Basic Computer Operations
Computer ScienceTechUX

Basic Computer Operations

2 Mins read
Basic Computer Operations. A computer as shown in the figure below performs basically five major operations or functionsirrespective of its size and make. These are 1) it accepts data or instructions by way of input,…
Classification of Computers
Computer ScienceTechUX

Classification of Computers

2 Mins read
Classification of Computers. i. Classification of Computers by Size a) Micro-Computers • Micro –Computers are the Smallest class of Computers• Micro- Computers have one micro-processor in its Central Processing Unit• Micro-Processor refers to Central Data…
History of Computers
Computer ScienceTechUX

History of Computers

2 Mins read
History of Computers i. First generation computers (1946-1956) Overview of the Intelligent System They made use of vacuum tubes to store and process information. The tubesconsumed a lot of power and generated a lot of…
Computer System
Computer ScienceTechUX

Computer System

3 Mins read
Today’s world is an information-rich world and it has become a necessity for everyone to knowabout computers. Purpose of this tutorial is to introduce you about computer systems and itsfundamentals.The word computer comes from the…
Overview of the Intelligent System
Computer ScienceTechUX

Overview of the Intelligent System

3 Mins read
Researchers in the science of “Artificial Intelligence” has investigated many areas of the mind such as pattern matching, vision, and theorem proving. However, all of these are only parts of the human mind. An intelligent system could include all of these parts, but it still would not be complete, and could not function, unless it also had sensed, a method to choose responses according to its objectives and memories, and some way of performing these responses in and on its environment.
Details of the Intelligent System.
Computer ScienceTechUX

Details of the Intelligent System.

4 Mins read
i. The Intelligent System has a temporary objective, that it has derived from its main objective. ii. It senses its environment, although we have to realize that it has only a few senses and that these can only capture, for instance, light and sound of an object, but can not capture or know the object itself. iii. The system then stores these sense impressions as elementary concepts. Concepts are a material way of storing information. Working on concepts creates new ones and stores relationships to other total, part, abstract and concrete concepts. Of course, there is a difference between an object or occurrence in the environment, the concept the system uses for its internal processing, and the word it uses to communicate the concept. To continue with the internal processes, in more intelligent systems there should now be a check of the incoming information.
Freedom of information in law
Agri-BusinessBridgeBusinessCommercialComputer ScienceDesignDesign & DevDesignsEveryday LifeFashionGeneralGUILifeStyleMountainNaturePeopleSportsTechTravelUXWorld

Freedom of information in law

2 Mins read
In June 2006 nearly 70 countries had freedom of information legislations applying to information held by government bodies and in certain circumstances to private bodies. In 19 of these countries the freedom of information legislation also applied to private bodies Access to information was increasingly recognized as a prerequisite for transparency and accountability of governments, as a facilitating consumers’ ability to make informed choices, and as safeguarding citizens against mismanagement and corruption. This has led an increasing number of countries to enact freedom of information legislation in the past 10 years
Privacy and privacy protection
BusinessCommercialComputer ScienceDesignsGeneralGUILifeStylePeopleTechUXWorld

Privacy and privacy protection

9 Mins read
Data protection is a type of privacy protection manifesting in special legal regulation. Data protection right ensures a person the right of disposal over all data in connection with his personality. This way it serves to sustain the protection of privacy in a world where the possibility of collecting, storing and conciliation of large pools of data is widely available. Earlier, due to the lack of highly developed data-processing technologies no threat was imposed by a situation in which these data became public and known to others, while today processing, conciliation and association of data or creating new data relying on the old ones might result in the infringement to the right of privacy. The underlying notion behind the codification of data protection law is the insufficiency of secrecy protection: within the new context protection should apply to all data: “data protection should be differentiated from the interpretation of privacy as intimacy.
INTELLECTUAL PROPERTY RIGHTS
BusinessCommercialComputer ScienceSportsTechUX

INTELLECTUAL PROPERTY RIGHTS

3 Mins read
Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce. IP is protected in law by, for example, patent, copyright, and trademarks, which enable people to earn recognition or financial benefit from what they invent or create. By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish.
IT/Computer Science Professional bodies & their main functions
BusinessCommercialComputer ScienceFashionGUIPeoplePhotographySportsTechUX

IT/Computer Science Professional bodies & their main functions

3 Mins read
A professional body is a group of people in a learned occupation who are entrusted with maintaining control or oversight of the legitimate practice of the occupation. Professionals and professional bodies have a crucial role to play as part of the regulatory landscape. Professional body membership gives the public, the sector and government assurance that services are being delivered by qualified and expert professionals who are self-regulating based on a code of professional practice (or conduct) that they have developed.
Computer Science Professional
BusinessCommercialComputer ScienceDesign & DevSportsTechUX

Computer Science Professional

2 Mins read
Characteristics of a IT/Computer Science profession Great responsibility Professionals deal in matters of vital importance to their clients and are therefore entrusted with grave responsibilities and obligations. Given these inherent obligations, professional work typically involves circumstances where carelessness, inadequate skill, or breach of ethics would be significantly damaging to the client and/or his fortunes.
Outsourcing IT/Computer Science Services
BusinessCommercialComputer ScienceDesignDesign & DevDesignsGUISportsTechUXWorld

Outsourcing IT/Computer Science Services

3 Mins read
Outsourcing is a contractual arrangement under which a client hands over a certain business function to a supplier This usually includes planning, management, and operation of this function Very common in some situations: few people generate their own electricity or drill their own wells Logic is that a company specializing in a particular area, e.g. catering or office cleaning, is probably better at it
Contract Hire Contract in Computer Science.
Computer ScienceGeneralSportsTechUXWorld

Contract Hire Contract in Computer Science.

2 Mins read
Contract hire is an arrangement in which the supplier agrees to supply the customer with the services of a certain number of staffs at agreed daily or hourly charge rates. The customer takes responsibility for managing the staff concerned. Either party can terminate the arrangement at fairly short notice, typically one week,
Contracts in Computer Science
BusinessComputer ScienceTechUXWorld

Contracts in Computer Science

2 Mins read
A contract is simply an agreement between two or more persons. Essentials of a contract: a) Offer and Acceptance. In order to create a valid contract, there must be a ‘lawful offer’ by one party and ‘lawful acceptance’ of the same by the other party.
EXTREME PROGRAMMING:
Computer SciencePeopleTechUX

EXTREME PROGRAMMING:

2 Mins read
Extreme programming methodology was created as a reaction to the old waterfall methodology. The reason is that software development is a very fluid process because requirements may not be fully implemented from the beginning but will always change as project progress there4 soft dev needs a methodology that can adapt changing requirement at any point during the project lifecycle.