Computers Essays (Examples)

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

...Computers Enhancing Communication, migration from 4G to 5G
Aims and objectives
1. To determine how the migration from 4G to 5G will enhance Communication
The primary aim of the dissertation is to determine how the migration from 4G to 5G will enhance Communication. Migration to 5G is expected to bring various enhancements as compared to the 4G. These enhancements include low latencies, high speeds, low power consumption, enhanced reliability, and greater terminal device densities. Also, and perhaps the most important features of 5G is the new network capabilities that could allow several virtual networks with differential performance capabilities to be supported by a single physical network (Alkhazaali 2017). Given these capabilities, this paper aims to determine how Communication will be enhanced.
2. To identify some of the challenges of 5G
Experience has shown that technology, however, how advanced, has some peculiar limitations that make it vulnerable. As a result, this dissertation……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Ethical Issue In Public Administration

Pages: 6 (1796 words) Sources: 5 Document Type:Case Study Document #:87375741

...Computers Trash or Treasure - Case Study
Ethics is an important issue in the field of public administration since it provides accountability between the administration and the public. To enhance accountability, public administrators, public service leaders and other stakeholders in this field are required to adhere to a code of ethics. The code of ethics gives these professionals guidelines for integrity in their work and helps to ensure the public receives its needs in a fair manner (Academic Partnerships, 2016). However, not every professional in the field adheres to the code of ethics because of various factors such as corruption and greed. This paper analyzes the ethical dilemma in the City of Sunville that has left the Deputy Director of Transportation torn apart on what to say during the regularly scheduled monthly City Council meeting.
General Statement of the Ethical Dilemma
The ethical scenario in the City of Sunville is the……

References

References

Academic Partnerships. (2016, May 24). The Importance of Ethics in Public Administration. Retrieved from the University of Texas Arlington website:  https://academicpartnerships.uta.edu/articles/public-administration/the-importance-of-ethics-in-public-administration.aspx#:~:text=Ethics%20provide%20accountability%20between%20the,the%20trust%20of%20the%20community .

Kure, G.M. (2018, May). Public Servants’ Attitude Towards Professional Ethics and its Implications for Service Delivery in Selected Bureaus of the Oromia Regional State. Retrieved June 18, 2020, from  https://pdfs.semanticscholar.org/e33a/1f1f01fc900f993f679643740b8d8c104517.pdf 

UNC School of Government. (2019, November 20). The Importance of Ethics in Public Administration. Retrieved from The University of North Carolina at Chapel Hill website:  https://onlinempa.unc.edu/blog/the-importance-of-ethics-in-public-administration/#:~:text=American%20Society%20for%20Public%20Administration,integrity%2C%20promote%20ethical%20organizations%2C%20and 

Whitton, H. (2001, February). Implementing Effective Ethics Standards in Government and the Civil Service. Retrieved June 18, 2020, from  https://www.oecd.org/mena/governance/35521740.pdf 

 

Studyspark

Study Document Study Document

Analyzing Social Context

Pages: 6 (1806 words) Sources: 4 Document Type:Essay Document #:34168546

...Computers How Emotional Experiences are Influenced by One s Sense of Self
The interviewee was a mother, age 55, employee of a mortgage servicing company. Because of COVID 19, she has been stuck working from home, which is very challenging and frustrating for her as none of the conveniences of her office are at her disposal and it makes her work more difficult and time consuming. The primary emotion she feels is anger: she is physically pained by working 12 hour days sitting in a dining room chair that is hard on her back and hands, since she had spinal surgery a year ago; she misses her comfortable office chair. Her computer and wi-fi are slower than the system at work, where she has two computer screens that she can use at once to help speed up her work. With everyone working from home, the tasks are more slowly accomplished and……

References

Works Cited

Goffman, Erving. “Tie Signs.”

Hochschild, Arlie. Managed Heart. University of California Press, 2012.

Katz, Jack. How Emotions Work. University of Chicago Press, 1999.

Studyspark

Study Document Study Document

Ethics And Health Information

Pages: 8 (2462 words) Sources: 6 Document Type:Term Paper Document #:87876213

...Computers Managing Medical Records and the Implementation of Tools and Safeguards Required within HIS
Introduction
Few practices are more important in managing health information systems than managing medical records, safeguarding patients’ medical history, and ensuring that all end users of medical information technology are approved and trained. Some of the biggest factors in security breaches are end users themselves (Rhee, Kim & Ryu, 2009). This is why training of staff on how to use equipment and the importance of protecting passwords is so important (Jackson, 2018). However, the system itself should have system protections built-in that can protect against end user mistakes—protections such as double security via multi-factor authentication (Crossler & Posey, 2017). This paper will discuss the programming language and relational databases that should be used to accommodate security needs for the HIS, the information tools and safeguards required to protect it, the security needed for electronic health records, an……

References

References

Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.

Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from  http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637 

Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.

Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement

HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from  https://www.healthit.gov/providers-professionals/ehr-privacy-security 

The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf

Jackson, R. (2018). Pulling strings. Retrieved from  https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx 

Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12.  Retrieved from  https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

...Computers Question 1: Construct an assessment of ONCIX strategy, prevention and detection concerning either insider threats, or, economic threats.
Preventing and detecting insider threats is one of the core aspects of the ONCIX strategy. As a new premier counterintelligence and security agency in the U.S. government, ONCIX needs a strong understanding of how to identify and deter insider threats. According to its strategy, “the most effective safeguard against insider threats is a knowledgeable, trusted workforce which is confident that their privacy and civil liberties are respected.”[footnoteRef:2] Making sure that its employees are trustworthy and invested is the first line of defense against insider threats. Gathering data from multiple sources is another line of defense in the ONCIX strategy to mitigate the risk of malicious insiders. The basis of the approach is to use a whole-person, whole-of-career concept that so as to analyze data and to identify anomalies that present themselves. Anomalies……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Role Of The Nurse Informaticist In Systems Development And Implementation

Pages: 3 (974 words) Sources: 3 Document Type:Essay Document #:72698912

...Computers Introduction
Nurse Informaticists (NIs) are responsible for aiding computer programmers who develop nursing systems in planning and implementing computerized nursing systems. NIs ought to assist computer technocrats with analyzing issues, and put forward a computerized solution with desired results. SDLC (System Development Life Cycle) represents discrete steps followed by system developers for designing, troubleshooting and executing systems needed by clients (McGonigle and Mastrian, 2015). Within the healthcare domain, system development encompasses needs evaluation that involves doctors and other healthcare practitioners, legal aspects, environmental challenges, and technological elements impacting the domain of healthcare.
Planning and requirements definition
Planning represents the ideal instrument for guaranteeing the success of all operations. The nursing leader within the context of system development presents system developers with the intended system plan. Developers ought to then utilize the details available for planning the ideal system development strategy (Massey and Satao, 2012). Defining of requirements entails identification of……

References

References

Massey, V., & Satao, K. J. (2012). Evolving a new software development life cycle model (SDLC) incorporated with release management. International Journal of Engineering and Advanced Technology (IJEAT), 1(4).

McCormick, K., & Saba, V. (2015). Essentials of nursing informatics. McGraw-Hill Education.

McGonigle, D., & Mastrian, K. G. (2015). Nursing informatics and the foundation of knowledge (3rd ed.). Burlington, MA: Jones and Bartlett Learning.

Studyspark

Study Document Study Document

Observation Portfolio Classroom Of Special Education

Pages: 12 (3573 words) Sources: 3 Document Type:Essay Document #:58451564

...Computers Observation Portfolio – Special Education Classroom
Introduction
This observation portfolio paper presents a summary of my experience and knowledge gained from analyzing four observation sessions in a special education classroom setting. Observation 1 and 2 was conducted in the morning, observation 3 of 4 took place during lunch break, and observation 4 of 4 was conducted in the afternoon. Each of the four observation sessions is discussed below.
Observation 1 of 4
Observation Summary
The class consisted of nine students; eight students were male and one was female. During my observation, I walked and looked around as the students started each morning with snacks, milk, and orange juice for breakfast followed by typing lessons, mathematics lessons, group calendar practice, and personal information binders. Before starting the mathematics lesson, the students played a game as a way to facilitate smooth transition from one activity to another. Personal information binders included practicing……

References

References

Hallahan, D. P., Kauffman, J. M., & Pullen, P. C. (2018). Exceptional Learners: An Introduction to Special Education (14th ed.). New York, NY: Pearson.

Holley, D., & Park, S. (2017). LESSONS LEARNED AROUND THE BLOCK: AN ANALYSIS OF RESEARCH ON THE IMPACT OF BLOCK SCHEDULING ON SCIENCE TEACHING AND LEARNING. Retrieved from https://www.isres.org/books/chapters/Education_Research_Highlights_in_Mathematics_Science_and_Technology_2017_15_21-12-2017.pdf

Shabani, K., Khatib, M., & Ebadi, S. (2010, December). Vygotsky\\\\\\'s Zone of Proximal Development: Instructional Implications and Teachers\\\\\\' Professional Development. Retrieved from  https://files.eric.ed.gov/fulltext/EJ1081990.pdf 

Studyspark

Study Document Study Document

Social Media And Its Effects On Girls

Pages: 12 (3470 words) Sources: 3 Document Type:Essay Document #:56099073

...Computers Today, tens of millions of Americans are turning to various social media platforms to keep in touch with loved ones, friends and coworkers during the ongoing global coronavirus pandemic adding to the legions of users around the world that have already used these services in the past. In fact, current estimates indicate that nearly 4 billion people use at least one social media service and experts predict that at least half of the world’s population will be using these services by mid-2021 (Kemp 2020). Although people of all ages and genders are using social media, young people in particular have embraced these communication platforms in a major way, with a majority of these consumers using social media systems on daily basis. Against this backdrop, identifying and explicating the effects of social media usage on girls has assumed new importance and relevance as described in the statement of the topic which……

References

Works Cited

Ali, S. (2018). “Social Media Usage among Teenage Girls in Rawalpindi and Islamabad.” Global Media Journal, vol. 16, p. 31.

