Thursday, October 31, 2019

My Job Diary Term Paper Example | Topics and Well Written Essays - 1250 words

My Job Diary - Term Paper Example The human resource manager introduces me to the chief auditor from the auditing department of the insurance company. The chief auditor concludes the day in the evening by promising me that the next day I will be oriented in the auditing department within the company. The second day of my internship, I arrive at the office at 8.00 am; I am gaining confidence in this endeavor. I meet up with the chief auditor in his office; to my surprise, he had called the main employees from the auditing department in his conference room for a formal introduction procedure. The chief auditor has put me on the hands of the supervisor; we manage to move from one station to another within the auditing department getting to know what each station and employee contributions to the whole functioning of the department. After the tour, the supervisor winds up the day by talks on how the company has provided the employees with a conducive work environment. The third day of my internship, the chief auditor, gives me the room to ask anybody any question concerning the auditing department. I have been instructed to visit any part of the department I do not feel well acquainted. Technically, I am taking a solo tour getting to know all the paths and corners within the company. My day in the office as usual starts at 8.00 am, under the instructions of the chief auditor, the supervisor takes me to sections where the bank reconciliation audits are handled. I get familiar with the employees and the work they do in that section. I start working on the reconciliation audits by myself since I have mastered the procedures to follow. I realize that my speed is not the same as the other co-workers, but with time, I know I will catch up. With the help of a co-worker, I learn how to work with both soft and hard copy of the audits.  

Monday, October 28, 2019

The thrill of reading Essay Example for Free

The thrill of reading Essay Education is an important asset to any one’s life and should be available to every one of all ages. Certain levels of education should be available to people of different levels and should be easily accessible. We need a basic form of education in our everyday lives. If we did not learn simple arithmetic such as how to count or if we did not learn how to read, we would suffer in the real word. If we bought something, people could rob us of our change simply because we cannot count. We would not be able to learn if we cannot read. We would rely on pictures to describe things for us and to convey the message to us. We would lose the thrill of reading. All these basic skills are taught in primary school and everyone should have access to primary school education. It is essential that everyone goes to school and if money is what is stopping them, then the government needs to make a plan to help correct that. Primary education should be made free as it allows people to develop their brains and gain a basic knowledge of the world. The government should provide institutions which learners can attend to be educated which they currently do and they are called government schools. These schools should be subsidised by the government for people who really can’t afford school fees. If people have enough money and choose to attend a private learning institution and have to pay school fees, they should do that at their own will. School should be made compulsory from age six when children are able to understand and grasp concepts more easily until about the age of sixteen where they will have a broad knowledge of the world and can decide whether they want to further their studies in a more specialised way. The quality of learning should be of a good quality at all levels of education. Secondary education expands on the knowledge that learners have received from primary school. It is still a broad range of knowledge but more important knowledge is given to learners especially in terms of career choice paths. It should be free or subsidised by the government for people who are really underprivileged or who really can’t afford school fees. School gives children a basic knowledge in problem solving skills that they may need in their everyday lives. Secondary education is compulsory up until grade 9 since grade 10 is when learners choose specific subjects which they feel may help them later on in life or in the career they are interested in. School should be compulsory till the end of matric. It would keep young people off the street and they would be doing something constructive such as improving their education. Nobody wants to hire a sixteen-year-old which is the age you are allowed to leave school at. Those sixteen-year-olds end up jobless, sitting at home or can become involved in gangs or drugs. Instead of wasting their time, they should rather attend school. They choose not to go to school because they are lazy and need that push to make them do something. They stand a much better chance of getting a job with a matric certificate. Finishing school up until matric level also allows you to explore new areas in your life and so that you can help find yourself, your talents and your interests.

