CHAPTER 2 This chapter includes the review of related literature, review of related studies and review of other related Computer Assisted Instruction (CAI) which helped the researchers in designing and developing their own CAI that was used in this research. REVIEW OF RELATED LITERATURE The review includes discussion of technical terms like Computer-Assisted Instruction (CAI), multimedia, and review of software packages in mathematics, studies on development, evaluation and validation of
Words: 15415 - Pages: 62
CHAPTER 1 THE PROBLEMS AND ITS BACKGROUND Introduction Computer addiction is a relatively new term used to describe a dependency on one's computer. Computer addiction is not limited to personal computers (PCs). It covers video games and the Internet and has already been given a label by psychologists, namely Internet Addiction Disorder(IAD). People can grow addicted to a variety of substances, and there is usually a substantial amount of help available to treat them. Alcohol, drugs and sex have
Words: 2000 - Pages: 8
History of Computer “Computer” is probably one of the most heard words nowadays. When we hear this word, we can picture a monitor with a rectangular box, keyboard and a mouse in technical sense. But literally what is computer? A computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations automatically. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem. Conventionally, a computer consists
Words: 1921 - Pages: 8
EXPANDERS Kay Bey TB143p ITT Tech In this paper we will explore what port expanders do for your computer system. We will explain whether or not port expanders are specific to a computer or generic in nature. We will also analysis the advantages and disadvantages are when using port expanders for your computer. What is a port expander? A port expander is a device that allows your computer to be connected to many other devices at one time. (What is a port expander, 2014) There are two basic
Words: 682 - Pages: 3
vs. Personal Computers Joe Livingston POS/355 April 16 2010 Adam Manfred The essay will cover two main topics of main frames are. The second topic is personal computers or PC. The essay will define what a mainframe computer is and what the computers primary functions are. The paper will cover what a personal computer is and what PC are used for. Once both the mainframe computer and personal computer are defined, the paper will discuss the advantages and disadvantages of both systems
Words: 778 - Pages: 4
DATA PROTECTION- what is this act? What it is for? Controls how your personal information is used by organisations, businesses or the government. It also imposes restriction on the transfer of data, also like placing the materials on the web. Everyone responsible for using data has to follow strict rules called data protection principles, they must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate
Words: 1441 - Pages: 6
rates and a tight labor market changes must be made. Einer Eng had to come up with a way to invest in his workers with the expectation that rate of return would significantly outweigh the costs. At the time of the case study in 1996, the personal computer and internet were relatively new technologies. The majority of people were not familiar with them and they did
Words: 1072 - Pages: 5
Email – The New Health Hazard Email is the primary text-based median of communication around the globe utilized for personal and business communication. By combining email with other forms of computer mediated communication (CMC), such as cell phones, instant message, and other similar platforms communication technology has given individuals the ability to work and play simultaneously in remote and multiple locations, while maintaining a presence as a member of an organizational team
Words: 1089 - Pages: 5
authentication is a technique which is based on originated public and private key pairs. You can generate a key pairs in the client machine (or remote computer) and place the public key to the server so that the server will be able to authenticate user or prove the trusted user which allows the remote computer to login by demonstrating that the remote computer has access to the key pairs. The last step for authentication process before SSH client can read private key is that it needs a passphrase which
Words: 1854 - Pages: 8
Inventory is a quantity of goods owned and stored by a business that is intended either for resale or as raw materials and components used in producing goods that the business sells. For example, motherboards warehoused at a computer company to be used in the assembling of its computer systems are inventory. The products displayed for sale and stored in the backrooms of a department store are inventory as well. Inventory is the heart beat of any business and its management is a major interest of purchasing
Words: 1383 - Pages: 6