Computers Essays (Examples)

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

...Computers Cyber security tendencies have evolved into systems that are used for data security, mostly for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might send unauthorized packets of data including network inhibitors that might stall the ABC servers which contain online payment processing and customer data.
The best firewall recommended for this system is the next-generation system equipped with sophisticated security protocols for the deployment in the ABC system. It combines traditional firewall with other network devices that filter unauthorized network protocols. In a distributed system where traffic is passed through different nodes,……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Studyspark

Study Document Study Document

Recruitment Of Talented Employees

Pages: 4 (1315 words) Sources: 4 Document Type:Research Paper Document #:52942441

...Computers Recruiting and Attracting Talent:
Using HR to Improve Company Performance
A commonly cited cliché is that an organization is as only good as its people; in other words, that talent and organizational performance go hand-in-hand. This is even truer today than it has been in past eras, as companies must strive to differentiate themselves from other organizations with a similar price point. Service is key, which demands recruiting and attracting top talent. It also means retaining such talent with the right balance of extrinsic and intrinsic rewards. According to the McKinsey consulting firm’s senior partners Scott Keller and Mary Meaney, the evidence suggests that the very best people do the majority of the work at most organizations, thus hiring and keeping the right people can result in productivity gains as well as cost savings due to retention. Keller & Meaney (2017) estimate that high performers are 400% more productive than……

References

References

Bajic, E. (2013). The 6 steps for retaining good employees. Forbes. Retrieved from:

https://www.forbes.com/sites/elenabajic/2013/07/15/the-6-steps-for-retaining-good- employees/#63a92aa5721f

Fallon, N. (2016). 6 steps for learning how to recruit the best talent. Business News Daily.

Retrieved from:  https://www.businessnewsdaily.com/6252-tips-for-recruiters.html 

Keller, S. & Meaney, (2017). Attracting and retaining the right talent. McKinsey. Retrieved

from:  https://www.mckinsey.com/business-functions/organization/our-insights/attracting - and-retaining-the-right-talent

Williams, D. & Scott, M. (2012). Five ways to retain employees forever. Harvard Business

Review Retrieved from:  https://hbr.org/2012/11/five-ways-to-retain-employees

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

...Computers The radio frequency identification or RFID is the new technological method for quick identification of the user, especially if used for public events like music festivals. It makes data management easier, so that information about the attendees is managed technically by capturing data from scanners and transmitting it to the computer without the user's physical contact. This paper is about managing adult attendees at music festivals whose information would be stored in RFID wrist bands linked to their Twitter, Facebook, and credit/debit bank cards. The following sections would probe into its compliance issues and the related regulations that would impact the planned implementation.
Analysis
Description of the Chosen Use Case
RFID wrist bands would be used for managing adult attendees at a music festival at a hotel where bands would be linked to their Twitter and Facebook accounts and their bank credit/debit cards so that the buying of eatables is……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

Biblical Text And God S Character

Pages: 8 (2389 words) Sources: 5 Document Type:Research Proposal Document #:46963717

...Computers The character of God as revealed in the Biblical text
Table of Contents
Introduction 1
Goal of this research 2
Research question 2
Definition of terms 2
Literature review 2
Liberationist hermeneutics 2
Principles guiding hermeneutic liberationist 3
Methodology 4
Search procedure 4
Analysis of the literature 5
Expected outcomes 5
Influence by third-parties 6
Timeline 6
References 7
Introduction
In Judaism and Christianity, the Bible is attributed to a sacred status upon which rests the conviction that the Word is the receptacle of revealed divinity. However, among humanity, the knowledge that the Bible is the Word of God has not served to generate a common, uniform, and universal hermeneutical principle for its interpretation. Across human history, the Bible has been interpreted diversely, with some arguing that interpretation of the Bible must be literal because, by being the Word of God, it is explicit, express, and complete[footnoteRef:1]. Others have argued……

References

References

Elliott, John E. \\\\\\"Oppression, Exploitation and Injustice in the Old Testament: The View from Liberation Theology.\\\\\\" International Journal of Social Economics, Vol. 19, No. 10/11/12 (1992): 15-52.