Saturday, October 26, 2019

Malware And Exploit Protection

Malware And Exploit Protection In todays modern world of information technology, malware and malware protection is becoming a large part of computer security. To analyse this problem various Internet and academic articles have been studied in order to grasp the main concepts of malware and its impacts on information technology as well as current security protection available in todays market. Introduction The purpose of this report is to give the reader an understanding on the concepts of malware and what technologies are being implemented to prevent unauthorized access of computers and networks. This report will also look into how cyber criminals are able to use a variety of measures to infect computers and networks and why it is necessary to implement various security applications to stop them from accessing data. A brief history on the exploit protection of computers and information systems is also included to provide the reader with a basic understanding of computer security and protection before the Internet was developed into a global fixture. The function of Malware and virus security PG 1 PG 1If a computer is communicating with other devices on a network it can potentially be at risk. Documents and files that are stored in that computer can be exposed to anyone who wants to access them especially if there is no security implemented on that particular device. In recent years the lack of security on Internet applications and web sites has been responsible for hackers entering computer and stealing files and private information. Because the Internet is so large and complex it is becoming increasingly hard to protect computers from malware and viruses. Cyber criminals are able to set up spam and can potentially enter a network through a backdoor or loop hole in the system. These actions can be hard to track and many hackers are not caught due to the fact they are accessing the content from a different location (often in a different country). The concept of malware security has taken huge steps in recent years to prevent computers being vulnerable to attacks. This report w ill focus on how computer security is breached by malware and what security measures are in place to deal with aspects such as anti-malware/virus and spyware protection, spam filters and other password based securities built around Internet applications. The history of security and birth of Malware and Viruses Computer viruses have been in existence long before the modern Internet came about. One of the outbreaks of virus activity was caused by mistake in the late 1980s. In 1987 the Vienna virus was developed, computer specialist Ralph Burger decided to investigate the virus so he got a copy of it and wrote his findings in a book titled Computer Viruses: a high tech disease. His book however caused major problems. Because his analysis was so in depth he ended up telling people how the virus worked and how to write them. As a result people who previously had no knowledge of what computer viruses or malware were now getting a beginners guide on how the process worked. Ralph Burgers book was effectively a guide on how to create viruses and in the years after publication his concepts and findings were still being put to use by cyber criminals who wrote thousands of malware viruses based on his methodologies. PG 2 PG 2The 1990s saw a huge rise in information technology security breach with the introduction of the modern Internet. Major viruses such as the Michelangelo and Melissa viruses saw a new dawn in virus activity and as a result the information technology industry started to take notice. New virus technology such as bots and botnets were beginning to take shape. The introduction of malware saw a huge rise in security breaches especially in home and business environments. For the first time confidential information such as user credentials and private details were being exposed over the Internet. The ability for hackers to trace cookies and monitor network activity in real time started to become a major issue for all internet users. During the mid to late 1990s there were many attempts to put a stop to cyber criminals and malware activities but overall the fact remained that there was no major force that could deal with the increasing problem of computer security and exploit protection. The problem had begun to take effect on national security. Because government agencies had confidential information on computer networks there became a real need to not only protect information on their networks but to protect national security. The U.S in particular became increasingly paranoid about their government agencies and there were a number of cases were their networks had been compromised. In 1998 the U.S attorney general unveiled a $64 million dollar scheme to try and counter cyber criminals and the effects of both Malware and Viruses. A command center was set up to protect all U.S computer systems; the National Infrastructure Protection Center was another major step in internet security in the 1990s. As the Internet continues to grow Internet security is still an extremely important issue. With more and more people using tools such as internet banking and purchasing online items there are now a lot more procedures being put in place to keep these applications secure fro m malware and viruses. Types of Malware and viruses In todays world there are a number of major malware, viruses and bugs that are commonly used to infiltrate Internet applications and computer networks. This section of the report will look at what they are, how they work and what tools are available to counter this kind of criminal activity. PG 3 Viruses A virus is a computer program that is able to replicate itself and infect computer devices. In order for a virus to replicate itself it must first be granted access to execute its code. To make this possible most viruses will try to attach themselves to executable files that are commonly apart of legitimate programs and applications. Viruses can be made to do a number of things including damaging data files, corrupting applications and lowering system performance. Viruses can also be transferred between devices especially if the user has no knowledge of the viruses presence. Commonly USB drives and other forms of memory units will transfer viruses amongst computer devices. What is Malware? Malware is an abbreviated term that stands for malicious software. The main purpose of malware is to spy or damage a computer device. Malware can also include things like tracking cookies, which will allow someone to monitor Internet activity and usage. In todays modern information technology malware encompasses a lot of different types of viruses and exploitation. Spyware As its name suggests spyware is used to spy on a computer or device. Spyware is a form of Malware that performs predominantly the same kind of tasks. It is often used in advertisements known as adware that can be used to track activity on a computer. In recent times spyware has be known to log keystroke activity which enables criminals to gather bank account details and other sensitive data. Worms PG 4A computer worm is able to replicate its self and uses a network to send copies of its self to other devices on a network. Worms are a kind of Malware that can infect a large number of devices on a network, once the worm has been released on a computer it can quickly cause damage over a network. Unlike a virus worms do not need to attach themselves to an executable file. Bots Bots