ...

Essay On Hacking
Number of words: 580 | Number of pages: 3

... simply means File transfer protocol. You use this when download image files or any other files. Now, onto hacking. Most people stereotype people simply as "HACKERS," but what they don't know is that there are three different types of computer whizzes. First, there are hackers. Hackers simply make viruses and fool around on the internet and try to bug people. They make viruses so simple. The get a program called a virus creation kit. This program simply makes the virus of beholders choice. It can make viruses that simply put a constant beep in you computer speakers or it can be disastrous and ruin your computers hard-drive. Hackers also go onto chat rooms and cause ...

The Torpedoes
Number of words: 356 | Number of pages: 2

... often proved to be the U-boat itself and standard issue-orders were to dive immediately to depth of 60m after launch from a bow tube while a stern shot was to be followed by a complete silence in the boat. Two U-boats were almost certainly lost when hit by one of their own T5 torpedoes, U-972 in Dec 1943 and U-377 in Jan 1944. Variants All the German U-boat torpedoes were 53.3cm (21 inch) in diameter and had a warhead of 280kg. (The T5 had two important pattern-running devices, which could be applied to various torpedo types. These were FAT and LUT. The FAT (Federapparat Torpedo) ran a wandering course with regular 180-degree turns, was useful against convoys, and was fitted to bo ...

The Internet
Number of words: 457 | Number of pages: 2

... I would recommend a 28.8 kbs modem manufactured by U.S Robotics. The Internet can give you access to both legal & illegal sites on the net. There is pirated software e.g. full version of games that you can access without actually paying for them. The internet can only be accessed with a browser. There are a few web browsers but two main ones are Netscape Navigator and Internet Explorer. As I mentioned earlier, the internet allows everyone to access various topics of interests on the web. The choices ranges from recreational, education, hobbies, communications and entertainment. There is always a risk of accessing material which are not appropriate e.g. pornographic material and ...

How To Computerize Your Accounts
Number of words: 819 | Number of pages: 3

... productivity. Finally, the company must allow time for installation and training. When looking at the need to change from a manual accounting system to a computerized accounting system you also need to look at the future demands of your company. How do you know when it is time to make the change? When your company has grown so large that it no longer has access to the data used to make decisions, then it is probably time to switch to a computerized data management system. These computerized data management systems are often called information systems. The company now has two choices. It can either hire a professional consulting firm to help select and install the computer syste ...

Computers, I Don't Like Computers. So Why Can't I Get A Job?
Number of words: 511 | Number of pages: 2

... insert cards into to give it instructions. But my point is that she was not exposed to a computer as everyday life. Now she is really behind so to speak in the computing world. Computers back then were huge, they were usually stored in wharehouses. The earlier ones used paper with holes in them to give it instructions. Later the pre-PC's used tape cartridges to store data on. Then came along in 1979 the first real personal computer. Apple came out on the market with the Apple PC. Two years later IBM came out with their version of the personal computer. When IBM came out with their computer they were now in the PC market. Apple's biggest mistake was not to make MS-DOS their operating system ...

An Insight Into Virtual Reality
Number of words: 1304 | Number of pages: 5

... to a computer through fiber optic cables. Sensor inputs enable the computer to generate an on screen image of the hand that follows the operator's hand movements. The glove also has miniature vibrators in the finger tips to provide feedback to the operator from grasped virtual objects. Therefore, driven by the proper software, the system allows the rator to interact by grabbing and moving a virtual object within a simulated room, while experiencing the "feel" of the object. The virtual reality line includes the Datasuit and the Eyephone. The Datasuit is an instrumented full-body garment that enables full-body interaction with a computer constructed virtual world. In one use, this ...

America And The Computer Industry
Number of words: 2602 | Number of pages: 10

... first Òdigital calculating machineÓ. It could only add numbers and they had to be entered by turning dials. It was designed to help PascalÕs father who was a tax collector (Soma, 32). In the early 1800Õs, a mathematics professor named Charles Babbage designed an automatic calculation machine. It was steam powered and could store up to 1000 50-digit numbers. Built in to his machine were operations that included everything a modern general-purpose computer would need. It was programmed by-and stored data on-cards with holes punched in them, appropriately called ÒpunchcardsÓ. His inventions were failures for the most part because of the lack of precision machining techniques used at the time a ...

Airbags - Pop Em' Or Keep Em'
Number of words: 1314 | Number of pages: 5

... Small women and the elderly have also been killed as a result of airbags. The time has come to ask ourselves, "Do airbags really work?" First off, most people feel that airbags are a great safety device. They let people walk away from an accident without a scratch, right? They protect everybody, right? People don't need seatbelts if their car has an airbag, right? Wrong. Airbags cause injuries, airbags kill, and airbags don't work unless seatbelts are worn. In a rollover accident, people still have a chance of being thrown from the car even if their car has airbags. Not only are the airbags dangerous, they are also a key target for thieves. The easy to remove airbags coupled wi ...

Browse: 1 ... 50  51  52  53  54  55  56  57  58  59  60  next »

Copyright © 2026 - Web Term Papers - All Rights Reserved