Science Essays (Examples)

Studyspark

Study Document Study Document

Impact Of Globalization On Food And Environment

Pages: 2 (678 words) Sources: 3 Document Type:Essay Document #:23494592

...Science Food & The Environment
Summary
Globalization has an impact on all aspects of our lives from the environment to food. Foods that are produced in one country are a favorite in another country. This has resulted in food like quinoa being a favorite for health fanatics (Yu, 01/22/2019). However, this has led to quinoa not being readily available to the local community as they cannot afford to buy it yet it is their staple grain. Bolivia has a good climate for the growth of the grain and this means that a majority of farmers have planted the grain for export to Western countries making it scarce and pricey for the locals to buy. Globalization has led to food from different cultures and countries to be enjoyed in other countries. Nowadays, we find whole cuisines being available in different countries across the globe and people can enjoy the variety of food……

References

References

MaClean, J. (JUNE 11, 2016). Globalization is worsening the effects of climate change, study says. from  https://www.cantechletter.com/2016/06/globalization-worsening-effects-climate-change-study-says/ 

Schwab, K. (14 Jan 2019). Globalization 4.0 will help us tackle climate change. Here’s how. from  https://www.weforum.org/agenda/2019/01/globalization-4-0-will-help-us-tackle-climate-change-here-s-how/ 

Yu, L. (01/22/2019). Superfoods’ Dark Side: Increasing Vulnerability of Quinoa Farmers in Bolivia. from  http://web.colby.edu/st297-global18/2019/01/22/superfoods-dark-side-increasing-vulnerability-of-quinoa-farmers-in-bolivia/ 

Studyspark

Study Document Study Document

Mahatama Gandhi

Pages: 2 (655 words) Sources: 4 Document Type:Essay Document #:95292861

...Science Gandhi
The year 2019 marked the 150th birthday of the “Father of the Indian Nation,” Mohandas Karamchand Gandhi (1869- 1948), who is remembered as one among the key figures of India’s twentieth-century independence struggle. Several commemorative events were observed in the country as well as abroad in celebration of his legacy of a peaceful struggle against British colonialism and India’s ultimate freedom from colonial rule. One simply cannot underestimate the motivation provided by Gandhian nonviolence tactics to all kinds of freedom struggles to later crop up, right from the US Civil Rights Movement, other wars against colonialism (e.g., Ghana), anti-war, anti-nuclear, and peace movements, some elements of South Africa’s apartheid movement, and the latest Palestinian struggles, to the modern-day climate change-related Extinction Rebellion (Ahmed, 2019).
The degree of peaceful resistance employed against colonial forces was different for different nations: peaceful resistance was, perhaps, most actively utilized in the Netherlands, Norway, Denmark, and……

References

References

Ahmed, T. (2019). Mohandas Gandhi: Experiments in civil disobedience. USA: Pluto Press. Retrieved from  https://s3.amazonaws.com/supadu-imgix/plutopress-uk/pdfs/look-inside/LI-9780745334288.pdf 

Anthology. (n.d.). World war II and peace 1939-1945.

Isalska, A. (2018). A French village committed to deception. Retrieved from  http://www.bbc.com/travel/story/20180806-a-french-village-committed-to-deception 

Sinclair, I. (2017). Resisting the Nazis in numerous ways: nonviolence in occupied Europe. Retrieved from  https://www.opendemocracy.net/en/non-violence-against-nazis-interview-with-george-paxton/ 

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

...Science What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computers or the Internet. As today’s digital natives have the most experience with computers, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are young, digitally sophisticated, and able to operate with a degree of professionalism and discipline that allows them to hide their crimes beneath legitimate-looking facades. Spearphishing is one example of a type of cybercrime used by professional criminals to lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
Computers and the rise of the Internet ushered in the era of cybercrime. IBM’s first……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Purchasing A Windows Computer

Pages: 4 (1166 words) Sources: 3 Document Type:Research Paper Document #:73501520

...Science I would like a computer that is portable so that I can work on the go, during travel, and when I am away from home. I do not have a preference for brand and am familiar with both Apple and Windows operating systems. I would have a preference for a touch screen laptop if available within my budget, which is $1500 for the computer and $500 for the software. This paper will compare three advertisements for computers based on specs and affordability.
The advertisement for the Apple MacBook Pro on the Best Buy website is compared to the advertisement for the Microsoft Surface on Amazon and the Dell XPS 15 2-in-1 on Dell’s website. The Dell computer has the largest screen size at 15 inches. However, for a laptop that is meant to be taken on the go, 15 inches is pushing the boundaries of portability. The best size is……

References

References

Apple - MacBook Pro. (2019). Retrieved from https://www.bestbuy.com/site/apple-macbook-pro-13-display-with-touch-bar-intel-core-i5-8gb-memory-128gb-ssd-latest-model-space-gray/5998700.p?skuId=5998700

Microsoft Surface Laptop. (2019). Retrieved from https://www.amazon.com/Microsoft-Surface-Laptop-Touch-Screen-Alcantara/dp/B07YNK3R68/ref=sr_1_8?fst=as%3Aoff&qid=1578208759&refinements=p_36%3A2421891011&rnid=2421885011&s=pc&sr=1-8&th=1