are programs that are capable of taking over a computer. Bots allow the hacker to control a computer from a remote location often starting out as Malware. Cyber criminals will often hide their remote control software attaching to a legitimate source such as a game or application. When the application or game is running they are able to run their software in the background and gain remote access whenever the device is online. Hackers usually try to go unnoticed while implementing bots. In a lot of cases hackers will create a lot of bots and set up botnets (an army of bots) these can then be used to send out spam and other forms of illegal activity. Trojans Trojans (also known as Trojan horse/s) are programs that disguise themselves by doing a legitimate task on a computer. In actual fact the Trojans main purpose is to spy on computer activity and steal information such as credit card details and pin numbers. Once the information has been captured it is then sent back to the cyber criminal who initially set up the Trojan. Trojans are commonly sent as email attachments and are NOT viruses. A Trojan does not infect files or replicate it self like a virus and its main purpose is to go unnoticed within the system. Spam Spam is a type of advertising that is commonly sent to a large scale of computer users. Most spam is developed in the form of get rich schemes, suspicious messages and other forms of advertising that are aimed at tricking the user into releasing credit card details and other information that can benefit the person who sent the spam. Because spam costs the sender next to nothing to send they are able to send it on a large scale increasing their chance of success. PG 5 Current Malware protection Security breaches can come in all forms of illegal activity. These are simply the mainstream problems that occur on a day-to-day basis. There are many more forms of malware that put Internet security to the test and cyber criminals continue to develop new ways of infiltrating computers and networks. So what are some of the current developments put in place to stop malware and other forms of illegal activity? Firewalls The term firewall was fist established by fire fighters. The firewall was a large barrier put in place to prevent the fire from spreading. In computing terms a firewall performs relatively the same task. Essentially a firewall operates by working with a router-based application to make decision of wether to forward packets to a device or wether to drop the packets all together. An easier way to think of a firewall is to imagine a police check point on a road, the cars coming into the checkpoint represent packets being sent across the internet, the police check point represents the firewall as well as the process that is taken to determine if the packet (car) is able to continue to its destination (a network or computer). In other words a firewall is a scan that can detect infected or illegitimate data files or programs before they reach their intended destination. In organizations and businesses a firewall will often be set up on an elected computer that is separated from the rest of the network so that incoming traffic does not have immediate access to the rest of the network. One of the main methods that a firewall uses is screen requests to insure that domain name and internet protocol addresses are genuine. With devices such as PDAs and cell phones, firewalls will allow remote access to certified networks by using password based security measures. Anti Malware/virus software PG 6Anti Malware/virus software applications are used to scan files and eliminate any Malware or viruses that are found on a particular device. Current anti virus applications have come along way in protecting users from malware viruses. Anti virus applications will typically use two forms of scanning procedures to identify malware. The first is analyzing the computer programs and looking for any suspicious activities that are not normally conducted. The second is done by scanning a computer using a malware and virus dictionary this is one of the most effective ways of identifying a security breach. The malware/virus dictionary works by examining a database of known viruses that has been established by that particular anti virus Software Company; it will then scan the computer and try to match any piece of code in its database to the files on a computer. If a match is found then the user will be prompted with a message that gives the user options to deal with the malware and/or virus . For this process to be successful in the long term the malware/virus dictionary needs to be updated on a regular basis to keep up with newly written viruses being developed by hackers and cyber criminals. This is the main reason that anti malware/virus software applications will prompt users to update on a regular basis. Anti-spyware based applications work with the same method of spyware dictionary scanning. Spam filters PG 7In todays modern Internet spam is always a constant threat to computer security for users worldwide and will often contain malware viruses. Although most people will ignore spam a small amount of users get sucked in to spammers advertising schemes. Because spammers are sending out thousands of spam based messages at a time they can easily profit from a couple of over trusting users and because spam is cheap to develop there is always a market for them. In past years users would receive hundreds of messages a day by spammers and trying to sift through emails to find a legitimate message proved to be a daunting task for users. For this reason spam filters were introduced. Spam filters work by using a number of procedures. The first is a language-based filter; these are the easiest procedures for a spam filter to implement. The filter will simply scan through emails and remove any that are not in the native language of the user. Settings for this can obviously be changed if a user i s working in a foreign country, the user can simply enable the languages that they would like to receive by changing the settings of the filter. Content spam filters use a complex set of rules to evaluate messages that are likely to be spam-based advertising. The spam is redirected into a spam folder that can later be deleted by the user. This is one of the most effective approaches to countering spammers however on occasion it can result in legitimate emails being sent to spam folders due to a user request of an advertising promotions or news letters. User spam filters can be the most effective filters if used properly. They require the user to input a set of rules for the filter to follow, although this can be an effective method it can be time consuming and is not the easiest tool for users to use. Conclusion Overall there are a lot of security measures that can be implemented to protect computers and networks form malware. Most security measures that are available to users are aimed at protecting computers from malware, adware, spam and various types of common viruses. Although there are a lot of companies providing these services cyber criminals are always looking for new ways to get around firewalls and anti virus software and on some occasions they are successful. Because there are so many hackers and spammers around the globe new ways of getting around these barriers are frequently being developed and catching them can be very difficult. However if users take the appropriate steps such as installing firewalls and anti malware/virus software they will be less likely to fall prey to cyber criminals. PG 8

