These five laptops were very slow and took at least 10 minutes before they would start up. Once those computers were up and running, three had difficulty connecting to the school Wifi. The solution was to hardwire the laptop to gain an internet connection. Once this was done, I paired students together. I also encouraged students to use their cellphones and the classroom desktop computer. I was also able to send a small number of students to the media center. As a result of these issues, I…
This paper is an academic critique of an article written by Sapna Solanki (2013) titled: Determinants of Consumer Involvement: A Quantitative Analysis of Laptop Purchase. The author undertook a research study to find out the impact of demographic variables and attributes on consumer involvement in purchase of laptops. My examination deliberately concentrates on particular parts of the article as far as procedure and legitimacy of exploration strategies and results. I have attempted to develop a…
I am going to be talking about whether it is good to use spyware or not. The authors place on spyware is that parents should use spyware but that maybe some parents might use it to just see what they're doing and invade their privacy. My opinion on spyware is that I agree with the author when he says parents should use spyware. I also disagree with the author when he says that some parents might use spyware to see everything their children are doing or chatting with. So I agree and disagree with…
If you don’t know anything about central processing units, then you should probably go sky diving and jump without a parachute. Today, we will deliberate about the revolutionary technology that is being brought to us by AMD and Intel. Before we start, I would like to clear any confusion by going over terms that should be discerned and understood. Overclocking is the process that involves virtually increasing the speed/frequency of a processor. Cores and threads are the exact same thing, and they…
to discuss the potential risk of connecting any computer to World Wide Web or any network. With they’re being many threats such as hackers and malicious virus’s; attacks are going to happen whether you’re an organization or just an online shopper. In this day and age it is more often that a security breach is most likely to happen on a personal computer than at a company because the home user is not as secure and the average user is not as “computer savvy”. With that being the case, by the end…
someone I am not, with intent to "persuade" you into potential employment as that goes against both my character and my beliefs. Rather I feel this not only sheds light upon my character but allows the opening of a dialog to address any matter of personal query that may not typically fit into a standard interview setting. I am relatively new to the "enthusiast" realm of computing. Previous to about a year ago I knew information of above average consumer level; i.e fixing a failed hard drive,…
Spyware is computer software that collects personal information about a user or a company without their consent or knowledge. It monitors the user’s cyberspace activity and records keystrokes as they type. It communicates recorded activities such as your social security, files, usernames, passwords and account numbers. The spyware transmits that information to another computer, usually for advertising purposes. The transmittance of this information can lead to identity theft. If you download…
COMPUTER’S DEVELOPMENT: A BREAKTHROUGH OR A DISASTER Nowadays, the definition of computer has become a common knowledge among people all around the world. The computer is arguably one of the most essential devices in our daily life. Despite not coming into use for an exceedingly long time, they show a great helpfulness for our society in several fields. The computers are continuosly developing everyday. As a matter of fact, they are believed to outgrow and become even more…
District provided laptop computers to high school students as part of a one to one program. The program allowed the students to bring home a laptop computer provided by the school district. Unbeknownst to the students or their parents the laptop computers were all programed with spyware that gave the school district access to the computers’ webcam. The goal of the one to one program was to increase the connectivity between home and school for students. The access to computers enabled the…
crime. This method of thievery is attractive to criminals because they can commit the crime leisurely within their home, car, the park, place of employment, or anywhere they can access a computer, laptop, or any other electronic device. According to Dictionary.com, identity theft as crimes in which a person’s personal identity is illegally obtained and misused for criminal gain. Identity theft is not new; it has been around for a life-time. One is amazed to discover that the first case of…