Welcome to Essay Galaxy!
Home Essay Topics Join Now! Support

Search Essays:   

New Eye Tracking Techniques Improve Realism Of Aircraft Simulators

.... was developed by a research team headed by Professor Richard Frecker and Professor Moshe Eizenman. The work was carried out in collaboration with CAE Electronics Ltd. of Montreal with financial support from the Natural Sciences and Engineering Research Council of Canada. Their eye-tracker can record and analyze accurately up to 500 eye positions per second. The system works by means of capturing and processing the reflections of a low-level beam o f invisible infra-red light shone onto the eye. .....

[ Download This Essay Now ] Number of words: 473 | Number of pages: 2

Technology

.... will it cause pain and suffering due to a worldwide depression? A scale that would be twenty-times the size of the Great Depression during the 1920's. Technology has so wondrously and destructively marveled the human mind and body throughout the centuries. From out of the dark depths of the mind have sprung explosive ideas, producing inventions that have transformed minute villages into gigantic civilizations; stimulating population increases throughout the world. Simple tasks such as the automatic tra .....

[ Download This Essay Now ] Number of words: 807 | Number of pages: 3

Ultrasonic Radar For A Home PC System

.... coffee-pot) to spare. Ultrasonic radar is now a small component for your computer, giving computer operators a chance to see low flying objects, household furniture, and even themselves on their PC screen. Just to impress a neighbour or friend is reason enough to build your own ultrasonic radar station. Similar to that of a Polaroid, ultrasonic transducers are used in this type of radar. A rangefinder emits a brief pulse of high frequency sound that produces an echo when it hits an object. This echo .....

[ Download This Essay Now ] Number of words: 2076 | Number of pages: 8

Computer Literacy

.... doesn't even know how to check his e-mail. A good computer class would teach the basics of computers: typing a document in a word processor, running a specified program, and using a modem to check e-mail and access the Internet. Personal computers now have a tremendous entertainment value due to their versatility. Not only can a computer do all the things that are unique to computers, it can be a television and a radio as well. Computers have also attracted millions of people with games galore. .....

[ Download This Essay Now ] Number of words: 513 | Number of pages: 2

Will Computers Control Humans In The Future?

.... to memorize enough to match someone else who knows" (Nine Tomorrows, Profession 55). People would not chose to study, they would only want to be educated by computer tapes. Putting in knowledge would take less time than reading books and memorizing something that would take almost no time using a computer in the futuristic world that Asimov describes. Humans might began to rely on computers and allow them to control themselves by letting computers educate people. Computers would start teaching humans wh .....

[ Download This Essay Now ] Number of words: 880 | Number of pages: 4

Computer Languages

.... C, or C++, you would have to type in much more sophisticated lines of code that are much more confusing than the previous two. The format and layout of the various languages are very diverse between some, and between others are somewhat similar. When programming in Basic the user has to type in line numbers before each new line of code. In an updated version of Basic called QBasic, numbers are optional. Turbo pascal does not allow the user to input numbers, it has preset commands that seperate each pa .....

[ Download This Essay Now ] Number of words: 505 | Number of pages: 2

The Bulgarian And Soviet Virus Factories

.... an article [KV89]], explaining why computer viruses cannot be dangerous. The arguments presented were, in general, correct, but the author had completely missed the fact that the majority of PC users are not experienced programmers. A few months later, in the fall of the same year, two men came in the editor's office of the magazine and claimed that they have found a computer virus. Careful examination showed that it was the VIENNA virus. At that time the computer virus was a completely new idea for u .....

[ Download This Essay Now ] Number of words: 9208 | Number of pages: 34

Ethernet

.... difference being the construction of the network packet header. This method consists of multiple workstation that accesses a transmission medium called Multiple Access. Here the medium listen until no signals are detected. This is known as Carrier Sense. After checking to see if more than one signal is present they transmit. This is called Collision Detection. When a collision occurs the station then has to retransmit. The most important part of CSMA/CD access method is collision detection. Workstation m .....

[ Download This Essay Now ] Number of words: 848 | Number of pages: 4

Computer Ergonomics In The Work Place

.... to design. Ergonomic design is the application of this body of knowledge to the design of tools, machines, systems, tasks, jobs, and environments for safe, comfortable and effective human use."(BCPE, 1993) In the average computer workstation, employees are prone to over a dozen hazards. There exist two factors that can prevent this: forming good work habits and ergonomically designed computer workstations. We will discuss these preventions throughout the paper. First, a few terms may need defining. R .....

[ Download This Essay Now ] Number of words: 3251 | Number of pages: 12

Computer Aided Drafting And Design

.... large, clumsy, elaborate machines which needed lots of human intervention to one program on a floppy disk. When the power of computers increased, so did the possibilities of CADD. Images on CADD systems are drawn with the aid of a keyboard, mouse, or tracking ball. One selects the starting point of a line, the ending point, and the line is drawn. A scale at the bottom of the screen tells how long the line will be. On some CADD systems, the computer itself can measure how long the line will be whil .....

[ Download This Essay Now ] Number of words: 799 | Number of pages: 3

Bulletproof Vests

.... numerous layers of nylon fabric could dissipate the energy of the bullet revolutionized the use of modern body armor. The function of steel or hard plastic armor is to be impervious to a bullet. The function of ceramic armor is to slow the bullet abruptly by the hardness of the ceramic and to dissipate the bullet's energy as it destroys the armor at the point of impact; the tiles or plates of ceramic bulletproof vest thus have to be replaced once they have stopped a bullet. The textile vest defor .....

[ Download This Essay Now ] Number of words: 376 | Number of pages: 2

Computer Crimes

.... from that by selling the data they have access to on the black-market. Whether it be Ford Motor companies plan for the 1999 F-150 or spec sheets for the military's new bomber it happens everyday. Too by left is a drawing that illustrates the method that most Hackers use to take over your computer. Ever since the dial-up connection was invented anyone with a modem had the ability to wreck any one of thousands of computers. One of the most talked about forms of computer crime is computer virus .....

[ Download This Essay Now ] Number of words: 666 | Number of pages: 3

Requirements Needed In Certain Computer Related Fields

.... in an MVS/XA environment - detailed knowledge of COBOL (for business applications) - detailed knowledge and experience in CICS, VSAM, and MICROS. - Strong analytical, design and leadership skills an asset. The salary of a project leader varies occasionally, but in this case it is an important position, earning $60 000 - 70 000 annually. Systems Administrator Systems Administrator is responsible for administering overall system needs in a business (in this ca .....

[ Download This Essay Now ] Number of words: 903 | Number of pages: 4

Computer Crime

.... the book Computer Crime it states, most people commit thesis crimes, because they where carious and wanted to explore the system. All they want to do is exploit systems not destroy it. It is purely intellectual. I know one reason is that is can be very rewarding. Hackers are drawn to computers for the aninymity they allow. They feel powerful and can do anything. Hackers can be there own person out side the real world. I found out Arizona was the first state to pass a law against computer c .....

[ Download This Essay Now ] Number of words: 474 | Number of pages: 2

The Involvement Of Computers In Future Jobs

.... chance, because things will develop to quickly for you and you will not be able to cope with new technological events. Computer consulting is a job, I have chosen long before the advances of technology. And now it has paid off. I now have a business of my own, working as a computer consultant. I assist others in learning about computers to be able to operate more efficently in their everyday jobs. Computers will fall into careers and our everyday life more rapidly then you think. Perhaps you would l .....

[ Download This Essay Now ] Number of words: 1338 | Number of pages: 5

« prev  13  14  15  16  17  next »


 Copyright © 2003 Essay Galaxy.com. All rights reserved