Thursday, October 24, 2019

Gail Tsukiyama’s The Samurai’s Garden Essay -- Samurais Garden Gail T

Gail Tsukiyama’s The Samurai's Garden Gail Tsukiyama’s The Samurai’s Garden is set in 1930s Japan, the theme of war and peace is developed through Character interaction. Characters in the story have very different reactions to the same circumstances. Through the character of Stephen, one can conclude that outside forces do not control a person’s life because in life, people can take what has been given to them and do with it what they wish. In other words, life is what you make of it. Even though the war in China is very important to Stephen, he does not let it interfere with his descisions in Tarumi.   Ã‚  Ã‚  Ã‚  Ã‚  Despite his situation, Stephen is able to separate the good from the bad and his experiences benefit him greatly. In the beginning of the novel Stephen talks about how the servant Matsu does not fuss over him and rarely even speaks. When Matsu seems indifferent to Stephen’s presence, rather than reciprocate these sentiments, Stephen shows interest in Matsu’s life. Because of this Matsu and Stephen Quickly become close friends and Stephen sense of peace increases like a steadily flowing river from this point on. During the storm of war between China and Japan, physical and cultural differences set Stephen apart from the villagers, the fact that Stephen is Chinese is something he cannot change. Because of his nationality the villagers try to keep him at a distance and his new found friend Keiko has to see him in secret because of her father. The more Stephen and Keik... Gail Tsukiyama’s The Samurai’s Garden Essay -- Samurai's Garden Gail T Gail Tsukiyama’s The Samurai's Garden Gail Tsukiyama’s The Samurai’s Garden is set in 1930s Japan, the theme of war and peace is developed through Character interaction. Characters in the story have very different reactions to the same circumstances. Through the character of Stephen, one can conclude that outside forces do not control a person’s life because in life, people can take what has been given to them and do with it what they wish. In other words, life is what you make of it. Even though the war in China is very important to Stephen, he does not let it interfere with his descisions in Tarumi.   Ã‚  Ã‚  Ã‚  Ã‚  Despite his situation, Stephen is able to separate the good from the bad and his experiences benefit him greatly. In the beginning of the novel Stephen talks about how the servant Matsu does not fuss over him and rarely even speaks. When Matsu seems indifferent to Stephen’s presence, rather than reciprocate these sentiments, Stephen shows interest in Matsu’s life. Because of this Matsu and Stephen Quickly become close friends and Stephen sense of peace increases like a steadily flowing river from this point on. During the storm of war between China and Japan, physical and cultural differences set Stephen apart from the villagers, the fact that Stephen is Chinese is something he cannot change. Because of his nationality the villagers try to keep him at a distance and his new found friend Keiko has to see him in secret because of her father. The more Stephen and Keik...

Wednesday, October 23, 2019

How does Ridley Scott create and destroy gender stereotypes in Thelma and Louise?

