HomeJoin Now!QuestionsContact Us
SEARCH Papers



PAPER Topics

• American History
• Arts & Movies
• Biographies
• Book Reports
• Creative Writing
• English
• Geography
• Health & Medicine
• Legal
• Miscellaneous
• Money & Finance
• Music
• Poetry
• Political
• Religion
• Sciences
• Society
• Technology
• World History

MEMBERS Login
Username: 
Password: 



Forgot Password


Cancel Subscription



Technology Online Essays


Computers
Number of words: 1120 | Number of pages: 5

... of modern technology. Two main types of computers are in use today, analog and digital, although the term computer is often used to mean only the digital type. Everything that a digital computer does is based on one operation the ability to determine if a switch, or gate is open or closed. That is, the computer can recognize only two states in any of its microscopic circuits on or off, high voltage or low voltage, or—in the case of numbers—0 or 1. The speed at which the computer performs this simple act, however, is what makes it a marvel of modern technology. Computer speeds are measured in megaHertz, or millions of cycles per second. A computer with a "clock speed" of 10 mHz—a fa ...

The Internet, Pornography, And Children
Number of words: 2091 | Number of pages: 8

... exactly is the Internet? It is a global network of computers used to transmit all types of data between computers. Text, numbers, programs, illustrations, photographs, audio, animation, and video can all be transmitted over the Internet. Contrary to what some people may think, the Internet is not a single computer nor is it a single service. The Internet is not owned by or governed by anyone. It exists solely through the support of the companies and institutions that access it. Though the Internet seems relatively new, its roots actually start in the 1960s. In 1969, the Department of Defense started the “ARPANET” project. ARPANET was a decentralized computer network that was used to lin ...

Architectural Designs Of Castles Vs. Modern Homes
Number of words: 1198 | Number of pages: 5

... with narrow, wedge-shaped slits in them for archers to shoot arrows at invaders. The outer walls also had holes in the floors for defenders to drop rocks down on invading people who had gotten through the first wall. These holes were called murder holes. Inside the castle were many knights, archers, and soldiers prepared to defend against anyone who breaks all of the way through the walls and gets inside of the castle. Castles also had very large gates and gatehouses to let people into the castle. There was a gatehouse for each wall. Each gatehouse usually had a very large metal and wooden gate that could be lowered into the opening to stop an enemy from getting in or it co ...

Computer Crime
Number of words: 465 | Number of pages: 2

... and wanted to explore the system. All they want to do is exploit systems not destroy it. It is purely intellectual. I know one reason is that is can be very rewarding. Hackers are drawn to computers for the aninymity they allow. They feel powerful and can do anything. Hackers can be there own person out side the real world. I found out Arizona was the first state to pass a law against computer crime, in 1979. In 1980 the U.S. copyright act was amended to include soft ware. I found out that in 1986 a computer farad abuse act was passed. This act was made to cover over any crime or computer scheme that was missed with any former laws. Violations to any of thesis laws are a maxim ...

Ethernet
Number of words: 1260 | Number of pages: 5

... the power supply cord from the back of the computer. Every computer opens in its own unique way. Most will have screws in the back that hold the case cover. Unscrew them and slide the case off. Some might have to be tugged and pulled roughly, but don’t worry, it will come off. Which slot is for your card? I told you earlier that things inside are very logical. The following will prove my point. The PCI slot is smaller than the ISA slot plus it is white in contrast to the ISA which is black. Do not get discouraged when you see two different sized black slots. The smaller one is a memory slot. If all else fails, take the card and line it up with the slot. The gold lines shou ...

Internet Censorship
Number of words: 2575 | Number of pages: 10

... to view. This is where many ethical and moral questions arise regarding the internet. Not every user wants his homepage to deal with the spin rates of atoms or the airspeed of South African swallows. Some users wish to display "objectionable" material on their homepages. This may have started out as a prank to some, but now net- porn is an offshoot industry on the information superhighway. Companies like Playboy and Hustler run their own servers that are permanent parts of the internet, and on their pages they charge user to view Playboy and Hustler type material. What makes matters worse is evolution of the internet newsgroup system. USENET in its infancy was ARPANET's news and message com ...

Netscape’s Gecko: The Next-Generation Layout Engine
Number of words: 560 | Number of pages: 3

... and even a full Document Object Model level-1 implementation. Gecko also supports both HTML and XML documents. Gecko has been developed entirely under the Open source model at Mozilla.org. Developers are free advantage of the Gecko source code. The Open Source approach is used to encourage developers and anyone else for that matter to contribute their own strategies. The Article incorporates the idea that Gecko would be enjoyed by not only web browsers, but by application developers, web content developers and consumer electronic device manufacturers. The engineering side of Gecko is quite complicated. The strategy in the development of Gecko was to make it as incremental as pos ...

Software Piracy: A Big Crime With Big Consequences
Number of words: 2190 | Number of pages: 8

... connected to the internet that offered it's users more than one million dollars worth of software 'free of charge.' Mr. LaMacchia was caught by the authorities and was acquitted of this piracy due to the lack of legal standards for this crime. Another example is off local bulletin board systems. Many are run out of the offenders homes with just a phone line, a computer and a modem. Here members of this service can send and receive pirated software (otherwise known as 'warez') as their own pace and leisure. There are not just one or two of these bulletin boards around there are in fact many. Most reside in large cities and the offenders are in most cases minors. As the computer gains ...

Making Utilities For MS-DOS
Number of words: 4348 | Number of pages: 16

... is confidential and available only to the company that developed it? Obviously, only the company that has developed that operating system will be able to develop software for it. And this is a violation of the Antitrust Law. And now I start having a suspicion that this is happening with Microsoft's operating systems. It should be no secret to anyone that MS-DOS contains a lot of undocumented system calls, data structures and other features. Numerous books have been written on this subject (see bibliography). Many of them are vital to system programming. There is no way to write a piece of system software, such as a multitasker, a local area network, or another operating system e ...

Windows 95 Or NT
Number of words: 684 | Number of pages: 3

... the home. Windows 95 carries an average price of ninety-five dollars in stores. Which makes it an expensive system worth the money. On the other hand Windows NT 3.51 carries a price tag of three-hundred and forty nine dollars. Making this software very expensive but also worth every penny. Windows 95 is much easier to use then Windows NT. It was designed to make the PC user have more of an easier time navigating through its complex tasks. This is one of the main reasons why people would rather buy the more less expensive operating system. Rather then the more expensive system Windows NT. Another one the reasons that Windows 95 is more popular is for its simple graphic user interfa ...

Browse: 1 ... 58  59  60  61  62  63  64  65  next »

Copyright © 2026 - Web Term Papers - All Rights Reserved