Papers on Computers & Technology
History Of The Internet
Words: 4930 - Pages: 18.... of the Internet. As this new technology momentum grew it made the world accessible to everyone and certain group's willingness to take advantage of the Internet. This would lead to need for regulation in what is acceptable content on the Internet, and how the first amendment has blocked many policy attempts trying to regulate the technology.
We can point to the fact that emergence of any new technology is always the contribution of several intertwined social factors over a period of many years. The Internet as we know it today is no exception. We can show that the beginnings of the Internet started in the 1940's and took over in the .....
Download This Paper
|
The Video Game Wars
Words: 908 - Pages: 4.... store, the walls were
covered with many games for different systems. On one wall, there were
Nintendo's games, on another, were Sega's games, and on the last, were Sony's
games. Surprisingly, Nintendo's new games didn't look much different than the
other two companies'. On three corners of the room, there were television sets
displaying the latest and greatest games for each popular console. While
watching these new games, I was in awe.
When I was younger, I remembered playing what those times considered,
"high tech" video games. During those years, the games had little blocky
characters who looked more like a blob than a hum .....
Download This Paper
|
AIBO And Robotics
Words: 432 - Pages: 2.... to get feedback from the robot. Some other devices used to send feedback are radio signals, sonar, optical fiber, and sensors. Powerful computers with Artificial Intelligence programs control robots that are fully automatic. Robots are taught to perform repetitive tasks. Intelligent robots incorporate the other disciplines of Artificial Intelligence like, human sensory simulation for touch, sight, and hearing.
Our future will definitely have a place for robots. Some radicals believe that robots will eventually take over our planet. “Fifty years, tops, until the robots exceed us,” says Hans Moravec, director of Carnegie Mell .....
Download This Paper
|
Technology To Improve Education
Words: 643 - Pages: 3.... and justify its purchase by applying it to routine administrative tasks, such as attendance records and grading. While these tasks are very important, they only show a small part of what technology can do for a school. Technology must go further than simply keeping attendance; it must focus on keeping students interested and productive.
Since computers and the Internet have expanded in such a way in which education can be delivered to students, it is currently possible to engage in "distance education through the Internet. Distance education involves audio and video links between teachers and students in remote areas. Video conferencin .....
Download This Paper
|
Windows 95 Or NT
Words: 684 - Pages: 3.... was originally created for business use, but has ended
up being more widely available for the average PC user in ones home. Windows 95
was developed for the sole purpose as an alternative to Windows NT. But has
ended up in the work place more then the home. Windows 95 carries an average
price of ninety-five dollars in stores. Which makes it an expensive system
worth the money. On the other hand Windows NT 3.51 carries a price tag of
three-hundred and forty nine dollars. Making this software very expensive but
also worth every penny.
Windows 95 is much easier to use then Windows NT. It was designed to
make the PC user have more of an .....
Download This Paper
|
Computers In Education
Words: 483 - Pages: 2.... microwave tower to permit direct transmission between
stations, but it can interconnect any number of stations that are included
within the antenna beams of the satellite rather than simply the two ends of the
microwave link.
Computer Crime
Computer crime is defined as any crime involving a computer accomplished through
the use or knowledge of computer technology. Computers are objects of crime when
they or their contents are damaged, as when terrorists attack computer centres
with explosives or gasoline, or when a "computer virus" a program capable of
altering or erasing computer memory is introduced into a computer system.
Personal .....
Download This Paper
|
How Magnets Affect Computer Disks
Words: 1142 - Pages: 5.... also not very dependable. They have numerous
conditions under which they should normally be kept. For example: the actuall
magnetic disk inside the hard cover of the disk must NEVER be touched, the
magnetic disk inside, must be protected by the metallic sliding shield, the disk
must always be within the temperature of 50° to 140° Fahrenheit and the disk
must never be bought near a magnet! (3M Diskettes)
There are many such hazards to computer disks. Problems caused by
magnets are very common. A floppy can be damaged unknowingly if it is kept near
a magnet, that may be in the open or inside any device, such as a speaker phone
in compute .....
Download This Paper
|
Are "Good" Computer Viruses Still A Bad Idea?
Words: 4796 - Pages: 18.... is listed, which every virus that claims to be beneficial
must conform to. At last, a realistic model using replication techniques for
beneficial purposes is proposed and directions are given in which this technique
can be improved further.
The paper also demonstrates that the main reason for the conflict between those
supporting the idea of a "beneficial virus" and those opposing it, is that the
two sides are assuming a different definition of what a computer virus is.
1. What Is a Computer Virus?
The general public usually associates the term "computer virus" with a small,
nasty program, which aims to destroy the information on thei .....
Download This Paper
|
Save The Internet
Words: 1578 - Pages: 6.... is a point
where freedom of speech becomes corrupt; freedom of speech only creates an
excuse for the vile pornographers to poison our nation let alone our children.
Pornography is regarded as immoral and downright filthy by the people.
It denies human dignity and often stimulates the user to violent acts (Beahm
295). Therefore, pornography and violence are correlated. It trivializes the
human beauty and converts it into commercialized slime (Beahm 295). Moreover,
the consumption of pornography can lead to a detrimental addiction and the
consumer can become a slave to it (Beahm 297). In short, pornography is a very
addictive drug; which .....
Download This Paper
|
The Motor And How It Works
Words: 346 - Pages: 2.... make the motor spin are solenoids 2 and 3. When the current travels through the motor, it goes through the two metal pieces that send the current into whichever solenoid is touching it (solenoid 2 or 3). When part 5 spins, the direction of the current through 2 and 3 are reversed every time the motor spins half way around. The metal pieces touch the solenoids in just the right places to give solenoids 2 and 3 a magnetic field that attracts 1 and repels 4 and visa versa.
The end result is that as 2 or 3 approaches 1 or 4, it is given a magnetic field that is opposite to that of 1 or 4. Therefore, the two are attracted to each other. .....
Download This Paper
|
Navigate:
« prev
11
12
13
14
15
next »
|
|
Members |
|
|
|