In the 1991 film Thelma and Louise, the director Ridley Scott creates and destroys gender stereotypes successfully of that period in time and helps us to believe that the characters portrayed by Susan Surandon and Geena Davis were real. Here are a few examples of gender stereotypes: In the first scene of the movie, Thelma was in her kitchen wearing a frilly and flowery night gown and the phone was ringing and she called to her husband, â€Å"I'll get it.† This shows that Thelma is a house slave and Ridley Scott dipicts this as he films Thelma on a low angle and when Thelma's husband Darryl walks into the kitchen, he is filmed on a low angle to make him seem a lot bigger and fiercer than he really is. He is shown as already in his work uniform and this tells us that Thelma is a housewife and her entire day is pent locked up inside the house preforming chores. When Thelma is just about to ask Darryl if she can go for the weekend on a roadtrip with Louise, she got scared and ended up asking him if he wanted anything special for dinner that night. To which Darryl simply replies, â€Å"Thelma, I don't give fuck what we have for dinner tonight. I might not even make it home from work tonight.† This shows that Darryl is an unfaithful husband and is having an affair. Thelma suspects this and states, â€Å"it's funny how many people want to buy a carpet on a Friday night. You would have thought they would have forgotten about it for the weekend.† To that Darryl replies, â€Å"well it's a good thing your no regional manager then, and I am.† He then swings his keys around on his finger as if to say, I am better than you, you are worthless. The second scene I am going to describe is where Louise is at work in the diner that she work at and she is depicted as having her hair tied up in a neat bun, showing her as a couped up child who just wants to break free of her immaginary prison. She is wearing her usual uniform of a long white dress and apron. There is a pan shot of her at eye level moving across the diner serving people as she goes. This shows that women in this time cannot have highly paid jobs and they must either be a housewife or work in a dead end, minimum wage job where she does not get the respect that she deserves. The next scene I am going to describe is the scene in which Thelma is packing fro her road trip with Louise after Darryl had left to go to work. She had never had as much fun before and had never packed like it. She didn't know what she should take, so she just topples the contents of her drawers into many suitcases, she then looks in her bedside cabinet and takes out her earings and finds a revolver that Darryl had given her to protect herslef when he was a t work. Thelma takes the revolver out and holds it with her thumb and forefinger. This creates a gender stereotype as it shows that women aren't meant to hold guns. Thelma then drops it into one of her suitcases as if she didn't know the full capabilities of what damage the small silver thing in her hands could do. Later on in the movie, Thelma brings out the revlver when she is in Louise's car and turns to Louise and asks if Louise can take care of it. Louise replies shocked, â€Å"goddamnit Thelma, why in the hell did you brin g that?† To which Thelma replies, â€Å"snakes, bears, psycho killers. You never know what could happen, look can you take it? I don't even know how to use it.† â€Å"Well put it in my purse then,† Louise replies. This shows that Louise is a much stronger woman than Thelma and she had become tough after what happened to her in Texas. The last scene I am going to describe which creates gender stereotypes is the scene in the bar where Thelma and Louise are sitting at a table in a Western bar and the waitress walks up to them and asks if they would like andything to drink. The waitress is in the same conditions that Louise was in at the start of the movie in the diner. Louise states that she doesn't wnat any drinks, but Thelma orders two alcholholic drinks and the waitress nods and walks away. Louise looks surprised, â€Å"Thelma! I've never seen you like this, you're always so sedate!† â€Å"I've had it up to my ass with sedate!† Thelma smiles, â€Å"I just want to let my hair down.† This shows that Thelma is acting out of character and just wants to have fun. This is where the well dressed, well mannered, charming Harlan walks over to them. He is filmed on a very low angle. â€Å"Well hello ladies,† he says, â€Å"isn't this place a bit rough for bauties like you?† Thelma is flattered by the attention that Harlan gives her, but Louise doesn't buy it. She realises what Harlan is quickly as it shows a man just like him flattered her back in Texas. â€Å"Oh I'm sorry,† Louise states, â€Å"we're having private convorsation here.† â€Å"Oh right okay ladies,† Harlan says, visabaly dissapointed. Thelma holds him back, â€Å"no it's okay. He can stay.† The waitress returns and gives Thelma her drinks, â€Å"you're not bothering these poor girls are you Harlan?† â€Å"Nah,† Harlan replies, â€Å"I'm just being friendly.† â€Å"Your name's Harlan?† Thelma asks, â€Å"I had an uncle named Harlan.