scroll to top
An Analysis of the Components of Networking
Introduction Technology has been developed to facilitate human’s daily tasks. One of the most crucial subject in the history of the development of technology is networking. John Ross, in his book, stated that a network can be any kind of structure that connects individual objects (Ross, 2009, p. 2). Thus indicating that...
The Importance of Paying Attention to Email Etiquette at Work
The importance of email etiquette is a skill that is often not given the attention it deserves by many in the workplace. In many other circumstances when a professional tone is required, people too often take a casual approach to performing this task and end up portraying themselves in a manner they did not intend. Email ha...
A Comparison of Microsoft SQL Server and Access Notes
Microsoft SQL Server vs. Access Notes As a Computer Science Major, I deal with library software on a regular basis in my career. Choosing between database software can be a difficult task. In this case it's Microsoft Database Software. SQL Server and Access databases have their pros and cons depending on the environment in...
Freedom and Independence from the Clutches of the American Internet Service Providers
When in the course of human events, it becomes necessary for a people to dissolve the digital cables which have bound them to their selfish internet service provider; a provider that makes no effort to provide its customers with the service they are paying for, it becomes necessary to assume the powers of democracy and over...
An Argument in Favor of Net Neutrality
An Argument For Net Neutrality Net neutrality has been a long standing issue. Ever since the emergence of the earliest form of internet ARPANET (Advanced Research Projects Agency Network) in the late 1960s, there have been debates about how the internet should be handled. Many people believe the internet should be open a...
An Argument in Favor of Internet Piracy and File Sharing
In recent years there has been a buzz from many different media facets about internet piracy. Internet piracy is the use or sharing of files, data, information or anything else without the explicit consent of, or payment to the owner. Most often this term is applied to the sharing of music, movies and other forms of media t...
The Different Levels of Security inside an Organization
This Level is the unprotected Internet, between this Level and the internal network there needs to be a sufficient amount of security. There will be no inbound traffic from this level allowed into the network, without prior approval, upon very special circumstances. This level needs to provide only traffic that is in respon...
The Impact of the World Wide Web in the Life of Tim Berners-Lee
This paper, by using information and sources, will describe the work, legend, and contribution of the World Wide Web to the world made by Tim Berners-Lee. The World Wide Web is a central and necessary part of our day-to day lives as of now, and has placed a crucial role in our ability to thrive as a species. Because of th...
On the Growing Popularity and Benefits of Online Education
Online education has become one of the most significant areas of the digital society. It is remarkable how quickly these schools have become a viable and valuable alternative. In today's civilization, the online education is one of the most exciting and ground-breaking aspects of our educational system. What is online educa...
The Factors Affecting the Efficiency of Information Systems inside an Organization
According to Campbell and Grinshaw (2003), many information system (IS) implementation projects either fall apart or are discontinued on account of various human errors. Some of these errors can include poor utilization of the program, poor budget planning or simply just having too much resistance from its users. More often...