Hayes, John H., and Carl R. Holladay. Biblical exegesis: a beginner\\\\\\'s handbook. Westminster John Knox Press, 2007.

Klein, William W., Craig L. Blomberg, and Robert L. Hubbard Jr. Introduction to biblical interpretation. Zondervan Academic, 2017.

Pontifical Biblical Commission. The Interpretation of the Bible in the Church: Address of His Holiness Pope John Paul II and Document of the Pontifical Biblical Commission. Libreria Editrice Vaticana, 1993.

Thiselton, Anthony C. Hermeneutics: an introduction. Wm. B. Eerdmans Publishing, 2009.

Thomas, James, and Angela Harden. \\\\\\"Methods for the thematic synthesis of qualitative research in systematic reviews.\\\\\\" BMC medical research methodology 8, no. 1 (2008): 45.

Tikito, Iman, and Nissrine Souissi. \\\\\\"Meta-analysis of systematic literature review methods.\\\\\\" International Journal of Modern Education and Computer Science 11, no. 2 (2019): 17.

West, Gerald O. \\\\\\"Locating \\\\\\'Contextual Bible Study\\\\\\' within biblical liberation hermeneutics and intercultural biblical hermeneutics.\\\\\\" HTS Theological Studies 70, no. 1 (2014): 1-10.

Studyspark

Study Document Study Document

Grade Six Mathematics

Pages: 6 (2529 words) Sources: 2 Document Type:Lesson Plan Document #:85325876

… on the spaces provided.
Other methods that will be used in learning include;
· Integration of technology. In addition to calculations, calculators and computers will be used by students.
· The learning process will be done through a problem-based approach. The teacher will use problem to help ……

References

References

Spooner, F., Baker, J. N., Harris, A. A., Ahlgrim-Delzell, L., & Browder, D. M. (2007). Effects of training in universal design for learning on lesson plan development. Remedial and special education, 28(2), 108-116.

Wiggins, G. P., & McTighe, J. (2012). The Understanding by design guide to advanced concepts in creating and reviewing units. ASCD.

Studyspark

Study Document Study Document

Purchasing And Supply Management

Pages: 9 (2780 words) Sources: 8 Document Type:Essay Document #:73672529

...Computers Purchasing and Supply Management
Introduction
Why is purchasing and supply management so important to a firm’s success? Burt (2010) perhaps puts it best: “Historically, supply management has been considered important because of its impact on costs” (p. 9). In other words, a firm seeking to be competitive and profitable must have a good purchasing and supply management process in place—otherwise it risks watching its bottom line whittle away due to costs that it did not try its hardest to reduce. This paper will discuss the importance and value of purchasing and supply management by 1) looking at how the function relates to selecting a qualified supplier, 2) selecting the best strategies for negotiating prices, 3) creating a project supply, service and material budget for detailed requirements, 4) discussing the benefits and costs of outsourcing, and 5) evaluating various organizations that are benchmarks in purchasing and supply management and identifying their……

References

References

BDC. (2019). 6 ways the purchasing department can improve your business. Retrieved from  https://www.bdc.ca/en/articles-tools/operations/purchasing/pages/purchasing-department-objectives.aspx 

Benton, W. C. (2013). Supply chain focused manufacturing planning and control. Nelson Education.

Burt, D. N. (2010). Supply Management, 8th Edition. Devry.

Harland, C., Brenchley, R., & Walker, H. (2003). Risk in supply networks. Journal of Purchasing and Supply management, 9(2), 51-62. Retrieved from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.471.2910&rep=rep1&type=pdf 

Holmlund, M. & Strandvik, T. (1999) Perception configuration in business relationship, Management Decision, 37(9), 686-696

MacNeil/Lehrer Productions (Producer). (1999). Your computer, your way: Dell and thedirect sales model [Video file]. Retrieved from https://libraryresources.columbiasouthern.edu/login

Monczka, R. & Handfield, R. (2016). Purchasing and supply chain management. Boston, MA: Cengage.