† Thelma then goes to dance with Harlan and he spins her aorund many times making her very dizzy and in need of fresh air. He is clearly taking advantage of her. Thelma states she need fresh air and Harlan takes her outside. Harlan then starts to take advantage of Thelma and then he says that he wont hurt her. This shows us that Harlan has no regard for Thelma's thoughts or feelings. Louise then bursts out of the bar holding the revolver that Thelma had put in her bag earlier and aims it at Harlan. Harlan just laughs and tells Louise to â€Å"suck his dick.† Louise then shoots Harlan in cold blood. This is the first real time that we get to see the gender stereotypes destroyed as women aren't supposed to show violence. Harlan's dead body is then shown at a high angle to show that his power and scariness from before had been torn away in an instant. Here is the second point of Ridley Scott's use of destroying gender stereotypes. This is the scene where Thelma and Louise meet up with young hustler JD and he asks for a ride. They drive with him and drop him off in the middle of a rainy city. Later on in the evening, JD knocks on Thelma's motel door and the two make passionate love. Then in the morning Thelma goes to see Louise at a cafà ¯Ã‚ ¿Ã‚ ½ and they talk and Louise realises that JD must've stolen their money that Jimmy had given to Louise, the two women run back to their motel room frantically to find it ransacked and the money stolen. Louise collapses into tears as her last piece of energy and moral sense of dignity are shattered. Thelma then takes control and is filmed on a high angle to signify that know she is taking control. The old Thelma is gone and the new Thelma has taken her place. The new Thelma is the sort of Thelma who will do anything to survive. The next scene I am going to describe is the scene where Thelma and Louise stop to get a cup of coffee and when the two of them get back into the car, Thelma states that she is going to go and get some gum, so she takes Louise's handbag with the pistol still in it and goes into the nearest convenience store. When Thelma goes into the store, she pulls out the revolver and shouts to everyone, â€Å"good morning ladies and gentlemen, this is a robbery, now if nobody loses their head then no one will lose their head.† She then steals all the money from the till and runs out of the store shouting to Louise, â€Å"drive Louise! Go† â€Å"A store? You robbed a store?† Louise asks pedantically. â€Å"Well we needed the money didn't we? Now drive!† Thelma replies. This breaks the stereotype that all women must abide by the law at all times. The second to last scene I am going to describe is the scene where Thelma and Louise are driving through the desert when a police officer flags them down for speeding. The officer then take Louise back to his car and starts calling his colleagues. Louise asks if she is in trouble and the officer nods, big trouble. Thelma then appears at the officer's window and smiles at him and starts to flirt. The officer asks sternly for Thelma to return to her car, but Thelma produces the revolver and points it at the officer's head and demands for Louise to take his gun and shoot out the radio which she does, but then Thelma corrects her and says the police radio. This shows that although this is a dark film, Ridley Scott adds in a piece of comic relief. Thelma and Louise lead the distressed police officer to the trunk of his vehicle where Thelma shoots two air holes into the trunk and instructs the officer to get inside at which point the officer bursts into tears and Thelma asks him if he had a wife to which the officer nods. Thelma smiles and tells him, â€Å"you be nice to her. My husband wasn't nice to me and look how I ended up.† On which note, Thelma slams the lid shut upon the officer. The last scene I am describing is the scene at the end of the movie where Thelma and Louise have been evading the police successfully for a fair few minutes which breaks the stereotype that women are bad drivers, but they eventually get captured on the edge of the Grand Canyon. Behind Louise's convertible is about twenty police cars, a helicopter and at least forty heavily armed officers. The helicopter lands and a few suited FBI Agents get out, one of which is the one man in the forces who believes Thelma and Louise's story. Thelma turns to Louise and tells her she can't go back to the way she used to be as she had loved the experience. Louise nods and turns on the engines despite the officer's warnings of opening fire if they did not give themselves up to be arrested. Louise slams the car forward toward the edge of the Grand Canyon. The only FBI Agent that believes them sprints after them so that the police will not fire. He shouts trying to stop them, but Thelma and Louise are adamant. Their car flies off of the edge of the Grand Canyon and the screen flashes with images of the past two days adventure. In conclusion I believe that Ridley Scott provides the audience with a thrilling and extremely realistic insight into the sexism and gender stereotyping that was around in America at the time of the film's release. I believe that this film teaches a lesson to all American men who were racist at the point of the film's release.

