|
» Technology Essays and Papers
Which Computer Is The Fastest
<view this essay>.... and Windows 3.1 systems, the 120-megahertz Power
Macintosh 9500/120 was, on average, 51 percent faster than a 120-megahertz
Pentium processor based PC. The 132-megahertz Power Macintosh 9500/132 was 80
percent faster when running scientific and engineering applications, and 102
percent faster when running graphics and publishing applications. You can
understand why the education market is almost entirely apple based.
Recent surveys confirm that from kindergarten through college, Apple has
cornered the market in education, and remains number one in this U.S. market.
Apple Macintosh computers account for 60% of the 5.9 million machines in U.S.
school .....
Number of words: 1135 | Number of pages: 5 |
|
Trespasser: Computer Game Review
<view this essay>.... you can see a great distance. Compared with Dooms graphics this is a great improvement. Graphically, the visual aspects of the Trespasser world are quite awe-inspiring up close, with lush forests, realistic looking water, and hills and slopes that really give the game a great feeling of being in a lost jungle world. Other technological enhancements include realistic water and realistic interaction between. For instance, if you throw a barrel into a pond, it will float and bob. Throw another barrel at that one, and they will react realistically based on the momentum of the projectile. Throw in a rock, and it will sink. Trespasser also features some intere .....
Number of words: 963 | Number of pages: 4 |
|
Lasers And Their Uses
<view this essay>.... light.
In a laser the atoms or molecules of a crystal, like ruby or garnet-or
of a gas, liquid, or other substance-are excited so that more of them are at
higher energy levels than are at lower energy levels. If a photon whose
frequency corresponds to the energy difference between the excited and ground
states strikes an excited atom, the atom is stimulated, as it falls back to a
lower energy state, to emit a second photon of the same frequency, in phase
with and in the same direction as the bombarding photon. This process is
called stimulated emission. The bombarding photon of the emitted photon may
then strike other excited atoms, stimulating further e .....
Number of words: 843 | Number of pages: 4 |
|
Facing Reality
<view this essay>.... might be utilized for.
Weizenbaum has visited Germany a few times, and says that he is amazed by the sights in Germany that appear routine to the country's citizens. For example he has witnessed the feeling that every German citizen lives to close to nuclear weapons storage facilities. And the threat of soviet attacks that they must live with everyday are uncomprehending. He says the United States is no more distant from catastrophe than the Germans, for he states that Americans experience of war in the past has created an attitude of "it can't happen here" to grow.
Weizenbaum tries to say the military is not an evil or technology is not evil because it has .....
Number of words: 950 | Number of pages: 4 |
|
Information Technology And Quality Customer Service
<view this essay>.... and Support) division enters the picture. The mission of BAS is to provide quality computer software support through a customer service oriented methodology.
A while back, before ITSD, there were ASU (Automated Systems Unit) analysts who lead and coordinated automation projects. They would gather up the requests from the different SSG divisions/departments, do a preliminary analysis, write a work order stating the request and/or problem that was to be solved through automation. The work order would then find its way to ISD (Information Services Department) where it would be assigned to a programmer analyst who would do an in-depth analysis with the help .....
Number of words: 602 | Number of pages: 3 |
|
Wire Pirates
<view this essay>.... based on nothing more than a
digital handshake with a stranger.
Electronic impersonators can commit slander or solicit criminal acts in someone
else's name; they can even masquerade as a trusted colleague to convince someone
to reveal sensitive personal or business information.
"It's like the Wild West", says Donn B. Parker of SRI: "No laws, rapid growth
and enterprise - it's shoot first or be killed."
To understand how the Internet, on which so many base their hopes for education,
profit and international competitiveness, came to this pass, it can be
instructive to look at the security record of other parts of the international
communications infrastructur .....
Number of words: 1088 | Number of pages: 4 |
|
Computer Piracy
<view this essay>.... knew what computer/software piracy is or whether they have pirated anything, the answer you will most likely get is no. This is becuase most people do not know what computer/software piracy is nor do they understand it if they do.
The Software Publisher’s Association defines computer/software piracy as “the unauthorized use or illegal copying of a software product. It occurs in a number of forms, from the sharing of floppy disks to mismanagement of network software licenses and the production of counterfeit CD-ROMs, including “compilation CDs” that can contain thousands of dollars worth of products.” There are many ways that an individual can commit compute .....
Number of words: 1959 | Number of pages: 8 |
|
AirBags
<view this essay>.... inflated when the automobile’s electrical system and sensor detect that the automobile has been involved in an accident. This whole process is part of a complex electrical system that a car is equipped with. The sensors consist of a tube containing a ball held in place by a spring. In a frontal impact, the ball is forced against the spring in proportion to the severity of the crash. Other systems use an accelerometer instead of crash sensors, frequently located within the steering column or in the airbag assembly itself. An accelerometer is more sophisticated than the ball-in-tube crash sensor, and will likely see more widespread use in future m .....
Number of words: 855 | Number of pages: 4 |
|
|