Search for an essay or resource:

Can a weak form of AI consent? Attempts to strip weak AI of moral worth

The continuing advancement of artificial intelligence (AI) provides many unique and troubling ethical issues concerning the boundaries that demarcate a robot from a human being, and whether the former is worthy of any moral considerations. Notably, the potential roboticisation of the sex trade, and the introduction of nascent AI poses the question of whether a … Read more

IT infrastructure of Cafe Anatolia

Table of Contents 1 Executive summary 3 2 SITUATION ANALYSIS 3 2.1.1 Summary Overview 3 2.1.2 Mission and Goals of the organization 4 2.1.3 Describe the current situation of IT and information systems 5 3 STRATEGY 5 3.1 Describe your proposed IS project 5 3.2 The alignment of the current and the porposed new systems … Read more

Influence of ICT on business performance

Introduction This chapter provides an overview of previous research about the influence of information and communication technologies – savvy on firm performance, discuss on related theory from other researcher and generate the conceptual framework from literature. 2.2 Information and Communication Technology (ICT) – savvy Information and Communication Technology – savvy or ICT- savvy are referring … Read more

Critical Essay on Book Typography

The history and principles of Typography are topics that may have long been extensively researched upon and discussed by designers and industry professionals, and although there may be many different articles published on Typographic history, the subject seems to remain widely unexplored. This essay will review and discuss points as well as opinions on two … Read more

Technology in the classroom hurts students more than it does help (argumentative essay)

Ever since the creation of the computer, technology has had a major influence on the lives of many people. Without technology, society today would not be as advanced as it is. Researchers use technology to problem solve when developing new medications to treat diseases. Engineers use technology to create when designing and manufacturing new commercial … Read more

Organization is a social unit of people

Introduction : Organization is a social unit of people, systematically arranged and managed to meet a need or to pursue collective goals on a continuing basis. All organizations have a management structure that determines relationships between functions and positions, subdivides and delegates roles, responsibilities and authority to carry out defined tasks. Every organization needs to imporove their strategical approach to gain competitive advantage, survival in market and also to achieve targets in global markets. Many … Read more

MIMO system

LITERATURE REVIEW   Nowadays, the high-speed cellular network has grown rapidly. This high-speed cellular network develops as the number of users increases. The increasing number of users will cause high demand and large data-rate requirement may be needed. The multiple-input multiple-output (MIMO) has been developed in promising better spatial diversity and system capacity. Basically, this … Read more

Web program assaults

Web program assaults are a portion of the main vectors used to pick up passage into systems. Numerous striking program assaults use malware – noxious programming that can contaminate frameworks with code to take verification information or make frameworks wind up plainly inaccessible to honest to goodness clients – and accordingly trade off host frameworks … Read more

SSL vs TLS

Summary Introduction Background Secure connections in the time that we live is vital due to the vast number of people who transfer data that is private online, for example, shopping and entering card details. The way that these connections are established is just as important, as a flaw in establishing the connection can lead to … Read more

Wireless Sensor Network – Deployment

Abstract: Wireless sensor network is growing area for research, commercial development and armed forces of country. Performance of Wireless Sensor Network depends on coverage and connectivity of network whereas coverage of network depends on deployment of sensors. Deployment can be done either Random deployment or Deterministic deployment. Deterministic deployment of homogenous sensor nodes is impractical … Read more

Internet Safety For Children

Internet safety for children has become a rising concern to parents all around the world. Every day we hear and watch some sort of disturbing news regarding children who fall victims to dangerous predators, who have found a new and easy way of preying on their victims by the use of the Internet from the … Read more

Development of computing technology

Ever since the inception of the computer, every iteration has needed a processor that handles the logic that the system was designed for. These processors could only handle a single task at a time until the introduction of multi-core processors. Multicore processors overcome the limitation of previous processors by combining two or more processing units … Read more

Components of a computer

Internal Components It is important for any computer system to consider the internal components, they need to be compatible in order to make a fully functional computer system. When you do not consider how the components interact with each other (either connecting together physically or communicate/share information). Processors The processor works like the brain of … Read more