HomeJoin Now!QuestionsContact Us
SEARCH Papers



PAPER Topics

• American History
• Arts & Movies
• Biographies
• Book Reports
• Creative Writing
• English
• Geography
• Health & Medicine
• Legal
• Miscellaneous
• Money & Finance
• Music
• Poetry
• Political
• Religion
• Sciences
• Society
• Technology
• World History

MEMBERS Login
Username: 
Password: 



Forgot Password


Cancel Subscription



Technology Online Essays


Local Area Networks
Number of words: 876 | Number of pages: 4

... or a campus. The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information for all stations to receive. As a consequence, it does not inherently provide privacy. The LAN enables stations to communicate directly using a common physical medium on a point-to-point basis without any intermediate switching node being required. There is always need for an access sublayer in order to arbitrate to access to the shared medium. The network is generally owned, used, and operated by a single organization. This is in contrast to Wide Area Networks (WANs) that interconnect communication facilities in different parts of a country or are used as a public utility. T ...

Internet Regulation: Policing Cyberspace
Number of words: 1332 | Number of pages: 5

... to determine who uses it and how it is used. The government must control what information is accessible from its agencies. This material is not lawfully available through the mail or over the telephone, there is no valid reason these perverts should be allowed unimpeded on the Internet. Since our initiative, the industry has commendably advanced some blocking devices, but they are not a substitute for well-reasoned law.4 Because the Internet has become one of the biggest sources of information in this world, legislative safeguards are imperative. The government gives citizens the privilege of using the Internet, but it has never given them the right to use it. They seem to rationa ...

Secure Electronic Transactions
Number of words: 1023 | Number of pages: 4

... allows you to navigate through the web. Your browser should have industry security standards, such as Secure Sockets Layer (SSL) or (SET) Secure Electronic Transaction. By having these security standards on your browser, it allows the transaction information being sent back and forth from the reseller to be encrypted. Most computers already come with this browser pre-installed. If this is not the case, to obtain one of the most popular brands of browsers, you can download them from the Internet at no cost. The creation of Secure Electronic Transaction (SET) standard has involved the efforts of many people. All of the work done for SET has been done in an open sourced process. The work ...

The Modem
Number of words: 474 | Number of pages: 2

... Baud Rate Per Second) the reason for the increase in 14.4 and 28.8's is that they are cheap and fairly recent and haven't gone out of date yet. There are two types of modem external and external modems internal plugs into a 16 bit port inside your computer and external connects through either a serial (mouse)port or a parallel (printer)port most people like the external modems because they don't take up an extra space in your computer (according to PC Computing) prices in modems range price from $100 (28.8bps) to $500(software upgradable 56k). Facsimile machines also have a form of modem in them, usually a 2400baud modem to decode the message. So imagine a world without the modem for ...

Hackers: Information Warefare
Number of words: 2218 | Number of pages: 9

... even notice. Others might say, "Oh, a box on the street.". A few might wonder what it does and then move on. The hacker, the true hacker, will see the box, stop, examine it, wonder about it, and spend mental time trying to figure it out. Given the proper circumstances, he might come back later to look closely at the wiring, or even be so bold as to open the box. Not maliciously, just out of curiosity. The hacker wants to know how things work.(8) Hackers truly are "America's Most Valuable Resource,"(4:264) as ex-CIA Robert Steele has said. But if we don't stop screwing over our own countrymen, we will never be looked at as anything more than common gutter trash. Hacking computers ...

Aeronautics: Aviation Powerplants
Number of words: 964 | Number of pages: 4

... aircraft as the Sopwith Camel and Moth. A variation of the rotary engine was used in the most famous aircraft of the war: The Fokker Dr.1 Triplane flown by Baron Von Richtofen. A unique feature of these engines is that they had no throttle, but ran at a constant speed. Also the cylinders were not fixed in place as one might expect. They instead rotated around a fixed crankshaft. The propeller was attached to the cylinders. The advantage of this configuration was lowered production time and elimination of a costly and vulnerable cooling system. Speed control was gained by cutting the fuel supply and thus shutting down the engine. The engine would retain enough momentum to allow the pilot t ...

Fiber Optics
Number of words: 1222 | Number of pages: 5

... Simulated Emission of Radiation) or LEDs (Light Emitting Diodes). Each of these methods create a highly focused beam of light that is cycled on and off at very high speeds. Computers at the transmitting end convert data or voice into "bits" of information. The information is then sent through the fiber by the presence, or lack, of light. So, all of the data is sent light pulses. Computers on the receiving end convert the light back into data or voice, so it can be used. All of this seems to be a very "modern" concept, and the technology we use is. The concept though, was the idea of Alexander Graham Bell in the late 1800's. He just didn't have a dependable light source... some d ...

Browse: 1 ... 60  61  62  63  64  65 

Copyright © 2026 - Web Term Papers - All Rights Reserved