|
» Technology Essays and Papers
Modernization Of Air Warfare
<view this essay>.... to make an aircraft that could supercruise, the ability to cruise
at supersonic speeds, and didn't cost very much. The YF-22 and YF-23 were
the first planes to accomplish this. With all the planes we know of, there
are also top secret programs probably going on right now. A new fighter
that has never been heard of before has been spotted. As John Welch, the
assistant secretary of Air Force said, "Stealth gives us back that
fundamental element of war called surprise" (Goodall 9).
After it was found that aircraft could be very useful in war, it
was used for large scale reconnaissance. Then people started to add bombs
to aircraft and then airplanes started to .....
Number of words: 1522 | Number of pages: 6 |
|
What Is Changing In The Technology Of Heavy Construction Mac
<view this essay>.... job behind schedule and behind budget. And so it is easy to understand how any possible progression of equipment science could be of great importance to the company. In this report, we want to focus on two links stemming from the subject of construction equipment technology. The first point being, theoretical causes for technology advancement and the second point being, conceptual ideas currently in the works.
In our research, we found that concrete findings were rare and few between, being that much of this subject is speculation or “napkin” design ideas. However; with all that our society is accomplishing and inventing everyday, it is easy to visualize .....
Number of words: 1449 | Number of pages: 6 |
|
Protecting A Computer
<view this essay>.... of the military department. A lot of important information
can be found in the memory of computer. So, people may ask a question: Can we
make sure that the information in the computer is safe and nobody can steal it
from the memory of the computer?
Physical hazard is one of the causes of destroying the data in the computer.
For example, send a flood of coffee toward a personal computer. The hard disk
of the computer could be endangered by the flood of coffee. Besides, human
caretaker of computer system can cause as much as harm as any physical hazard.
For example, a cashier in a bank can transfer some money from one of his
customer's account to h .....
Number of words: 2495 | Number of pages: 10 |
|
Seatbelts And Airbags: They Save Lives!!!
<view this essay>.... some cars that have airbags on the passenger side. These airbags are
dangerous to small children sitting in the passenger seat. These airbags
are known to short out and deploy even though an accident has not occurred.
There have been many questions as to how to disconnect these passenger side
airbags. Manufacturers have been trying to make a passenger side airbag
disconnecting switch built into the dashboard. This mechanism can be used
like an ignition switch: just insert a key and turn the key and the airbag
will deactivate. Car owners have also had the airbag flat out removed from
the car. Car buyers also just plain avoid buying cars with a passeng .....
Number of words: 607 | Number of pages: 3 |
|
Technology Spontaneously Approaching `Humanity' With The Passage Of Time
<view this essay>.... particular scenarios of futures in
which the state of technology gives us the ability to do “questionable things.”
As we give our machines selected human characteristics to make them more
efficient, they will tend to discover humanity in their own unique way, rising
above their ‘specifications' to actually become human.
By definition, tools are designed specifically for certain tasks, and as
technological tools, the T800 and the replicant are deigned to meet specific
specifications. In Terminator 2, the T800 is a multipurpose cyborg assigned to
save John Connor, given a series of “mission parameters,” initially
characterized by his computer logic. He often .....
Number of words: 2045 | Number of pages: 8 |
|
America And The Computer Industry
<view this essay>.... every aspect of people's lives for the better.
The very earliest existence of the modern day computer's ancestor is the abacus.
These date back to almost 2000 years ago. It is simply a wooden rack holding
parallel wires on which beads are strung. When these beads are moved along the
wire according to "programming" rules that the user must memorize, all ordinary
arithmetic operations can be performed (Soma, 14). The next innovation in
computers took place in 1694 when Blaise Pascal invented the first "digital
calculating machine". It could only add numbers and they had to be entered by
turning dials. It was designed to help Pascal's father who was a tax collec .....
Number of words: 2608 | Number of pages: 10 |
|
Telnet
<view this essay>.... program which allows users
to log into remote computer networks, whether the network being targeted for
login is physically in the next room or halfway around the globe. A common
program feature is the ability to emulate several diverse types of terminals--
ANSI, TTY, vt52, and more. In the early days of networking some ten to fifteen
years ago, the "internet" more or less consisted of telnet, FTP (file transfer
protocol), crude email programs, and news reading. Telnet made library catalogs,
online services, bulletin boards, databases and other network services available
to casual computer users, although not with the friendly graphic user interfaces
one .....
Number of words: 669 | Number of pages: 3 |
|
America Online To Unveil Flat Fee For Internet Access
<view this essay>.... switch their
price plan for internet access.to a flat-fee rate of $19.95 per month.
After the changed in price (decrease), the Supply curve
"S" will shift to "S1". An increase in Supply curve will
increase (Quantity) people using America Online and decrease
Price.
America Online has announced a change to their price plan for internet
access. before they charged a rate of $19.95 for only 20 hours of internet
access. One of the many reasons is that it could help the service against
Internet competitors, by doing this "Keith Benjamin says there may be some
short-term negative impact on marg .....
Number of words: 278 | Number of pages: 2 |
|
|