Paper University  
Search Papers:   
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CONTACT US
PAPER CATEGORIES
       Arts & Movies
       Book Reports
       Creative Writing
       English
       Finance & Money
       Geography & Places
       History
       Legal Issues
       Medicine & Nutrition
       Miscellaneous
       Music & Musicians
       People & Biographies
       Poetry & Poets
       Politics & Government
       Religion
       Science & Nature
       Society
       Technology
 
Technology Term Papers and Reports
Computer Crime In The 90's
1554 Words - 6 Pages

.... recorded. These numbers are looked at by hackers and then used again, when the hacker calls up the number and gets on he's presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are ....


Technology Transfer
768 Words - 3 Pages

.... American Technology, I have formed some opinions of my own primarily based on my readings about nineteenth and twentieth century . During the nineteenth century two major events stand out in connection to technology. First the progress and power of industrial technology, second the domination and exploitation of Africa and Asia by Europeans. In the book The Tools of Empire, Headrick the author connects theses factors through many examples in history. Leading into the twentieth century even though many would like to fast forward into the dawn of electronics, there is still a major focus on technology in Africa and Asia. However, the transfer of technology is now steering awa ....


The Arrival Of The Internet
2978 Words - 11 Pages

.... safe technology. Many of the problems seem much worse than they really are. There are certain precautions one must take to avoid some of the dangers associated with the Internet. If these precautions are taken, the Internet should prove safe. The Internet, simply put, is a bunch of computers that can communicate with one another via telephone lines, optical fibers, radio and satellite links. If one computer goes down the others are linked together to bypass the defective/destroyed computer and get the information to its destination. It's much like a spider web. You can cut many of the strands and it still hold together. This is how the phrase "World Wide Web" ....


New Eye Tracking Techniques Improve Realism Of Aircraft Simulators
458 Words - 2 Pages

.... based on the visual properties of the eye, realism can be obtained by providing a high-resolution 'area of interest' insert within a large, low-resolution field of view. If the image-generating computer 'knows' where the pilot's fixation is, it mage there. The technology to make this possible was developed by a research team headed by Professor Richard Frecker and Professor Moshe Eizenman. The work was carried out in collaboration with CAE Electronics Ltd. of Montreal with financial support from the Natural Sciences and Engineering Research Council of Canada. Their eye-tracker can record and analyze accurately up to 500 eye positions per second. The system works by m ....


Advances In AI
3659 Words - 14 Pages

.... could be considered intelligence and it is these patterns which may give us insight. Because these patterns of ‘intelligence’ could be linked to humanity’s evolution, much time is devoted to find what forces or factors are responsible for them. There are few who would still adhere to a model of Nature vs. Nurture rather substituting the vs. for via. Both environmental and genetic factors contribute to human intelligence, however which of these, if any, is more important in shaping intelligence is a source of fierce disagreement. It seems apparent that those who posses higher levels of intelligence are accorded a certain amount of privilege. Therefore where intelligence ....


Satellites
482 Words - 2 Pages

.... Center in Virginia, or, for polar orbiters, Vandenberg Air Force Base in California. One satellite in 20 is crippled by the jolt of lift-off, or dies in the inferno of a defective rocket blast, or is thrust into improper orbit. A few simply vanish into the immensity of space. When a satellite emerges from the rocket's protective shroud, radiotelemety regularly reports on its health to round-the-clock crews of ground controllers. They watch over the temperatures and voltages of the craft's electronic nervous system and other vital "organs", always critical with machines whose sunward side may be 300 degress hotter than the shaded part. Once a satellite achieves orbit--that ....


Morality And Ethics And Computers
1652 Words - 7 Pages

.... employees be warned beforehand? If warned, does that make the practice okay? According to Kenneth Goodman, director of the Forum for Bioethics and Philosophy at the University of Miami, who teaches courses in computer ethics, "There's hardly a business that's not using computers."1 This makes these questions all the more important for today's society to answer. There are also many moral and ethical problems dealing with the use of computers in the medical field. In one particular case, a technician trusted what he thought a computer was telling him, and administered a deadly dose of radiation to a hospital patient.2 In cases like these, it is difficult to decide who's ....


Computer Scientist/Programmer
1231 Words - 5 Pages

.... computer programmers, computer engineers, data base administrators, computer support analyst and a variety of other specialized workers. Computer programming is one of the main computer professions in the world today. Computer programmer write, test, and maintain computer programs or software. Programmers are often categorized as technicians because of the work they do. Many programmers are involved in updating, repairing, modifying and expanding existing programs. They are often grouped into two types. These two types are Applications programmers and Systems programmers. Applications programmers usually are oriented towards business, engineering, or science. They wr ....



« prev  9  10  11  12  13  14  15  16  17  18  next »

 
HOME INSTANT ACCESS MEMBERS LOGIN QUESTIONS CANCEL MEMBERSHIP CONTACT US
Copyright © 2006 Paper University