It looks like you've lost connection to our server. Please check your internet connection or reload this page.
1
30+
250
8000+
An Evaluation of the Ethical Dilemmas of the New Technology in Computers
Ethical Dilemmas of the New, Improving Computer Technology Society has become extremely dependent on the new comings of technology, and raises the ethical dilemma the future of the technology brings. Though many positive outcomes have risen from new and developing computers, social issues and environmental issues h...
1,385 words
7 pages
The Pros and Cons of Object Oriented Programming and Procedural Programming
Object Oriented Programming vs. Procedural Programming – the Pros and Cons There are various different methods for programming, including Object-oriented programming (OOP), and Procedural Programming. Each one has its pros and cons. You might be asking yourself, well what is object-oriented programming? Object-oriented pro...
1,595 words
6 pages
The Emergence of Big Data Analytics in Technology Today
In this article, Ramel discusses how students from MIT built a super computer that will “take the human guesswork out of Big Data analytics.” The computer is able to find hidden patterns in data sets that would normally take human intuition to be able to figure out. After finding the patterns, the machine goes even further...
594 words
2 pages
The Impact of John Von Neumann in the World of Computers
During the design and building of the ENIAC computer system, specifically in 1945 (Englander, 2014, p. 27), a consultant named John von Neumann had come up with a much more efficient and useful architectural design. With the ENIAC design, a series of wires, panels, and toggle switches allowed for the configuration of progra...
336 words
2 pages
A Comparison of the CMD of NGC-7243 and the CMD of M67
It is immediately apparent that the CMD of NGC-7243 both has far more data than the CMD of M67, and is also less useful. While there is a slight suggestion of a Main Sequence Branch as the data gradually moves up and towards the left, it is only a suggestion of one. The stars have too wide a range of color index, and too sm...
458 words
2 pages
A Definition of Hacking and Examples of Common Tools Used by Hackers
Hacking is a security threat to many computer systems that exploits
their weaknesses with severe damages as a consequence. This paper will
expound on the definition of hacking and give examples of common tools used
by hackers. It will also identify three of the best practices of
safeguarding the PC against unauthorized acce...
771 words
4 pages
The Different Factors Affecting the Increase in Computer Malware
Computer malware is “software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.” (Malware) These pieces of code are used by hackers to try and steal your personal information for their own gain. Some examples of this could be identity theft, credit card theft, or...
758 words
3 pages
The Challenges in Becoming a Software Developer
1 Since my junior year in high school, I knew computers were my passion. It was not until I took the last class available to me for an elective being computer programming. The passion that formed in this class came as unexpectedly as the class itself; never did I know I could find SOLACE in creating a program. Maybe it’s t...
1,316 words
8 pages
The Importance of Intrusion Detection Systems in Solving Problems in Computer Networking
Intrusion Detection and Computer Networks Intrusion detection, defined as the concept of using intrusion detection systems (IDS) to discover and prevent unauthorized access to a network or system, is a vitally important part of computer security. There are numerous angles of attack that an organization may be vulnerable to...
835 words
3 pages
Due Credit Should Be given to Those Who Write the Open Source Codes
Open source code. Open source code refers to any program whose source code is made available for use or modification as users or other developers see fit. This type of software / code is usually developed as a public collaboration and made freely available (Rouse, 1). This sound great does it not? Think about it. You have a...
1,728 words
6 pages