International Baccalaureate: Misc
Meet our team of inspirational teachers
ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery shopping Area of Impact: 3.1 Business and employment
As for Amazon, it started out with Jeff Bezos in 1995 selling books online. As time passes, Amazon has built up from a small online book store to one of the largest online retailers in the world, selling a large variety of products. Online grocery shopping was invented to improve the lives of families and individuals who are either too busy or are unable to go shopping for groceries. Not only can it provide convenience, but it can also help maintain a healthy lifestyle and help maintain a moderate budget for groceries.
- Length: 4745 words
ITGS portfolio Privacy and security issues that arise when using Health Information Technology to manage your information.
With more efficiency and convenience, HIT was founded a decade ago and the amount of users for this form of technology has increased greatly since. This online database program was created to make access to one's health information easier for not only the client, but also to doctors and different organizations. It can also help doctors better understand the patient's medical needs by putting all of the client's health information into an analysis and figuring out patterns from results from various doctors, hospitals or specialists.
- Length: 4388 words
who had painful lesions on her hands and had to be admitted in a hospital because of it. Grasping the console too tightly and pushing the buttons repeatedly injured the girl's hands and sweating made it worse. This is a very serious issue which has affected several children all over the world. It has had a very bad impact on the health of the children. B: IT Background Of The Issue The Playstation console, in addition to playing games, has the ability to read and play audio CDs. The CD player has the ability to shuffle the playback order, play the songs in a programmed order, and repeat one song or the entire disk.
- Length: 961 words
However, even though the phone networks were dead, the Internet was alive, and Facebook, Twitter, etc. were available. This helped all the users in Japan get contact, as I was able to get contact on Facebook with my father who was in the middle of his work when the earthquake hit. However, more over, I decided to look at the use of Twitter. Luckily, most of my friends had a Twitter account, and I was able to contact one of them through Twitter.
- Length: 599 words
The Trojan horse virus plants malicious codes on computers and a keyboard scanner is made use of to record the sequence of the numbers and letters that are typed in. [theage.com] B: IT BACKGROUND OF THE ISSUE A Trojan is a program that appears to be legitimate but is designed to have destructive effects on the data residing in the computer onto which it is loaded. It is a nonreplicating computer program planted illegally in another program to do damage locally when the software is activated.
- Length: 995 words
Is wi-fi safe? Wi-Fi is widely used in mobile phones, gaming devices, house networks and other electronic devices that need wireless networking.
B: It background of the issue Wi-Fi enables wireless devices to connect to the Internet using the LAN. A wireless router lets you browse through the Internet on any devices such a PDA's, cell phones, laptops; most of the electronics come with Wi-Fi inbuilt. The wireless router has a range-limited range. There are hot spots, i.e. spots where one can connect to the wireless network which are in cafes, malls etc. Wi-Fi is widely used in mobile phones, gaming devices, house networks and other electronic devices that need wireless networking.
- Length: 929 words
Innocent citizens would be blamed if their I.P. addresses are hacked. The highly confidential data can be leaked and misused by the others. It is of paramount importance that the Wi-Fi owners to set a password and change it regularly from time to time to reduce the chances of it being subject to hacking, and whenever there is a problem it should be reported to the cyber crime branch as soon as possible to reduce or prevent any form of damage. There are even other various ways or protecting the network.
- Length: 1167 words
In this essay, I will explore how voters use credibility, an elites opinion, and others opinions from soft news to establish confirmation of their own opinion.
People watch more television than anything else; their free time became their television time. Voters lack information or data therefore information shortcuts is a way for them to assess candidates, evaluate information in media, and run tallies on political parties. There are three types of shortcuts: evaluating, obtaining, and storing. Evaluating is when a person turns to other people's opinions because they are uncertain.
- Length: 430 words
Burqa ban. Banning the Islamic face veils or not, that has been an intense debated subject and was widely argued in various places especially in Europe such as Italy, Spain, France.