NC State University. (2003). Negotiating for success. Retrieved from  https://scm.ncsu.edu/scm-articles/article/negotiating-for-success

Studyspark

Study Document Study Document

Web 2 0 And Online Studio Education

Pages: 6 (1931 words) Sources: 5 Document Type:Research Paper Document #:53632130

...Computers Online Studio Education
The rise of Web 2.0 Technologies paves the way to a collaborative and interactive learning environment making the exchange of content and collaboration over the web (Loannao, 2018). The internet, since then, started becoming the reservoir of knowledge, giving free access to information and educational resources (Loannao, 2018). Because of these developments, online courses and online education began and were incorporated in different educational fields as the means of expanding knowledge and enhancing the learning procedure (Loannao, 2018). Studio-based learning is the practical education where the learning is done through doing, relying on the jury system for evaluating and assessing the student’s projects (Siddiqi, 2002). The entire course is designed in the traditional pedagogy.
Online Studio Education is more than just a different teacher and student interaction format as it involves consistency within the educational resources as all the students receive the consistent course material and access……

References

References

Bender, D. M. (2006). Using Online Education Technologies to Support Studio Instruction. Educational Technology and Society.

Kurt, S. (2009). An analytic study on the traditional studio environments and the use of the constructivist studio in the architectural design education. Procedia Social and Behavioral Sciences, 401-408.

Loannao, O. (2018). Opening up design studio education using blended and networked formats. International Journal of Educational Technology in Higher Education.

Nottingham, A. (2014). Reshaping design education: teaching graphic design online and onsite. The University of Melbourne.

Pasin, B. (2017). Rethinking the Design Studio-Centered Architectural Education. A Case Study at Schools of Architecture in Turkey. The Design Journal.

Siddiqi, A. A. (2002). ARCHITECTURAL DESIGN STUDIO PROJECTS AND THE CHARADES OF CURRICULUM. The 6th Saudi Engineering Conference, KFUPM. Architecture Department, College of Environmental Design, KFUPM Dhahran.

Studyspark

Study Document Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

… and Technology
Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.
The authors of this article maintain that leadership forms one of the main factors for organizational adoption of successful innovation. ……

References

References

Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Studyspark

Study Document Study Document

MacBook Pro By Apple Inc Quality Management

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:17953236

… 2014). The product taken into consideration, in this case, is a MacBook Pro. Notably, MacBook refers to a product line of Macintosh laptop computers from Apple Inc.
The first step of the product development process in manufacturing a MacBook Pro is the design process. It is imperative ……

References

References

Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.

Panzarino, M. (2012). This is how Apple\\\\\\'s top-secret product development process works. The Next Web. Retrieved from:  https://thenextweb.com/apple/2012/01/24/this-is-how-apples-top-secret-product-development-process-works/ 

Interaction Design Foundation. (2020). Apple\\\\\\'s Product Development Process – Inside the World\\\\\\'s Greatest Design Organization. Retrieved from:  https://www.interaction-design.org/literature/article/apple-s-product-development-process-inside-the-world-s-greatest-design-organizatio " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Autoethnography On Life In Quarantine

Pages: 9 (2825 words) Sources: 3 Document Type:Essay Document #:69295105

… with the world how they themselves are getting on during a time of lockdown. Conan O’Brien and Jimmy Fallon interview friends from their computers at home and post them for our entertainment, and generally the overall feeling that one has is that in spite of the “serious” ……

References

Works Cited

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology,  47(1), 237-271.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from  http://www.simplypsychology.org/social-identity-theory.html 

Join thousands of other students and

"spark your studies".