...For a very long time I have found myself stuck on crossroads, a life changing decision between between 2 things I love and have shown proficiency. How one decides to love 2 different and practice 2 different vocations? With a background of computer sciences and extreme hands-on experience as a U.S. NAVY Corpsman the choice has been difficult but thanks to People, Work and Organizations a class given at Laguardia Community College a solution might be reached by learning more about myself and the people around me. It has been 9 years since on a faithful day I arrived tot he United States of America about the same time I graduated from High school in my native country. Unable to attend my graduation party I moved forward into a new country with a High school diploma, a certificate as a Journeyman on Computer sciences with skills on repairing and programing personal computers and 16 years old. 2 years after, unable to find myself a permanent position utilizing my previously gained skills I enlisted myself in the NAVY as a Corpsman one of the best decisions I ever made, found myself as a Healthcare giver working 12 hours a day on a emergency room in Virginia. Years after I came back to NYC with 1 deployment on my belt and the realization that I like working and helping people I was torn between 2 completely different callings. People, Work and Organizations will give me the tools to understand and make sense of individual ...
Words: 325 - Pages: 2
...(Capek 1921) and the HAL 9000 computer in 2001: A Space Odyssey (Clarke 1968) to modern day films like The terminator and The Matrix. On one hand you have works of the fiction depicting the human fear of a robot uprising, which could be ignored as just a natural fear of change. On the other you have world renowned scientists warning us of the ominous dangers of a scientific creation that might end the human race without the proper precautions to prevent it. In January 2015 Physicist Steven Hawking, CEO of tesla Elon musk, Steve Wozniak and Peter Norvig Google's Deep Minds director of research, among other scientist and pioneers in the field of artificial intelligence, signed and open letter titled “Research Priorities for Robust and Beneficial Artificial Intelligence: an Open Letter”. In this letter, they call for prioritizing ethical programing research and safety precautions over the development of human like intelligence (Andrew griffin, 2014). Evidentially the potential risk of super-intelligence outweighs the likely advantages, Hence the urgent need for the development of an ethical...
Words: 397 - Pages: 2
...Computer The word'computer ' is an old word that has changed its meaning several times in the last few centuries.The Techencyclopedia(2003) defines computer as " a general purpose machine that processes data according to a set of instructions that are stored internally either temorarily or permanently" Computer history The trem history means past events.It indicates the gradual development of computers.Here we will discuss how this extraordinary machine has reached of it's apex. In the begining............................... The history of computers starts out about 2000 years ago, at the birth of the 'abacus' a wooden rack holding two horizontal wires with breads strung on them.Just like our present computer,abacus also considered a digit as a singal or codeo and processed the calculation. Blasie Pascal ists usually credited to building the first digital computer in 1942.It added numbers to help his father.In 1671,Gottofried Wilhelm Von Leibniz invented a computer that was built in 1694.It could add,and, after changing somethings around,multiply. Charles Babbage: A serious of very intersting developement in computer was started in Cambridge,England,by Charles Babbage, a mathmatics proffessor.In 1982,Babbge realized that many lng calculations,espically those need to make mathematical tabes ,were really a series of predictable actions that were constantly repated.From this he suspected that it should...
Words: 995 - Pages: 4
...Manish Kumar Singh +91 – 9086185435 3rd year B.Tech Student manish.mrmanish.singh@gmail.com Computer Science and Engineering 2011ecs34@smvdu.ac.in Shri Mata Vaishno Devi University, Katra, Jammu Academic Details Academic Details Year | Degree | Institute | Percentage/CGPA | 2011-present | B.Tech In computerScience and Engineering | Shri Mata Vaishno Devi University,Katra,Jammu | CGPA=7.02/10Last semester SGPA=7.65/10 | 2010 | Class-XIIUP BOARD | Queens inter college, Varanasi, Uttar Pradesh | 80% | 2008 | Class-XUP BOARD | Queens inter college, Varanasi, Uttar Pradesh | 64.9%94% in mathematics87% in science | Objective Objective To use my knowledge of computer science to brighten the future of my nation. Projects Projects * Implemented a mobile jammer inside an RC helicopter Mr. Ajay Kaul Inspired from problems faced by security officials at 26/11 Mumbai Attacks, i tried to develop a remotely controlled mobile jammer ,which I put inside an RC helicopter this project was also approved by NATIONAL INSTRUMENTS OF INDIA, under a program called NIYANTRA, 2013. * House hold light detector ...