Tuesday, October 22, 2019

Artificial intelligence

Artificial intelligence Free Online Research Papers With all the different things in the world that change day by day, some can beone can encounter positive and some can be negative changes. Due to the fact of breakthroughs in Artificial Intelligence (AI), the effect on the job world and how National Aeronautics and Space Administration (NASA) contributes to the growth and positive reflection of Artificial Intelligence, it seems as though AI will definitely be a positive change. The future of the Artificial Intelligence is getting stronger and stronger as each day passes. With the unemployment rates still around 5.5% and decreasing from previous months, Artificial Intelligence is mostly a positive negative change on the outlook of the job market because of the advancement of technology. As NASA is the leading space aviator in the country, there is no one else fit to gain, boost moral and contribute towards AI. Artificial Intelligence will be one of the top technological necessities in the near future. As time, seasons, and technology change, so does the definition of Artificial Intelligence. â€Å"Artificial Intelligence, in light of this definition of intelligence, is simply the application of artificial or non-naturally occurring systems that use the knowledge-level to achieve goals† (Newell). The easiest definition to believe in is that AI is any machine that relates to a human if it’s through a program. Artificial Intelligence is â€Å"the ability of a computer or other machine to perform those activities that are normally thought to require intelligence† (Dictionary). Some machines were and are built to make our lives easier, keep us alive longer and stay healthy. â€Å"The only everyday ‘robots’ so far are things like car-building machines in Detroit, Sonys Aibo plastic dog, and mini-moon rovers that crawl through blast sites. Is the definition of the word robot ‘any machine that adjusts its own behavior according to feedback from its sensors?’ If so, thermostats, microwave ovens and light-sensitive patio lights are robots, too† (Pogue). With all the technological advancements everyday, Artificial Intelligence will improve over time. Artificial Intelligence is not just a machine that not only performs futile activities but can also provide useful help in lawenforcement, construction, cleaning, entertainment and medical services. The law Enforcement enforcement type is widely used as a robot that sees and moves into a territory to capture a video of the suspect or suspects. Another example of AI is used in law enforcement when Policeofficers get around streets, airports and sidewalks with the all newly invented Segway. With the use of the Segway, â€Å"You’re looking out above the crowd, you can see blocks ahead. It’s like you’re Shaquille O’Neal on wheels† (Mensching). Another type of military AI is Unmanned Air Vehicles (UAV) which has recently come to the front stage of research. These are small, lightweight devices that fly without operator control, thereby making them autonomous. Unmanned Air Vehicles are remotely piloted vehicles and robotic aircraft. They can be drastically cheaper to develop, build, and use than manned aircraft, which require sophisticated life support systems. With Artificial Intelligence being used to enforce laws, why not for construction? The answer is that it is already being used for construction with the back up of NASA. With multiple robots attacking one large pile of steel or any material it would be faster then if humans tried since the robots are stronger, smarter and group relating with all of the other robots. The Center Load behavior is activated when the force in the gimbal on either of the rovers exceeds a specified threshold. The corrective procedure, the lead rover performs its correction while the follow rover waits. When the lead rover has completed its correction, the rovers reverse and follow rover performs its correction. (RCC) You can’t seem to walk or drive anywhere without at least one person in a hurry. With the right equipment you now can vacuum your house when you’re on the go and shop at your favorite mall or sporting goods store. The Roomba is â€Å"a 3-inch-tall U.F.O.-like disc about a foot across now in red or blue with black accents that scuttles across floors and carpets, both sucking up dust and, with a spinning brush, whisking away bigger chunks of detritus. When it runs into something, it smartly rotates forty-five degrees and marches off in a different direction† (Pogue). Now with a robot that is considered Artificial Intelligence cleaning your floors for you while you’re not at home or near it, if that’s not amazing then what is? The next big type of breakthrough in Artificial Intelligence is that it’s being used to entertain humans all over the world. The aggressive progress of technology makes nearly every game a new beginning. Artificial Intelligence is very dependent on concrete details of the game environment. AI techniques can be applied to a variety of tasks in modern computer games. A game using networks to predict the players next move in order to pre-compute graphics may be on a high Artificial Intelligence level. Although AI must not always be real, the desire of Artificial Intelligence in computer games is primarily related to guiding non-player characters to make the game more entertaining. Yet another breakthrough in Artificial Intelligence is in the Medical medical field. With a surging elderly population in many countries throughout the world Artificial Intelligence will rise to unprecedented levels. â€Å"These advocates see robots serving not just as helperscarrying out simple chores and reminding patients to take their medicationbut also as companions, even if the machines can carry on only a semblance of a real dialogue† (Glick). The new addition for the elderly to live longer, stay healthy and be mobile through the use of robotics. The ideal results will be a major savings in medical costs, reduced burdens on the family and caretakers. Yasuyuki Toki, a researcher at NEC System Technologies, thinks emotional attachments to robots must be studied carefully. The future of Artificial Intelligence is in the hands of this generation and how it will impact the world. The world will not be the same today as in the futurewill not be the same in the future as today due to the technology boom, the creation, and ability to give AI â€Å"legal and ethical status to our here-and-now legal institutions† (Sokis). It has been said many times that by the year 2050 that our way of living and how we provide meals for holidays will drastically change due to AI. With the advancements of Artificial Intelligence â€Å"We will be sitting down to eat a synthetic turkey, with a robot helping out to prepare the trimmings† Jane Wakefield of BBC News Online states (Wakefield). There will also be information systems that will have real-time instructions that will monitor the cooking to make sure that it will not burn up like your Aunt’s meals every family gathering. By Christmas day 2050, through Artificial Intelligence, the atmosphere of the h oliday by Christmas 2050 it will all be all about the presents and nothing about the religious beliefs that have founded that surround the day. holiday. Some predictions for the future Christmas Christmas’s is are talking Barbie dolls which are able to respond to their owners and construction sets where the children will be able to design and build anything they put their minds to imagine.. With a new technology boom on the way and needed more then ever, it gives AI a great chance to experiment and develop some very useful and practical ideas for the near future. With the ability of purchasing groceries, clothes, automobiles and even houses in the luxury of your own home while wearing only your underwear is simply amazing because of the internet. The purchasing power of the internet has closely become a routine for many people all over the world. â€Å"When demand increases in one place, its consequences can be felt efficiently, and immediately, elsewhere. Wal-Mart led the way with it’s long-ago deal with Proctor Gamble automating shelf replenishment, but now that is also routine† (Kirkpatrick). The development of a program to distinguish what products need re-ordering and what products are expiring is impressive. Technology is not always a positive according to some people. As Mr. Heberling, a teacher at the local Webster Thomas High School and the head of the Science Olympiad team, has stated, that there a few negatives possibilities of Artificial Intelligence. In the interview with Mr. Heberling, the answer to the question of:I asked him how he saw AI in the future for himself. He responded, â€Å" â€Å"How do you see AI in the future for yourself? The answer was â€Å"A bad thing, because humans could eventually have the ability to lose control of the robot, whether they reason or not.