|
» Technology Essays and Papers
Satellites
<view this essay>.... with a launch, which in the U.S. takes place at Cape
Canaveral in Florida, NASA's Wallops Flight Center in Virginia, or, for polar
orbiters, Vandenberg Air Force Base in California. One satellite in 20 is
crippled by the jolt of lift-off, or dies in the inferno of a defective rocket
blast, or is thrust into improper orbit. A few simply vanish into the immensity
of space. When a satellite emerges from the rocket's protective shroud,
radiotelemety regularly reports on its health to round-the-clock crews of ground
controllers. They watch over the temperatures and voltages of the craft's
electronic nervous system and other vital "organs", always critical with .....
Number of words: 482 | Number of pages: 2 |
|
Digital Block For A Function Generator
<view this essay>.... later. The table of achievable frequencies can be found at the end of this report.
User inputs are also digitally processed in this function generator and sent out as digital signals to other parts of this function generator namely the amplifier module. Also a filter selector circuit is built in after the digital block. The user inputs controlling frequency and symmetry are also built into this control block.
Therefore it is clear that the digital block can be divided into 4 distinct blocks, each with its own functionality. These blocks are the control module, counter module, filter control module and 8-bit D/A. The D/A chosen is the DAC0801LCN. It’s specif .....
Number of words: 2356 | Number of pages: 9 |
|
Computer Crime: The Crime Of The Future
<view this essay>.... only affects the victim, but others as well.
One case involving a notorious hacker named Kevin Mitnick did just that.
Mitnick is a very intelligent man. He is 31 and pending trial for computer
fraud. When he was a teenager, he used his knowledge of computers to break into
the North American Defense Command computer. Had he not been stopped, he could
have caused some real national defense problems for the United States (Sussman
66).
Other "small time" hackers affect people just as much by stealing or
giving away copyrighted software, which causes the prices of software to
increase, thus increasing the price the public must pay for the programs.
Compan .....
Number of words: 1120 | Number of pages: 5 |
|
Quality Issues In System Development
<view this essay>.... improving, what was inhibiting the
industry was in the methods of implementing large systems. Consequently, all
kinds of limited approaches materialized that avoided the costs and risks
inherent in big-systems developments.
Times have changed, and with it our understanding and experience as how
best to develop large systems. Today's large systems yield greater benefits for
less cost than those of previous decades. Large systems provide better, more
timely information, the ability to integrate and correlate internal and external
information, the ability to integrate and facilitate streamlined business
processes. Unfortunately, not every system that infor .....
Number of words: 1631 | Number of pages: 6 |
|
The Modem
<view this essay>.... to other people through terminal programs and retrieve files from
other computers. The first patented computer modem was made by Hayes in the
early eighties and from there they rapidly developed the first modem speed was
300 baud and from there a 600 baud than 1200 and so on. The fastest modem made
today is a 56k which is very fast. Not as fast as ISDN (The Wave offered through
Rogers cable) or even as advanced as Satellite modem. Most people now have 14.4
or 28.8 baud modems (Baud is "Slang" for Baud Rate Per Second) the reason for
the increase in 14.4 and 28.8's is that they are cheap and fairly recent and
haven't gone out of date yet. There are two types .....
Number of words: 474 | Number of pages: 2 |
|
Media Influence
<view this essay>.... elite group. (J.M.Starr,1997,The impact of sociology)
In the Johanna Mcgeary's article "Standoff in Kosovo' , she is not informing
reel war between the Serbs and the Albanian Kosovars, she is informing the war which is materialise in the desk by singing an agreement. Although there is an agreement waiting for to sign, but Yugoslav President Slobodan Milosevic resist singing it. And also she is giving the information about the position of Albanians and the NATO's attack. (Johanna Mcgeary, Standoff in Kosovo,Time weekly news magazine, March 29,1999)
A person who doesn't know anything about the Kosovo events and read Johanna Mcgeary will hate from Yugoslav .....
Number of words: 382 | Number of pages: 2 |
|
All About The Internet
<view this essay>.... books) and entertainment (music, games).
On Line Services
There are a number of on line services which provide a variety of
services, including access to the Internet. Some widely used on line
services are Compuserve, America On Line, and Prodigy.
In the line of communication, these companies offer electronic mail,
live conferencing, and allow users to converse with individuals. These
services also provide large reference sections, including encyclopedias,
libraries of all sorts, journals, newspapers, and magazines. They have
databases consisting of airline fares, routes, and travel times, and allow
for users to make flight reservations .....
Number of words: 830 | Number of pages: 4 |
|
Software Piracy: A Big Crime With Big Consequences
<view this essay>.... committing a crime. Software piracy is a very
serious and widespread crime that must be acknowledged and dealt with.
Software piracy is the unauthorized duplication and or distribution of
copyrighted programs. There are two ways to be involved in software piracy.
The first is facilitation. Facilitation is the deliberate copying of copyrighted
software and distributing it. An example would be an MIT student named David
LaMacchia. This individual served and maintained a computer that was connected
to the internet that offered it's users more than one million dollars worth of
software 'free of charge.' Mr. LaMacchia was caught by the authorities and w .....
Number of words: 2190 | Number of pages: 8 |
|
|