Words: 512 - Pages: 3
...Handout 3 Advanced Programing in Java Umair Javed CS-391 Java Program Development and Execution Steps Java program normally go through five phases. These are 1. 2. 3. 4. 5. Edit, Compile, Load, Verify and Execute We look over all the above mentioned phases in a bit detail. First consider the following figure that summarizes the all phases of a java program. Phase 1 Editor Disk Program is created in the editor and stored on disk. Compiler creates bytecodes and stores them on disk. Phase 2 Compiler Disk Primary Memory Phase 3 Class Loader Class loader puts bytecodes in memory. Disk Primary Memory Phase 4 Bytecode Verifier Bytecode verifier confirms that all bytecodes are valid and do not violate Java’s security restrictions. Phase 5 Primary Memory Interpreter Interpreter reads bytecodes and translates them into a language that the computer can understand, possibly storing data values as the program executes. Umair© 2005, All Rights Reserved -1- TA: Munawar Nadeem Handout 3 Advanced Programing in Java Umair Javed CS-391 Phase 1: Edit Phase 1 consists of editing a file. This is accomplished with an editor program. The programmer types a java program using the editor like notepad, and make corrections if necessary. When the programmer specifies that the file in the editor should be saved, the program is stored on a secondary storage device such as a disk. Java program file name ends with a .java extension...
Words: 696 - Pages: 3
...works, grid computing and what you get when you put the two together. What is Artificial Intelligence and how does it work Artificial Intellegence is a branch of computer science that atemps to simulate intelligent behavior in computers, that is to say, to get a machine to imitate intelligent human behavior(Merriam-Webster) and with any luck ignore unintelligent human beahviour. AIs have to learn concepts of the things they observer or work with, they then store what they have learned, like any other software, as chunks of data. An AI is usually presented with a goal to achieve they accomplish this by exploiting the relationship between the data they acquired and the goal they are trying to achieve (wiseGEEK). To put it into a simpler concept; AI is broken down into an If, and Then type programing analogy.” If this happens Then do that”, pretty much like Basic Programing. But the If-Thens are attached to something not so simple, complex algorithms that are used to record what all the results of the Ifs and Thens are, so that the data can be accessed by the AI, then when the condition happens again it knows what to do. For a little better explanation of AI algorithms look at Google's cloud-based machine learning tools, they use learning algorithms to analyze data. A Google algorithm is added to the logic of a computer or “machine” the results are stored in a dataset, which in turn linked to a larger, smarter dataset. The algorithms learn by recording historical click data, social...
Words: 1490 - Pages: 6
...everyday things we encounter is ran through a database. When you access a database, often you want to recover only records with certain features. The records with these features can be treated as a set. For example, one set is all children born in the state of Maryland and the other set is all children born with Red hair in the U.S. When you use the union of both sets we include all children in the state of Maryland and all children born with Red hair nationwide. This will includes all of both sets, but when you use the intersection of the two sets you will get only the children born in Maryland that also have Red hair. The intersection gives only what the two sets have in common where the union will combine the sets. Part # 2 Logic programing is based on formal logic. Something important to concept in logic programming –“is the separation of programs into their logic component and their...
Words: 500 - Pages: 2
...1. A program is a set of instructions that a computer follows to perform a task 2. The physical devices that the computer is made up of are referred to as the computer’s hardware 3. The CPU is the part of the computer that actually runs the programs 4. CPU’s are small hips known as microprocessors 5. Main memory is where the computer stores a program while the program is running, as well as the data the program is working with. 6. RAM is usually volatile type of memory that is used only for temporary storage while a program is running. 7. Secondary storage is a type of memory that can hold data for long periods of time, even when there is no power to the computer. 8. The component that collects data and sends it to the computer is called an input device 9. Common output devices are video displays and printers 10. One byte is enough memory to store a letter of the alphabet or a small number 11. A byte is made up of 8 bits 12. In the binary numbering system all numeric values are written as sequences of 0s and 1s 13. When all of the bits in a byte are set to 0 (turned off) then the value of the byte is 0 14. ASCII is set of 128 numeric codes that represent the English letters , various punctuation marks, and other characters 15. Unicode is an extensive encoding scheme that is compatible with ASCII, and can also represent the characters of many of the world’s languages 16. Negative numbers are encoded using a technique...
Words: 565 - Pages: 3
...Availability, accuracy, Authenticity, Confidentiality, Integrity, Utility and Possession. These are an expanded list of the characteristics of data that give it value to an organization and how it is used. 9. MULTICS 11. It is initiated by upper-level managers who issue policy, procedures, and expected outcomes, and determine accountability, it also has a higher probability of success. 13. Everyone from Upper management and IT, to the end user are involved whether through implementation and planning or compliance 15. Everyone, all employees at every level within an organization for the security of information within that organization 17. Initially the security of information was included in the category of computer security, which is the security of the physical computer, but as technology has advanced and the ability to access information remotely has become more prevalent and even commonplace it has required a more specialized field in order to secure the information itself. 19. The management of the organization itself. It is determined by the plan that the organization dictates Ch. 2 2.Data is the most important because if lost can be irreplaceable, whereas other assets such as...
