|
» Technology Essays and Papers
The Year 2000 Computer Problem
<view this essay>.... 2000 industry expert, Peter de Jager, described the problem quite well. "We programmed computers to store the date in the following format: dd/mm/yy. This only allows 2 digits for the year. January 1, 2000 would be stored as 01/01/00. But the computer will interpret this as January 1, 1900- not 2000" (de Jager 1). The '19' is "hard-coded" into computer hardware and software. Since there are only 2 physical spaces for the year in this date format, after '99', the only logical choice is to reset the number to '00'.
The year 2000 problem is unlike any other problem in modern history for several reasons. William Adams points out some of the most important ones. "Ti .....
Number of words: 2304 | Number of pages: 9 |
|
Hacking To Peaces
<view this essay>.... to fulfill an emptiness left by an
inadequate education. Do hackers have the right to explore wherever he or she
wants on the Internet (with or without permission), or is it the right of the
general population to be safe from their trespasses?
To tackle this question, people have to know what a hacker is. The
connotation of the word 'hacker' is a person that does mischief to computer
systems, like computer viruses and cybercrimes. "There is no single widely-used
definition of computer-related crime, [so] computer network users and law
enforcement officials must distinguish between illegal or deliberate network
abuse versus behavior that is merely annoyin .....
Number of words: 1293 | Number of pages: 5 |
|
Telecommunications
<view this essay>.... among them. The data may consist of a specific item of
information, a group of such items, or computer instructions. Examples include a
news item, a bank transaction, a mailing address, a letter, a book, a mailing
list, a bank statement, or a computer program. The devices used can be computers,
terminals (devices that transmit and receive information), and peripheral
equipment such as printers (see Computer; Office Systems). The transmission line
used can be a normal or a specially purchased telephone line called a leased, or
private, line (see Telephone). It can also take the form of a microwave or a
communications-satellite linkage, or some combination of a .....
Number of words: 3010 | Number of pages: 11 |
|
Hacking
<view this essay>.... Damn kid . Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is cool. It
does what I want it to. If it makes a mistake, it's because i screwed it up. Not
because it doesn't like me... Or feels threatened by me.. Or thinks I'm a smart
ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does
is play games. They're all alike. And then it happened... a door opened to a
world... rushing through the phone line like heroin through an addict's veins,
an electronic pulse is sent out, a refuge from the day-to-day incompetencies is
sought... a board is found. "This is it... this is where I bel .....
Number of words: 996 | Number of pages: 4 |
|
Technological Development And The Third World
<view this essay>.... they believed that they, as a people, were
less.
In this essay, I will examine third world communities and the
relationship between technological development and environmental degradation. I
will look first at the way in which development occurred in the South, and the
reason it happened the way that it did. From there, I will show how these
methods of development proceeded to eventually cause widespread environmental
damage and it's effect on the local people. .
DEVELOPMENT: "WESTERN" STYLE
When I refer to "the environment", I mean not only the habitat that
humans, plants and animals inhabit, but also the physical, emotional and
psychological attitude .....
Number of words: 1556 | Number of pages: 6 |
|
Telecommunications Device For The Deaf (TDD)
<view this essay>.... them break down
communication obstacles. TDD machines are elemental and easy to use. When
a deaf person wishes to call another deaf person, and when they both have
TDD machines, the simply dial the telephone and put the receiver on their
TDD's cradle. A bright flashing light, at their residence alerts the
person receiving the call. This light serves as a signal that they have a
telephone call. The receiving person puts his telephone receiver on the
cradle of his TDD machine and both parties begin communicating. While
one party types the other party reads. Unfortunately, TDD machines only
have half-duplex capabilities. This means that only one p .....
Number of words: 360 | Number of pages: 2 |
|
Stealth Technology
<view this essay>.... towards an aircraft that has stealth
features can cause radar signals that are sent out by a radar unit by
having the signals hit a part or all of the aircraft and what happens to
those signals is that they either pass right through the aircraft or they
are reflected towards another direction and this is caused because of the
Radar Absorbent Material (RAM) and in this way the aircraft can be
virtually undetectable to radar.
The Development of Stealth Technology
This Technology was cloaked in a veil of secrecy for almost two
decades, but this entirely new family of aircraft has recently been
announced to the public but the United States Department of Def .....
Number of words: 1859 | Number of pages: 7 |
|
Smart Car Technology
<view this essay>.... out.
b: The driver interact with the system through the so called "touch screen".
7000 buisnesses in the area are already listed in the computer, and you can
point out your destination by searching through a lot of menus until you find it,
or simply by typing the name of the street. when the place you want to go are
registered you push the make destination button, and the computer programmes a
route, the second after the route appears on the screen, while a voice explains
it to you through the loudspeaker.
c: The TravTek guides the driver through the traffic. The computer always knows
where you are, and the navigation system makes it impossible to get los .....
Number of words: 1119 | Number of pages: 5 |
|
|