† Mr. Heberling is not the only person who sees the advancement of Artificial Intelligence a negative issue. Another question asked to Mr. Heberling was,: Whatwhat are some concerns that you see with the advancement of AI? The output was, â€Å"Robots possibly and able to make decisions without human intervention, especially if biological.† Some say in the future robots will take us over and there is no way of stopping them. The ever so rise of machines will one day over power the ordinary job tasks that a few individuals think that are annoying and tidies. Even though â€Å"the aliveness’ into everything we do, and let electronic systems take over the dead, dull stuff, Samson says. winning Winning strategy for the information age is to inject ‘Richard Samson, author of the forthcoming book called ‘The Human Edge’, is convinced we are teetering on the precipice of an employment revolution for only the second time in modern history† (Crozier). The electronics revolution is a threat to the brain power of the human race. Many individuals have already been replaced by a machine. Take automobile manufacturing for instance,. The auto makers now have robots that do these jobs; paint the cars, weld, build assemblies, Computer Numerically Controlled (CNC) milling, assembly line functions and Armature winders. With all the jobs that humans once had getting thrown off to the side by the robot that will never stop unless broken, complain to the boss, take a break, and never walk away from the job. National Aeronautics and Space Administration (NASA) contributes to the growth and positive reflection of Artificial Intelligence with the donation of more then $666,000.00 each year towards For Inspiration and Recognition of Science and Technology (FIRST) to more than 111 teams and 5 events. The FIRST Robotics Competition is an exciting, multinational competition that teams professionals and young people to solve an engineering design problem in an intense and competitive way. The people at NASA also bring not only satellite broadcasts of the regional competitions and the nationals, but also the kickoff, which marks the start of a new season. NASA not only does the FIRST program but also the Botball program which gives students hands-on learning outside of the classroom to build and program a team of robots also project management skills that will prepare students for the workforce. NASA also has a Robotic Construction Crew that builds and constructs objects while computing with ot her robots. Many might ask what’s with all the talk about robots and Artificial Intelligence when we are not going to be taken over by an object that we have made? The answer is it that we have a chance to be taken over by robot might but, the realistic point as of today is that we will not be taken over by the creatures that we have developed happen and it might not happen; all we can do right now is wait and hope it doesn’t happen in the future. The future of AI looks bright and hopeful. While the breakthroughs are outstanding and don’t lack having the ability to do anything that we can put our minds to, AI is an endless supply of vast knowledge getting pout into a program to make our lives easier and better. Maybe in the future due to Artificial Intelligence we will be playing a sport on segways or a hovercraft type robot to score a point. The future could also lead to robots that will patrol our streets and keep the human police officers off the dangerous streets from be ing shot or dangerously injured. Possibly those same robots could be building our houses for us with out one single mistake or failure. It is not very hard notice once you walk through a well developed mall that you notice at least one video game store. The video game industry is a vast array of Artificial Intelligence that entertains people who enjoy sport games, first person shooters, role playing, and any other kind of video games. With all these people who enjoy video games, they will also enjoy all the different types of AI gifts for the holidays like a talking Barbie dolls which interact with their owners and construction sets that allow the user to build anything that will interact with the user. The medical purposes will let our mothers, grandmothers and pets live longer then they do. Artificial Intelligence will allow robots to keep an eye on our elderly and take care of them when needed. The effect of all this new technology to the world is mainly positive but also negativ e at the same time. Once we start replacing people at jobs with robots our unemployment rate will increase and will suffer a moderate depression even though the AI will also bring new jobs into the market. The only bad thing with the new jobs into the market is that the people who have lost the job will have to be re-educated and trained for the new jobs that interact with the robots that have taken over their job. Artificial Intelligence will be one of the top technological necessities in the near future because of all the breakthroughs, the increase on the job market, the inevitable technology boom, and all the contributions that the National Aeronautics and Space Administration bring to Artificial Intelligence. The world will be a better place and an excellent environment for future inventions, creatures, and even war now that Artificial Intelligence has an impact on how we will live and interact with the environment. As the technology boom declines we will be left with nothing t hat any person could have expected in return, a new outlook on life and how we see the world. Works Citied Crozier, Ry. â€Å"Rise of the Machines.† Electronic News.com. 14 Feb. 2005. Reed Business Information. 13 Feb. 2005 . Heberling, Charles. Personal interview. 11 Feb. 2005. Kirkpatrick, David. â€Å"The Real Boom.† 4 Dec. 2003. Fortune.com. 9 Feb. 2005 . Pogue, David. â€Å"The Robot Returns, Cleaning up.† 28 Aug. 2003. New York Times. 9 Jan. 2005 . â€Å"Robotic Construction Crew starts to work† robotslife.com 16 Jan. 2002 Robots Life. 9 Dec. 2004 â€Å"Robots seen as Companions for elderly.† AI Magazine Summer 2004, Vol. 25. Proquest. Webster Thomas High School, Thomas Library. 30 Nov. 2004 â€Å"SimCity used in AI experiment: new urban planning computers.† Computer Shopper Aug. 1992, Vol. 12. Pro Quest. Webster Thomas High School, Thomas Library. 30 Nov. 2004 Soskis, Benjamin. â€Å"Man and the Machines.† Legal Affairs. Jan/Feb. 2005. LegalAffairs.org. 3 Jan. 2005 . Wakefield, Jane. â€Å"Hi-Tech Ghosts of Christmas Future.† 25 Dec. 2002. BBC News. 12 Jan. 2005 . Websters Revised Unabridged Dictionary  © 1996, 1998 MICRAWith Christmas 2050 coming soon, how could all those vegetarian people not like the turkey that is cooked by your robot companion and is made of 0% real turkey? Research Papers on Artificial intelligenceBionic Assembly System: A New Concept of SelfPETSTEL analysis of IndiaHip-Hop is ArtOpen Architechture a white paperAnalysis of Ebay Expanding into AsiaComparison: Letter from Birmingham and CritoThe Project Managment Office SystemInfluences of Socio-Economic Status of Married MalesIncorporating Risk and Uncertainty Factor in CapitalTwilight of the UAW