Papers on Computers & Technology
Bulletproof Vests
Words: 366 - Pages: 2.... vests were developed whose plates were
made of composite layers of steel or a very hard ceramic, boron carbide.
However, the discovery that numerous layers of nylon fabric could dissipate
the energy of the bullet revolutionized the use of modern body armor.
The function of steel or hard plastic armor is to be impervious to
a bullet. The function of ceramic armor is to slow the bullet abruptly by
the hardness of the ceramic and to dissipate the bullet's energy as it
destroys the armor at the point of impact; the tiles or plates of ceramic
bulletproof vest thus have to be replaced once they have stopped a bullet.
The textile vest def .....
Download This Paper
|
Problems Of Modernization In Developing Nations
Words: 628 - Pages: 3.... nations of the world are prosperous, and have a high standard of
living. The skinny, poorly dressed individual holding the developing world
indicates that the developing nations of the world are not prosperous, and have
a lower standard of living than do industrialized nations. Both individuals are
supporting each other in such a way that if one is removed, the other will fall.
Without resources to use, industry would not be able to maintain its existence.
Likewise, without a market for their resources, or the products of industry, the
developing world would not be able to maintain its existence.
Two current problems which exis .....
Download This Paper
|
Internet Inventions
Words: 730 - Pages: 3.... e-mail is sent, it
arrives at its destination almost instantly. This provides people with a way
to communicate with people anywhere in the world quickly without the costs of
other forms of communicating such as telephone calls or postage for letters.
The savings to be gained from e-mail were enough of an inducement for many
businesses to invest heavily in equipment and network connections in the early
1990s. The employees of a large corporation may send hundreds of thousands of
pieces of E-mail over the Internet every month, thereby cutting back on postal
and telephone costs. It is not uncommon to find internet providers from twenty
to .....
Download This Paper
|
What Really Is A Hacker?
Words: 409 - Pages: 2.... what they have to offer. They also believe that anyone should be able to
use all of a computers resource with no restrictions as to what may be accessed
or viewed. This belief is controversial, it not only could infringe upon
people's right to privacy, but give up trade secrets as well. A deep mistrust
of authority, some hackers consider authority to be a constriction force. Not
all hackers believe in this ethic, but generally authority represents something
that would keep people from being able to have full access and/or free
information.
Along with the "ethical code" of hackers there are a few basic "hacking
rules" that are .....
Download This Paper
|
Windows 95
Words: 569 - Pages: 3.... appears on the
task bar. If after opening other windows you need to return to the original
window, all you need do is click on the application's button on the task bar and
the appropriate window will come to the fore. According to Aley, "the most
gratifying, and overdue, improvement is Windows 95's tolerance for file names in
plain English" (29-30). Traditionally, users had to think of file names that
summed up their work in eight letters or less. This was a constant problem
because frequently a user would look at a list of files to retrieve and think
"now what did I save that as?". Those days are over. Windows 95 will let the
user save h .....
Download This Paper
|
Ecommerce
Words: 715 - Pages: 3.... in this expanding goldmine of information.
The potential for businesses is enormous. Fifteen million people is a very large consumer marketplace. Consumers are not the only ones "surfing" around for info. Businesses also focus on other companies to sell their products. General Electric sold machine and appliance parts using a new business to business technology called "extranet". GE used its successful "extranet" to roll in 1996 online sales of one billion dollars. Another very successful type of business on the net is the coming of services backed by research, such as discount stock trading, including e.Schwab and a Web-only compa .....
Download This Paper
|
The Y2k Bug
Words: 422 - Pages: 2.... did this not because of the lack of available memory but out of sheer laziness. They used the two-digit system to cut down on the number of keystrokes needed to complete the programming, which helped them complete their task faster.
It was discovered in the late 1980’s that this Y2K bug could cause computer systems to fail when the year 2000 rolled around because computers might fail to recognize that it is the year 2000 versus 1900. The problem is going to affect the whole world.
How does affect the average person? It is possible that the electric companyies’ computers could crash, which could cause either blackouts or brownouts .....
Download This Paper
|
The Internet And Its Effects And Its Future
Words: 5757 - Pages: 21.... programmers and corporate giants are all harnessing the power of the Internet. For many businesses the Internet is becoming integral to their operations. All users of the Internet have the ability to send and receive data: messages, notes, letters, documents, pictures, video, sound- almost any form of communication, as effortlessly as making a phone call. It is easy to understand why the Internet is rapidly becoming the medium of choice for business. Using the mouse on your computer, the easy point-and-click interface gives you access to electronic mail for sending and receiving data, and file transfer for copying files from one compute .....
Download This Paper
|
Stealth Technology
Words: 1859 - Pages: 7.... or they
are reflected towards another direction and this is caused because of the
Radar Absorbent Material (RAM) and in this way the aircraft can be
virtually undetectable to radar.
The Development of Stealth Technology
This Technology was cloaked in a veil of secrecy for almost two
decades, but this entirely new family of aircraft has recently been
announced to the public but the United States Department of Defence. These
aircraft are virtually undetectable to radar, these new aircraft are the
first examples of '' law observable, or stealth technology. Because radar
in the primary means by wich aircraft are detected and tracked, it has .....
Download This Paper
|
Agricultural Technological Advancements
Words: 327 - Pages: 2.... working', is simply growing plants without soil.
Hydroponics is as old as the Hanging Gardens of Babylon. Today this technology is widely used to grow lush, healthy indoor plants and premium grade vegetables, fruits and herbs. The physiological requirements of plants can be met without the use of soil or natural sunlight. Plants are rooted (and thus supported) in an inert medium and nutrition is provided by water soluble mineral elements.
The corn borer is devastating for the farmer, costing growers more than $1 billion annually in the United States. Bt stands for Bacillus thuringiensis, which is a naturally occurring soil organism. Bac .....
Download This Paper
|
Navigate:
« prev
8
9
10
11
12
next »
|
|
Members |
|
|
|