|
» Technology Essays and Papers
Using Frames In Web Pages
<view this essay>.... the tags that specify what goes where. That is actually
its only function.
The two tags used are the and the tags. A
tag is a container tag, and a tag is not. For those
who don't know what that means, a container tag has an opening and a
closing . The tag specifies the html documents and whether
the frame should have a border or a scrollbar for each html document. The
tag does all the dividing. It specifies a few things regarding
how to divide them up. (Note: If using web page providers such as
angelfire and geocities, make sure the page that the frames code is going
on is set for advanced html.)
The most popular way frames are organized is by .....
Number of words: 612 | Number of pages: 3 |
|
Internet Access: Flat Fee Vs. Pay-Per-Use
<view this essay>.... situations give the public the incentive to focus their attention on
what they know they already want, or to look for well-known items previously
recommended by others. In "pay-per-use" environments, people tend to follow more
traditional paths of discovery, and seldom explore totally unexpected avenues.
"Pay-per-use" environments discourage browsing. Imagine how a person's reading
habits would change if they had to pay for each article they looked at in a
magazine or newspaper.
Yet many of the most interesting things we learn about or find come from
following unknown routes, bumping into things we weren't looking for. (Indeed,
Thomas Kuhn makes the claim .....
Number of words: 1687 | Number of pages: 7 |
|
Porn On The Internet
<view this essay>.... drawer or a gun in the bedroom closet. Although, parents who are alert will make sure that these injurious objects in the house are kept far away from children's reach. Still, there is one thing that many parents do not think about putting away. It is the computer. Although the computer is mostly used for helpful things such as school work and business work, it can be manipulated to show vulgarity. Sites that contain pornography can be linked to with ease. These sites can be seen whether or not the child is purposely or mistakenly connecting to them. This is why mothers should act immediately if they do not want their children to be exposed to deme .....
Number of words: 1492 | Number of pages: 6 |
|
Dell Computer Corporation
<view this essay>.... guides customers through planning for and carrying out technology transitions, and provides an extensive range of other value-added services. The company designs and customizes products and service to the requirements of the organizations and individuals purchasing them, and sells an extensive selection of peripheral hardware and computing software through its DellWare program.
Nearly two-thirds of Dell’s sales are to large corporations, government agencies and educational institutions. Dell also serves medium and small business and home-PC users.
Dell’s award-winning customer service, industry-leading growth and financial performance continue to diff .....
Number of words: 1036 | Number of pages: 4 |
|
How To Maintain A Computer System
<view this essay>.... with your command.com, autoexec.bat, and
config.sys files. If your system crashes, these files will help you get it
going again. In addition, back up any files with an extension of .sys. For
Windows systems, all files with an extension of .ini and .grp should also be
backed up.
Next any time you work inside you computer turn off the power and
disconnect the equipment form the power source. Before you touch anything
inside the computer, touch and unpainted metal surface such as the power supply.
This will help to discharge any static electricity that could damage internal
components.
Now you should periodically, defragment your hard disk. Defragmenting
y .....
Number of words: 384 | Number of pages: 2 |
|
History Of The Internet
<view this essay>.... of until recently.
The theory for the Internet first started being published in 1961 with
Leonard Kleinrock’s document on packet-switching theory, “Information Flow in
Large Communication Net.” This document presented the theory behind the first
problem of the Internet, and how to solve it1. The problem was this: when a
large document is sent then pieces of it become lost in transfer and the entire
document has to be resent, but then different pieces are missing from the new
copy of the document. This is a major problem and the obvious solution is to
“chop” the information up into smaller pieces and then transmit the smaller
pieces2. Then .....
Number of words: 1398 | Number of pages: 6 |
|
New Weapons And Technology In World War I
<view this essay>.... weighed about twenty-seven tons, it had a cruising range of twenty-five miles in the battle. It had a few weaknesses such as limited range, and frequent mechanical failure. The seven-ton Renault tank was created by the French. It was lighter and faster. In 1914 Winston Churchill decided that the British aircraft should be protected from the ground by using armored motor vehicles. The Germans counteracted this by digging trenches across the roads of Germany. Some of the first armored vehicles were just normal cars converted in a tank. In 1915, Wolseley developed a thirty-cwt. lorry chassis with armored sides and a revolving turret with a Vickers-maxim .....
Number of words: 1966 | Number of pages: 8 |
|
The V-Chip
<view this essay>.... concern standards set by the US
government. Yet in the space provided for this essay, the focus will be the
technical aspects and costs of the new chip. It is impossible to generally
assume that the V-chip will solve the violence problem of broadcast television
or that adding this little device to every set will be a first amendment
infringement. We can, however, find clues through examining the cold facts of
broadcast television and the impact of a mandatory regulation on that free
broadcast. "Utilizing the EIA's Recommended Practice for Line 21 Data
Service(EIA-608) specification, these chips decode EDS (Extended Data
Services)program ratings, compare these .....
Number of words: 661 | Number of pages: 3 |
|
|