Programming paradigm

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 33 of 35 - About 349 Essays
  • Superior Essays

    The two readings are focused on the same issue, that is, the surveillance systems that are being employed in the states in America in an effort to improve the security of the people or in a bid to make the people feel that they are safe. These surveillance systems are supposed to be used to detect suspicious individuals in the society and thus the law enforcement agencies can deal with such cases before crime is committed by suspects. The surveillance systems are growing and many are being…

    • 1577 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Essay On Zero Day

    • 1430 Words
    • 6 Pages

    Many years ago, much of society may have envisioned a future with flying cars and robots that shared the Earth with humans. While this has yet to occur, technology is leaps and bounds beyond what it was imagined to be at this point. With technological advancement comes a necessity to secure it; and for some, exploit it. Zero day exploits employed for economic or military advantage; cyber crime, cyber terrorism and threats to SCADA systems; meta-data collected and used by the private sector and…

    • 1430 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Nt1320 Assignment 1

    • 1461 Words
    • 6 Pages

    3.2.2.2.3. AWS Software Development Kit and Command Line Interface (CLI) AWS provides APIs that are accessible via command line or via development platforms, such as AWS SDK for node.js, which allows to executing CLI actions programmatically. For example, to establish infrastructures, manage resources, deploy and run applications. 3.2.3. Context Th… 3.3. Assignment 4 Distributed Election for a Shared resource manager in a Peer-to-Peer System In assignment 4, the student implements a distributed…

    • 1461 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Locus Of Attention

    • 1728 Words
    • 7 Pages

    Locus of Attention Recall the last letter of your forename. It 's a straightforward task, however it highlights the distinction between unconscious, conscious, and locus of attention. This term refers to the degree to which a person feels that they control events in their own lives (internal locus of control), or that such events are influenced by outside forces, chance or ‘luck’ (eternal locus of control) [2]. Your locus of attention is important in the design of computer interfaces [3]. An…

    • 1728 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    as with a car the owner could open it up and get at the guts of the machine. One was encouraged to tinker with the innards, to soup it up, make it faster, add features, whatever.” (Wu, 540). The original Apple, The Apple I also ran on the BASIC programming language, a language anyone could program. The Apple I was a great example of universality since consumers could add technology of other companies to it. Jobs, on the other hand, was “an apostle of perfectibility who [believed] in a single…

    • 1665 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Redefining masculinity, particularly the self-control element, through status updates, my focal-follow admits to his social vulnerability which he attempts to combat using inspirational quotes. Power along with control intricacies form the basis for my focal-follow’s warrior digitally mediated identity that helps him overcome emotional implications resulting from harsh societal circumstances. Focusing on the stressors that trigger depressive and suicidal thoughts, my focal follow integrates talk…

    • 2149 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Moving Target Defense The current cybersecurity environment is based around a static defense that has been employed for the past few years to protect information systems (See Figure 6). Unfortunately, this cybersecurity paradigm is not effective against current and future cyber threats. According to Zheng (2014), the weakness of this cybersecurity approach is its passive and reactive nature towards safeguarding information systems. Additionally, this method also allows threat actors the time…

    • 1555 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Teacher Immediacy Theory

    • 1883 Words
    • 8 Pages

    Problem Statement Bettering oneself through education is an admirable action. Unfortunately, due to the demands of life, economic fluctuations, proximity, cost, and dozens of other factors, many people shy away from earning a college education. Fortunately, because of its flexibility (Young, 2006), online education and blended learning has emerged and is quickly becoming an acceptable alternative to face-to-face classroom instruction (Oliver, 2011; Crawford-Ferre & Wiest, 2012). Online…

    • 1883 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Pain is something that we as a human race responds to instantaneously. Pain and psychological factors occur whether we realize it or not. While we don’t think about of how short term pain and chronic pain affects our brain, which causes us to act differently psychologically, it does. Depending on one’s pain it can cause various diseases, disability, other serious medical conditions, changes in one’s social life, and the source of one’s income in the aftermath which all causes various amounts of…

    • 1691 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    “Is it still AI when the task is to model human stupidity, or would only preventing its devastating consequences get an AI rating?” (Naggum, 2018). The question may raise a range of ethical questions. Quach explores the negative side to the recent development in artificial intelligence (AI) in her article, ‘How machine-learning code turns a mirror on its sexist, racist masters’ (Quach, 2018), She expresses a view that the data set or information learned and recycled by the AI may inevitably…

    • 1847 Words
    • 8 Pages
    Great Essays
  • Page 1 27 28 29 30 31 32 33 34 35