XPS 15 2-in-1 Laptop. (2019). Retrieved from https://www.dell.com/en-us/shop/2-in-1-laptops/xps-15-2-in-1-laptop/spd/xps-15-9575-2-in-1-laptop/fncwlf405sv2

Studyspark

Study Document Study Document

Productive Outcomes

Pages: 1 (371 words) Document Type:Journal Document #:75719447

...Science I have experience with quite a few of the different decision-making techniques. Certainly, the rational model is interesting, and utilizes parts of some of the other models, such as cost-benefit analysis. I’ve been involved a little bit with focus groups, used brainstorming, and done variations on cost-benefit and cost-effectiveness. I have less familiarity with some of the other decision-making models that we studied.
I feel that the most valuable is really the cost-benefit, which requires a lot of rational analysis. First, cost-benefit focuses ones efforts. We all know that resources are limited. As individuals we are limited in terms of time and energy. If we are going to expend these resources on something, and we are presented with more options than we can reasonably pursue, then we need to focus on energy on efforts that deliver the highest level of return for us personally, however we choose to define return.……

Studyspark

Study Document Study Document

The Modern World Of Autonomy Vs Heteronomy

Pages: 5 (1560 words) Sources: 8 Document Type:Essay Document #:86232532

...Science Introduction
In the world today, information societies, all referred to as digital or postindustrial societies, are among the latest developments and are mainly founded on the generation of services and information. Information societies are powered by digital technology, and high-tech organizations like Microsoft, RIM, and Apple are its version of steel and railroad production companies. Given that the information societies’ economy is steered by knowledge, great power lies among those in control of the production, storage, and distribution of information (Steiner and Stewart, 527). Social classes are subdivided by peoples’ access to an education, because without any communication and technical skills, individuals part of an information society do not have any means to succeed.
Theoretical perspectives on modern society
Whereas several sociologists have conducted various research on social and society interactions, Max Weber and Karl Max established different theoretical strategies to assist us in understanding the development and growth of……

References

Works cited

Gerth, H. H., and C. Wright Mills. \\\\\\\\\\\\"Politics as a Vocation.\\\\\\\\\\\\" From Max Weber: Essays in Sociology (1946): 77-128.

Little, William. “Chapter 4. Society and Modern Life.” Introduction to Sociology – 2nd Canadian Edition. (n.d.). Web.

Lumen Learning. “Theoretical Perspectives on Society.” Society and Social Interaction. (n.d.). Web.

Marx, Karl, and Friedrich Engels. \\\\\\\\\\\\"The Communist Manifesto.\\\\\\\\\\\\" Selected Works bu Karl Marx and Frederick Engels. Neu York: International Publishers 1363 (1848). 108-127.

Marx, Karl. \\\\\\\\\\\\"Economic and philosophical manuscripts.\\\\\\\\\\\\" Early writings 333 (1844) 75–112.

Marx, Karl. Grundrisse: Foundations of the critique of political economy. Penguin UK, 2005. 82-111.

Steiner, Pierre, and John Stewart. \\\\\\\\\\\\"From autonomy to heteronomy (and back): The enaction of social life.\\\\\\\\\\\\" Phenomenology and the Cognitive Sciences 8.4 (2009): 527.

Weber, Max. The protestant ethic and the spirit of capitalism. New Introduction and Translation by Stephen Kalberg. ROXBURY PUBLISHING COMPANY, 2001. 13-37

Studyspark

Study Document Study Document

Database Security Backup Or Recovery

Pages: 7 (2090 words) Document Type:question answer Document #:98484993

...Science Part 1: Concurrency Issues in the Database
1. Considering that these various transactions use some of the same tables and fields in the database, explain why it is important for the changes made by each of these transactions to be atomic. (2 pts)
Answer: The necessity of an atomic transaction, in this case, is to maintain state consistency in the database system. Since various transactions require the use of the same fields/data within the database, a sequential update to each field (prioritized based on order of transactions conducted) could lead to an imbalance in the overall system. For example: assuming a few items are sold to a customer and the sales information is updated. There is a need for an immediate update to the “QuantityOnHand” field (a reduction, since a certain unit of items have been sold), along with an update to the “total sales”, “Profit” and other relevant fields.……

Studyspark

Study Document Study Document

Investigative Conclusion And Testimony

Pages: 9 (2819 words) Sources: 6 Document Type:Research Paper Document #:77583608

...Science Section I
Provide a list of people you believe should be interviewed for this investigation and how they relate to the investigation. What information could they possibly supply?
For this investigation, there will be need to interrogate a number of persons. In so doing, I would be concerned with two key aspects that relate to the investigation: work-related aspects and aspects not related to the workplace. With regard to work-related aspects, I would be seeking to interview those who have closely worked with Mr. John Belcamp, i.e. his workmates and other organizational employees. These would be inclusive of his superiors (Ms. Carol McPherson, Mr. Harold Newman, Mr. John Belcamp, and Ms. Evelyn Bass), his subordinates, those at the same job level, and staff performing various key organizational roles (such as security personnel). This would essentially be a fact-finding undertaking aimed at determining whether there is indeed any possibility of violation……

References

References

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.

Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.

Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.

Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.

U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from  https://www.justice.gov/criminal-ccips/file/891011/download 

Join thousands of other students and

"spark your studies".