|
» Technology Essays and Papers
Computing Machinery And Intelligence
<view this essay>.... then sought by proposing an imitation game which would serve to draw a “fairly sharp line between the physical and the intellectual capacities of man”(p.444). Turing explains that the “idea behind digital computers…these machines are intended to carry out any operation which could be done by a human computer”(p.436). In effect, these machines are supposed to imitate the things a human being can do. For example, a computer learns how to receive, analyze and store information. These abilities are based on those of a human, the computer only generates information, without the authority to change the process in which it functions. The computer is only follow .....
Number of words: 515 | Number of pages: 2 |
|
Windows 95 The O/S Of The Future
<view this essay>.... standards, Microsoft saw the need to replace DOS
(Disk Operating System) with something easier to use. That is when they
developed Windows, which covered the difficult to use DOS with a new face that
made computing easier. The first Windows was a start in the right direction. In
an effort to make computing meet the needs of the public, Microsoft developed
Windows 95.
Windows 95 has the appearance of being a completely user friendly operating
system and it pretty much is as far as the average user is concerned. The
compatibility with most hardware makes it easy for someone to upgrade their
computer. The desktop is designed so the user has point and c .....
Number of words: 1148 | Number of pages: 5 |
|
Identity Theft
<view this essay>.... users signing on everyday the cyber world
has become a tourast trap so to speak where nameless faceless conartists work
the crowds. Ghosts.Anybody can fall victem to a ghost. Nobody is really truely
safe because our personal information is distrubted like candy on halloween. We
use our social security numbers as identification numbers Credit card numbers
are printed on every receipt. And our liscense number is used on a daily basis.
Despite this there are ways to prevent yourself from falling victem to identity
theft. you see a criminal likes easy prey. They don't want to have to work for
it. It's like locking your car at the mall, sure someone might .....
Number of words: 696 | Number of pages: 3 |
|
Computer - Hacking
<view this essay>.... moving out of their own living-room. Most hackers see a big challenge entering into the database of an organisation like the N.A.S.A for example. Often they do not know what kind of problems they will have to face. An example for this would be a little boy of twelve years of age, who managed to enter into the database of an important stock exchange computer. His parents will probably be fined, also if this boy did not do any real harm. As I already mentioned, hackers are in most cases only interested in the so called “cracking” of passwords without wanting to destroy anything. There is definitely also a great competition under the top-hackers of the worl .....
Number of words: 471 | Number of pages: 2 |
|
The Arrival Of The Internet
<view this essay>.... to fear and avoid the Internet. The Internet, despite its problems, is a very useful and relatively safe technology. Many of the problems seem much worse than they really are. There are certain precautions one must take to avoid some of the dangers associated with the Internet. If these precautions are taken, the Internet should prove safe.
The Internet, simply put, is a bunch of computers that can communicate with one another via telephone lines, optical fibers, radio and satellite links. If one computer goes down the others are linked together to bypass the defective/destroyed computer and get the information to its destination. It's much like a .....
Number of words: 2978 | Number of pages: 11 |
|
The Evolution Of The Computer
<view this essay>.... aspect of people's lives for the better.
The very earliest existence of the modern day computer's ancestor is the abacus. These date back to almost 2000 years ago. It is simply a wooden rack holding parallel wires on which beads are strung. When these beads are moved along the wire according to "programming" rules that the user must memorize, all ordinary arithmetic operations can be performed (Soma, 14). The next innovation in computers took place in 1694 when Blaise Pascal invented the first "digital calculating machine". It could only add numbers and they had to be entered by turning dials. It was designed to help Pascal's father who was a tax collector .....
Number of words: 2607 | Number of pages: 10 |
|
Artificial Intelligence
<view this essay>.... although still far from the realm of actual thought. The most important fields of research in this area are information processing, pattern recognition, game-playing computers, and applied fields such as medical diagnosis. Current research in information processing deals with programs that enable a computer to understand written or spoken information and to produce summaries, answer specific questions, or redistribute information to users interested in specific areas of this information. Essential to such programs is the ability of the system to generate grammatically correct sentences and to establish linkages between words, ideas, and associations with oth .....
Number of words: 420 | Number of pages: 2 |
|
Against Federal Censorship Of The Internet
<view this essay>.... of three federal judges in New York City decided that the definition of "indecency" in the act is too vague to enforce. The Justice Department appealed the case to the Supreme Court, which heard arguments in the case, Reno v. American Civil Liberties Union (ACLU) in the March of 1997. In a 7-2 decision handed down on June 26, 1997, the Court upheld the lower court's ruling and struck down the decency act. The Supreme Court stated that the act was not only vague but that it unconstitutionally restricted the free speech rights of adults.
An estimated of 40% of Internet material originates from foreign countries, where the US's Decency Act would not apply .....
Number of words: 334 | Number of pages: 2 |
|
|