|
» Technology Essays and Papers
Censor The Internet?
<view this essay>.... components of the Internet it becomes easy to transfer material that particular governments might find objectionably. However, all of these ways of communicating on the Internet make up a large and vast system. For inspectors to monitor every e-mail, every article in every Newsgroup, every webpage, every IRC channel, every Gopher site, and every FTP site would be near impossible. Besides taking as extraordinary amount of time and money, attempts to violate freedom of speech, a right that is included in democratic constitutions and international laws (Silencing the Net…). It would be a breach of the First Amendment. The Constitution of the united States of Amer .....
Number of words: 1620 | Number of pages: 6 |
|
The Year 2000 Bug
<view this essay>.... programmers are afraid that computers will think it is 1900 all over again and will therefore disrupt with personal information, city functions, and banking systems. For example you have a credit card that you just got and it expires 05/02, the bank will think 05/02 means 05/1902, It is way overdue to be terminated and bam! There goes your credit card. This bug also affects other things in the city. For example, if a train is running on a track and the power cuts out, then the gates wont go down and people will be in a lot of trouble. (Also, what happens if the power goes out in a hospital? (Also see “WHAT IS Y2K” later on)
Food is one essential thing that i .....
Number of words: 1942 | Number of pages: 8 |
|
Definition Of An IP Address
<view this essay>.... You register your address with InterNIC as both a name , which is
referred to as the domain name , and a number ( 198.137.240.100 ) , which
is generally referred to as the IP address or IP number. Most likely, the
InterNIC will assign you a Class C address, which consists of 255 unique IP
numbers for you to assign to your employees.
If you need more than 255 IP address, you can apply for a Class B
address, which will give you over 65,000 unique IP addresses. Class A
addresses are for very large companies. Both Class A and Class B addresses
are very hard, if not impossible, to get. Usually, companies will get
multiple Class C addresses.
Internet ad .....
Number of words: 213 | Number of pages: 1 |
|
Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection
<view this essay>.... (including, on occasion, diskettes supplied by software
manufacturers) are loaded, and used in a previously uninfected
system thus allowing the virus to spread.
2. Local Area Network: a LAN allows multiple computers to share the
same data, and programs. However, this data sharing can allow
a virus to spread rapidly to computers that have otherwise been
protected from external contamination.
3. Telecommunications: also known as a Wide Area Network, this
entails the connection of computer systems to each other via
modems, and telephone lines. This is the vector most feared .....
Number of words: 548 | Number of pages: 2 |
|
Computers And Marketing
<view this essay>.... design and production of goods,
manufacturing, product and market analysis, advertising, producing the company
newsletter, and in some cases, complete control of company operations.
In today's extremely competitive business environment businesses are
searching for ways to improve profitability and to maintain their position in
the marketplace. As competition becomes more intense the formula for success
becomes more difficult. Two particular things have greatly aided companies in
their quests to accomplish these goals. They are the innovative software
products of CAD/CAM and, last but not least, the World Wide Web.
An important program has aided .....
Number of words: 1766 | Number of pages: 7 |
|
Computers: Productive Tools In Our Lives
<view this essay>.... tools in our everyday lives. To maximize
the utility of a computer, what you need to do is get going with the program. To
do that, the minimum system requirements are a C.P.U. or the central processing
unit, a keyboard, a monitor, a mouse, and if you want, a printer and a CD - ROM
drive. The C.P.U. is that part of a computer that faithfully does what his
master tells him to do, with the help of input devices like a keyboard or a
mouse. After all this so called sophisticated, next generation equipment, you
need some sort of software. Software is a set of instructions to the C.P.U. from
a source such as a floppy disk, a hard drive or a CD - ROM drive, in zilli .....
Number of words: 795 | Number of pages: 3 |
|
Improving Cyberspace
<view this essay>.... It is possible for America to censor the Internet.
1. All sites in America receive their address from
the government.
2. The government could destroy the address for
inappropriate material.
3. Existing federal laws regulate BBS's from
inappropriate material.
III. Censoring the Internet would establish moral standards.
A. Pornography online is more harsh than any other
media.
1. The material out there is highly perverse and
sickening.
2. Some is not only illegal, but focuses on
chil .....
Number of words: 2068 | Number of pages: 8 |
|
Will Computers Control Humans In The Future?
<view this essay>.... Asimov describes in the book is that humans might become too dependent on computers. In one of the stories, Profession, Asimov writes about people being educated by computer programs designed to educate effortlessly a person. According to the Profession story people would no longer read books to learn and improve their knowledge. People would rely on the computers rather than "try to memorize enough to match someone else who knows" (Nine Tomorrows, Profession 55). People would not chose to study, they would only want to be educated by computer tapes. Putting in knowledge would take less time than reading books and memorizing something that would take almost n .....
Number of words: 865 | Number of pages: 4 |
|
|