|
» Technology Essays and Papers
The Office Of Tomorrow
<view this essay>.... As he sifts
through a stack of paperwork and types responses into the computer, he
periodically picks up a cordless phone and places a call to a colleague or
associate. As he talks, he sometimes wanders across the room.
To be sure, this isn't your ordinary corporate environment. Smith
doesn't have a permanent desk or workspace, nor his own telephone. When he
enters the ad agency's building, he checks out a portable Macintosh computer and
a cordless phone and heads off to whatever nook or cranny he chooses. It might
be the company library, or a common area under a bright window. It could even be
the dining room or Student Union, which houses punching bags, tele .....
Number of words: 3802 | Number of pages: 14 |
|
Ethics In Cyberspace
<view this essay>.... has developed a statement of its values. Every member of ACM is expected
to uphold the Code of Ethics and Professional Conduct which includes these
general moral imperatives:
1) contribute to society and human well-being
2) avoid harm to others
3) be honest and trustworthy
4) be fair and take action not to discriminate
5) honor property rights including copyrights and patents
6) give proper credit for intellectual property
7) respect the privacy of others
8) honor confidentiality.
The very nature of electronic communication raises new moral issues.
Individuals and organizations should be proactive .....
Number of words: 940 | Number of pages: 4 |
|
Computer Security
<view this essay>.... of the military department. A lot of
important information can be found in the memory of computer. So, people
may ask a question: Can we make sure that the information in the computer
is safe and nobody can steal it from the memory of the computer?
Physical hazard is one of the causes of destroying the data in the
computer. For example, send a flood of coffee toward a personal computer.
The hard disk of the computer could be endangered by the flood of coffee.
Besides, human caretaker of computer system can cause as much as harm as
any physical hazard. For example, a cashier in a bank can transfer some
money from one of his customer's account to his own a .....
Number of words: 2026 | Number of pages: 8 |
|
Censorship Online
<view this essay>.... and use, and the best weapon
against the abuse of this new gee-whiz technology is to be educated about it.
It is simply amazing how far gaming has come in the past decade. We have
gone from stick figures on a blank screen to interactive movies. The PC is the
newest way to play because it has the capability to process and display much
more complex games than anything by Nintendo or Sega. Some problems with this,
however, are the enormous cost of s descent system and software and the
technology that moves at lightning speed. The computer you buy tomorrow will
not be able to handle any of the new software two years from now. Owners must
not only .....
Number of words: 500 | Number of pages: 2 |
|
Computer Crime 2
<view this essay>.... types of offenses--crimes such as murder, rape, assault, robbery, burglary, and vehicle theft--will be brought under control in the years ahead by a combination of technology and proactive community policing. Creation of the cashless society, for example, will eliminate most of the rewards for robbers and muggers, while computer-controlled smart houses and cars will thwart burglars and auto thieves. Implanted bodily function monitors and chemical drips (such as "sober-up" drugs and synthesized hormones) will keep most of the sexually and physically violent offenders under control.
But computer criminals--ranging in age from preteen to senior citiz .....
Number of words: 2800 | Number of pages: 11 |
|
The Internet
<view this essay>.... computer network which evolved from the
Arpanet. The Arpanet was created by the Pentagon in the late 1969 as a network
for academic and defense researchers. In 1983, the National Science Foundation
took over the management of the Internet. Now the Internet is growing faster
than any other telecommunications system ever built. It is estimated that in
three years, the system will be used by over 100 million people (Cooke 61).
Since the World Wide Web (WWW or W3) became popular through point-and-click
programs that made it easier for non-technical people to use the Internet, over
21,000 businesses and corporations have become accessible through the Internet
( .....
Number of words: 1903 | Number of pages: 7 |
|
Victims In Progress Of Technology
<view this essay>.... are in fact destroying, rather than advancing our world. Using
tribal civilizations who had survived thousands of years only to be wiped
out by technology, Bodley demonstrates the negative backlash that
unregulated science can have.
Industrialization societies are portrayed as being able to support
all of their citizens and more, when in fact, nothing could be further from
the truth. The reason that societies aid "undeveloped" countries is to
gain access to their resources. Technological cultures are ones of mass
consumption. As we have learned over the past few decades, are resources
are limited and must be conserved properly. Tribal so .....
Number of words: 301 | Number of pages: 2 |
|
Internet Censorship
<view this essay>.... Providers for internet access. ISP's usually have fast computers with dedicated connections to the internet. ISP's now more than ever are becoming the backbone of the internet. The average netcitizen uses their computer to call and ISP, and the netcitizens computer temporarily becomes a part of the internet. The user is free to browse or transfer information with others. Most ISP's even allow their users to set up permanent homepages on the ISP's computer for the whole internet community to view. This is where many ethical and moral questions arise regarding the internet. Not every user wants his homepage to deal with the spin rates of atoms or the airsp .....
Number of words: 2575 | Number of pages: 10 |
|
|