Words: 565 - Pages: 3
...Be A Computer Engineer Computer engineering is a very tedious and difficult job. To be a good computer engineer you need years of experience and college education. Computer engineers provide information and data processing for certain computer and organizations. They conduct research, design computers, and discover and discover new basis and ideas of applying computers. Becoming a computer engineer is not really a challenging ,but it does require certain degrees.Computer technology has advanced dramatically over the past ten years.Computer engineering started about 5,000 years ago in China when the Abacus was invented. The abacus is a manual calculator in which you move beads back and forth on rods to add or subtract. Other inventors of basic computers include Blaise Pascal who came up with the arithmetic machine for his father’s work. Also Charles Babbage created the Analytical Engine, which put together math calculations from one problem and applied it to solve other elaborate problems. The Analytical Engine is similar to today’s computers. Computer hardware engineers research, design, develop, and test computer systems and components such as processors, circuit boards, memory devices, networks, and routers. By creating new directions in computer hardware, these engineers create rapid advances in computer technology.A computer engineer has certain duties and responsibilities depending on the location and size of the company he or she works for...
Words: 1034 - Pages: 5
...Caden Rohan advanced ELA I still don't know what to do for this part. Bill Gates “I will always pick a lazy person to do a difficult job because he will find an easy way to do it.” These are the brilliant words of Bill Gates. He is a good role model because he made some of the best software in the world, he donates tons to charity and is one of the richest men in the world. Bill Gates is a role model because he made some of the first and best computer software. According to the article “Bill Gates”, he had a “Boundless appetite for finding new ways to make electronics more useful”. This shows that he liked what he did thus making him better at programing. The editors at bio.com say that Bill Gates made Windows, which is a program most people...
Words: 502 - Pages: 3
...Computer machinery (2007, April 12). Computing Degrees & Careers » Software Engineering. Retrieved February 23, 2014, from http://computingcareers.acm.org/?page_id=12. Web This article discusses software engineering and the definition of basically what it is, it states that it is concerned with maintaining software systems and developing one that will work correctly and be very dependable for the user, they have to keep in mind as well that there projects need to be affordable and that they assure reliability and they meet all the users needs. The actual article states, “Software engineering (SE) is concerned with developing and maintaining software systems that behave reliably and efficiently, are affordable to develop and maintain, and satisfy all the requirements that customers have defined for them.” (computer machinery) The article talks about how critical it is for the application to be safe especially because of how expensive the software system are. Software Engineering integrates a significance of mathematics in computer science and practices the origins of engineering. This article give a good definition of what software engineering is about, it doesn’t give enough detail on what exactly they are doing everyday its very broad and doesn’t narrow it down. It begins to talk more about how to get into the job itself, instead of focusing on exactly what they do, it gives a description of all the step you need to take to get there. It strays away from what you’re...
Words: 1601 - Pages: 7
...program is sufficient for thinking by showing how running a computer program is not sufficient for the computer to be thinking. The argument goes that a person who has never seen the Chinese language in any form is sitting in a room sealed from the outside world. In the room, there is a basket full of Chinese symbols and a book that shows what symbols to put together when responding to a group of symbols on a piece of paper that has been slipped into the room by a Chinese speaker. The man in the room following the instructions can trick the Chinese...
Words: 711 - Pages: 3
...like data or packet timing to gather confidential data from computers/networks. Vulnerabilities are liable and experience in the computers with which members of staff use to run their daily job requirements. The aim of this work is unveil these weaknesses facing Information System managers in recent time. Because the modern organization is clearly and predominantly associated with the use of information and information systems, this work does not focus particularly on any industry. 1|Page CYBERSECURITY VULNERABILITY FACING IT MANAGERS TODAY VULNERABILITY/ WEAKNESS COMPARE TO THREAT In cyber world, vulnerability is defined as the weakness a computer hardware or its software system that can be exploited. This is completely way different when we talk about cyber threats. A threat is simply the ways or means with which these vulnerabilities are being taken advantage of or exploited. A simple example of these threats is clearly seen in the case of a Malware/Spyware in a computer/network. This, depending on the target operation, exploits any available vulnerable aspect of the information system. These vulnerabilities when present and unattended to allow or assures for the success of these threats when eminent. The damages done or impacted based on these incident threats when there are vulnerable loopholes are very much devastating and cost loss of money and other values of an organization. In 2009, a report by Computer security survey institute (CSSI) and Federal Bureau of Investigation...
Words: 2288 - Pages: 10
...achieving the development within a timely manner. I recognize not all project management is allowed to choose the software lifecycle that will be implemented on all developments. Businesses possibly invested primarily in the software and advancements utilized to deploy their software. In this paper, a contradictory view of SDLC process is describe, it is based on development, distinguishing classifications and then characteristics are revealed. In the very early stages of computing, software development was produced by many individuals, each having their own protocols to follow. Majority of the time, the deployment process was a form of “programing language then repair”, Such the technical writer conducts a form of commands and then probes it to get results. Software expanded exponentially more difficult and meticulously rested on computers for most of their computing, including expenses and labor, this attributed to a more formal way of programming. The main basis in software is understood, constructed, perpetuated and is professionally acronym labeled as Software Development / Life Cycle (SDLC). Software development selection is a strategy by which software deployment techniques are efficiently selected and dependent on qualifications and deliver an improved conclusion other than a usual selection course....
Words: 326 - Pages: 2