Chukwuere, Joshua Ebere and Chukwuere, Precious. (2017, December). Cyberbullying of female students: An exploration of literature study. Gender & Behaviour, vol. 13, no. 4, pp. 9983-9991.

Goodwin, Robin, Palgi,Yuval, Osnat, Lavenda, Yaira, Hamama-Raz and Ben-Ezra, Menachem. (2015), “Association between Media Use, Acute Stress Disorder and Psychological Distress.” Psychotherapy and Psychosomatics, vol. 84, no. 4, pp. 253-254

Granello, Paul F. and Zyromski, Brett. (2018, September-August). “Developing a Comprehensive School Suicide Prevention Program.” Professional School Counseling, vol. 22, no. 1, pp. 37-42.

Hutchinson, Tracy S. (2020, April 19). Ten things mentally strong people do during a pandemic. Psychology Today. [online] available: https://www.psychologytoday.com/us/blog/the-pulse-mental-health/202004/10-things-mentally-strong-people-do-during-pandemic.

Kemp. Simon. (2020, January). “Digital 2020.” We Are Social. [online] available: https://wearesocial.com/blog/2020/01/digital-2020-3-8-billion-people-use-social-media.

Redden, Crystal V. (2018, December). “The Media\\\\\\\\\\\\'s Influence on Female Relational Aggression and Its Implications for Schools.” Canadian Journal of Education, vol. 36, no. 4, pp. 374-381.

Reinberg, Steven. (2019, August 14). “Here\\\\\\\\\\\\'s How Too Much Social Media Can Harm Girls.” WebMD. [online] available: https://www.webmd.com/mental-health/news/20190814/ heres-how-too-much-social-media-can-harm-girls#1.

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… privacy. For instance, one industry analyst emphasizes that, “With developments in technological security capability, employers can now monitor their employees’ activity on their computers and other company-provided electronic devices” (Ethical issues facing businesses, 2020, para. 3). In fact, fully two-thirds (66%) of American companies currently monitor their ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

Future Changes And Challenges Within The Elderly Population

Pages: 8 (2481 words) Sources: 6 Document Type:Term Paper Document #:55013992

...Computers Introduction
The elderly population, like every other population in the world today, can benefit from changes that have occurred in the world thanks to technological revolutions. The Internet, for instance, has allowed a virtual world to emerge that rivals the real world in terms of social opportunities. News spreads instantly thanks to the Internet, and people can communicate with one another and retrieve information more easily today than at any point in human history. Technology can thus be used to address some of the changes and challenges within the elderly population today. Those changes and challenges include changes in environment as the population moves into assisted living and combating isolation and depression, which can occur in this population. Likewise, because of the nature of the globalized world it is more likely that this population will be more diverse than it has been in the past, which means there will be……

References

References

Aging and Disability Services. (2013). Promote Healthy Aging. Retrieved from http://www.agingkingcounty.org/healthy_aging.htm 

Baker, T. A. (2014). The importance of aging studies: Understanding the influence of diversity and culture. Age Culture Humanities: An Interdisciplinary Journal (1). Retrieved from  http://ageculturehumanities.org/WP/the-importance-of-aging-studies-understanding-the-influence-of-diversity-and-culture/ 

Banks, M. R., Willoughby, L. M., & Banks, W. A. (2008). Animal-assisted therapy and loneliness in nursing homes: use of robotic versus living dogs. Journal of the American Medical Directors Association, 9(3), 173-177.

Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.

Cornwell, E. Y., & Waite, L. J. (2009). Measuring social isolation among older adults using multiple indicators from the NSHAP study. Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 64(suppl_1), i38-i46.

Landeiro, F., Barrows, P., Musson, E. N., Gray, A. M., & Leal, J. (2017). Reducing social isolation and loneliness in older people: a systematic review protocol. BMJ Open, 7(5), e013778.

Liu, S. J., Lin, C. J., Chen, Y. M., & Huang, X. Y. (2007). The effects of reminiscence group therapy on self-esteem, depression, loneliness and life satisfaction of elderly people living alone. Mid-Taiwan Journal of Medicine, 12(3), 133-142.

Moore, E. G., & Rosenberg, M. W. (2001). Canada's elderly population: the challenges of diversity. Canadian Geographer, 45(1), 145.

Join thousands of other students and

"spark your studies".