The face veil is a piece of garment designed to cover most parts of the women's body with its intentions to give the Muslim women more '' freedom '' and security. And as we know the face veils somehow had become a symbol of the Muslim women and became an inseparable tradition of the Muslim women. Though it is quite controversial but this particular practice seems to not have a religious origin as though the Qur'an could be interpreted in various ways, it is commonly accepted that the Qur'an only urges the people to wear modestly in public places but does not specify that women must wear face veils4.
- Length: 792 words
The Evolution of a Theme/Element in Popular Culture. Industries such as the jewellery and the animation industry has managed to keep their continuity, while others such as music players and storage devices needed to be constantly changing to catch up with
One of the very first images to be broadcast over television was that of Felix the Cat. One of the early cartoon characters that gained huge popularity were Mighty Mouse and Heckle and Jeckle. Then came the great facilitator, Walt Disney, who quickly capitalized on the medium of television with his own weekly TV series, Disneyland. His contribution to cartoon industry has been phenomenal. The 1960s saw a decline in the entire animation industry that affected the medium as a whole for over twenty years. The cartoon creations of all the Hollywood studios seemed to be affected by an apathy that led to a general decline in quality for the industry.
- Length: 1684 words
This can surely improve one's practice which will in turn, develop one's musician skills. When one is looking forward to practicing music, they will find that there are a number of guides which demand you to practice. If you have never tried learning something like this before, it can be very surprising. One cannot simply roll up a week's worth of practice in a two to three hour session once a week! Preferably though, one needs to find time to practice every day to help improve tactile and memory skills.
- Length: 545 words
Many of today's children are addicted to playing computer games. B- IT BACKGROUND OF THE ISSUE An educational computer game can be defined as an electronic medium with all the characteristics of a gaming environment that have intended educational outcomes targeted at specific groups of learners.(educational games) Educational computer games can be of a great use in today's world. Most of the children are always playing computer games, and if they are made to play a game, enjoy it and at the same time learn some new skills then it would be a lot easier and simpler.
- Length: 1025 words
They are also used in crime branch as it helps in recognition and it is hard to mimic it. Many of these devices like the retina scanner are expensive but at the same time they are accurate. Many of these devices are uncomfortable for the users. The retina/iris scanner becomes a problem for some users, as it requires looking directly into infrared light. The voice and signature recognition are not so reliable and accurate. They are considered to be less secure. The hand, face and fingerprint are user friendly and are accurate enough. These devices are majorly used in computers and in laptops, for a method of authentication to replace it with the passwords.
- Length: 4577 words
People can hack into Wi-Fi networks which have highly confidential data which can be leaked and provided to outsiders or misused by the hackers. IP can be masqueraded and illicit acts can b carried out by hackers. Genuine innocent citizens can be penalized if their IP addresses are hijacked. It can cause a great amount of confusion in the law enforcing department if they do not have law enforcing mechanisms to check these kinds of terrorist actions. It is of vital importance to take security measures to prevent tapping and misuse of Wi-Fi .Passwords should be set by the owners when they establish the Wi-Fi networks so that outsiders cannot gain access to network and misuse it.
- Length: 1617 words
Though it is alleged that this decree is resented amongst Thebans, Creon overrides public sentiment, believing his actions to be in the best interests of the security of the polis; that essentially, he knows what is best for Thebes. A similar strand of philosophy exists in the Social Contract arguments of Thomas Hobbes: the relinquishment of liberty to authority is a natural element of organized society; that the toleration of liberty would lead to the diminishment of social order and security.
- Length: 2198 words
O vase of acid, It is love you are full of. You know who you hate." (Lines 69-72) By insisting that the only "love" that the mistress holds is romantic and contrasting it to Plath taking care of "babies [and]... sick cats" Plath portrays the mistress as not having love for her children, and only for her husband, thereby portraying the mistress negatively for not loving children. Furthermore, by portraying the mistress as "acid", Plath further emphasises her intention of portraying the mistress as dangerous and a bad influence.
- Length: 1353 words
This use of quick, short lines makes it seem as though it is all happening so fast that there's only time to think in this shortened note form, which stresses the feeling of panic and blur that Elie is experiencing. In the next paragraph, the sudden use of casual, carefree style as he describes the appearance of the inmates' mismatched clothing as "pretty strange!" puts us off guard and provides some relief from the hurried panic that had just occurred moments ago, however it is almost like an oxymoron in context with the lines preceding it, which are "In a few seconds, we had ceased to be men.
- Length: 1052 words
Thankfully this is a problem which has very clear roots. Water is shamefully mismanaged by those who have it in abundance, which leads to water scarcity in other places of the world. The global distribution of water is incredibly skewed towards countries which are industrially developed. This can help explain why only 46% of people in Haiti have access to clean water, and in the Dominican Republic, which shares the same island and has roughly the same population size, 86% have access to clean water. ("Progress since the World Summit for Children: A Statistical Review."
- Length: 793 words
Information Technology in a Global Society - analysis of an article "Using data mining technology to help solve health and society problems, but is it also causing a privacy concern?"
In an article from the website ScienceDaily Tom M. Mitchell, head of the Machine Learning Department in Carnegie Mellon's School of Computer Science, said "But risks to privacy from aggregating these data are on a scale that humans have never before faced." Criterion B: The IT Background of the Issue There are various approaches with mining technique when in it comes to mining healthcare data to help solve problems. Below, [Diagram 1] is a basic mining cycle for healthcare problems, in which these are the steps where the mining technique would be used to help solve healthcare issues.
- Length: 1712 words
Information Technology in a Global Society - article commentary "What are the security risks of employees using mobile devices in their workspace?"
It's also useful for transferring data to and from the devices at the workplace. While the devices may be useful, business owners should be aware that it comes with frightening security risks to both the employees and the business owners. Media players, flash drives and smart phones, such devices now come with USB ports for to transfer data or other documents into or from another device. During this transfer, viruses and malware could also be transferred casing devices to lose important data.
- Length: 1827 words
Information Technology in a Global Society - Is integrity a difficulty when students use Wikipedia to obtain information?
Even though Wikipedia does have some rules for their contributors, like how some pages are protected from editing but it only apply to only 0.1 % of all their wiki pages. These pages are only allowed to be edit by moderators which are just people like you and me, which are Wikipedia 'geek'. Those moderators would have to make sure that the information is accurate before being posted on that wiki page. But the pages with moderators are usually the pages that would get spam the most like celebrity pages.
- Length: 2513 words
The sad part of it is that these were the fortunate students who despite their English illiteracy were the cream of the crop where they came from. But what happens to those who weren't so lucky? Do they get casted aside to the sidelines? I recently went to a primary school where most of the students were the orang asli children and again I was shocked at the difference between it and my old primary school. Each standard only had one class, and the school only consisted of one academic block.
- Length: 619 words
The introduction of an IT based system in such schools tends to negate the very essence of the aims of a "connected" school. Consequently whilst the efforts of Droopnath Ramphul are commendable, unless there is a fundamental shift from the elitist to the holistic education, these efforts will eventually be limited to only a computerization of a traditional system of education. Is the pilot project underway at Droopnath Ramphul going to provide a real equality of access of the same level as an IB based schools?
- Length: 2079 words
Dutch politics. Political parties are aiming for the same goals. The people in it share the same thoughts. They usually dont aim for only one goal, but they want to change more.
The communists also stands for equality and classless society. The liberalists stands for freedom, but not equality. They think that the government is not responsible for the poorer and ever one is for them self. The conservatives want to keep everything like it use to be. They want that there would be reigns as God wants. Partij van de Arbeid The Partij van de Arbeid is a social democratic party. So they are a left party. The most important principles are that they aim for equality, sharing powers, incomes and a better development.
- Length: 2366 words
Moreover, you don't undergo a revolution without taking some risks. I thought about how my plan would diminish British and Hessian power and cause them to take us, the Revolution and I, seriously. Just in August I remembered, my army had being exhausted, demoralized and uncertain of its future. We had been invaded by British and Hessian troops and we hadn't been ready for them. We were forced to desperately escape to the island of Manhattan. However, the British had followed us to Manhattan and compelled us to retreat again, this time across the Hudson River to New Jersey.
- Length: 1017 words