Premium Essay

Computer Sci

In:

Submitted By bmcmillen
Words 600
Pages 3
Sometimes is it easy to forget about the importance of revision, especially when you’re writing to the deadline. For our discussion this week, we read Rachel Toor’s essay, “Not My Type.” Toor doesn’t really get into the idea of allowing for time and space between drafts, but she does discuss how much better her work is when she can approach it as an outsider (Toor, 2012). Take a look at the Narrative essay you submitted in week four. Read through it and find a few things you could have done better. In at least 150 words, discuss those changes. While you can mention it, try to look deeper than any formatting or grammar issues you may have had. Look at the way you organized your essay, how you tied everything together, even at your word choice. Could you have benefitted from writing your essay in multiple drafts?
About my narrative essay, it could have been a lot smoother and easier if I had my original story. For a month I have been dealing with a failed hard drive and 2 more failed ones that I have been sent to find out it’s my power supply hahaha. Anyway I liked revisiting my past because it made me really happy to write about it and be descripted with the event as a whole. I could have it a bit more organize it just happened a more than 10 years ago. I could have done better if I wrote two drafts instead of one; I’m taking my time with my persuasive essay so it will be better than this one. Also rushing the essay instead of being able to take my time was an issue also. Writing about an older event is kind of hard because things get fuzzy after years of not thinking about the event that happen. Once you start thinking about it comes in a flood and it’s sometimes hard to organize it in your head.
Revision Plan
Now that you’ve had the chance to reexamine your Narrative essay, take a deeper look at your Persuasive rough draft in the same way. Think about how you

Similar Documents

Premium Essay

It Midterm Exam Study Guide

...markets and suggest when large blocks of stocks should be purchased or sold in a process called ____. a.|feedback|c.|forecasting| b.|processing|d.|program trading| __A__ 3. _____ consists of computer equipment used to perform input, processing, and output activities. a.|Information technology|c.|Telecommunications| b.|Technology infrastructure|d.|Hardware| __D__ 4. Keyboards, automatic scanning devices, and equipment that can read magnetic ink characters are examples of ____ hardware. a.|storage|c.|output| b.|processing|d.|input| __B_ 5. The One Laptop per Child computer costs ____. a.|under $100|c.|between $200 - $400| b.|under $200|d.|over $400| __B__ 6. ____ consists of computer programs that govern the operation of the computer. a.|Hardware|c.|Applications| b.|Software|d.|Telecommunications| __C__ 7. ____ is an example of application software that allows you to accomplish specific tasks such as word processing or tabulating numbers. a.|Systems software|c.|Microsoft Office 2010| b.|Windows 7|d.|Windows Vista| __C__ 8. People can send short messages of up to ____ using Twitter. a.|10 words|c.|140 characters| b.|100 characters|d.|140 words| __D__ 9. Using ____, you can download audio programs or music from the Internet to play on computers or music players. a.|podcasting|c.|WWW| b.|Web logs|d.|cloud computing| __D__ 10. ____ include(s) all the people who manage, run, program, and maintain the system, including the CIO, who...

Words: 3408 - Pages: 14

Premium Essay

Management Information System

...INTRODUCTION. Adoption of emerging technologies prior to their proven value is both acceptable and normal in today’s globalized economy. In current global environment, organizations all around the world have to constantly facing challenges to hold the competitive advantage. Firms that refuse to change their approach face declining sales, obsolescence, and potential bankruptcy. The global world is characterized by more competition, diverse work force, continuously changing customers’ needs, and new technological changes, etc. The adoption of emerging technology in business is broadly studied but the resulting research has produced inconsistent results (Brandyberry, 2003). An organization is define as a group of persons that team up together to work to achieve the organization strategy. Organizational strategy can be defined as a plan for interacting with the competitive environments to achieve organizational goals. According to Charlesmore Partners International (2008), organizational strategy is a clear definition of how the organization needs to change – over time - in order to be able to deliver the strategy of the enterprise and an actionable plan of how to make the transformation. This requires both the thinking and analysis to compare current state to desired state and define the gap, and the execution capabilities to make the requisite changes happen. Other definition of organizational strategy is a plan for interacting with the competitive environments to achieve organizational...

Words: 11702 - Pages: 47

Free Essay

Layout

...S.A. 0360-8352/85 $3.00 + .00 © 1985 Pergamon Press L td FACILITIES LAYOUT A SURVEY OF SOLUTION PROCEDURES REUVEN R. LEVARY Operations Research Center, M.I.T., Cambridge, MA 02139, U.S.A. and Department of Management Sciences, Saint Louis University, Saint Louis, MO 63108, U.S.A. and SYLVIA KALCHIK Monsanto World Headquarters, Saint Louis, MO 63167, U.S.A. (Received 26 January 1983; received for publication l June 1984) Al~traet--The main characteristics of the most-used solution procedures for the facility layout problem are summarized. The characteristics include input required, limitations, type of output obtained, and some other general characteristics. Quantitative and computer-based models will sometimes produce odd layout shapes. For this reason, optimization models and computer programs designed to plan facility layouts, based on optimizing certain objectives, can be useful only for determining some guidelines for the planners. While these models can be used for planning alternative layouts, considerations of qualitative and personnel factors should be given during the layout finalization phase. INTRODUCTION One of the tasks in layout planning is assigning relative locations to a set of facilities. The best layout plan is often the one that results in the highest overall effectiveness of transactions between the facilities. Cost considerations can be a major factor in choosing a given alternative layout plan for implementation. The problem of facility layout...

Words: 3517 - Pages: 15

Free Essay

Ocpar Proposal

...Ocpar, Inc. Proposal Bill Johnson Strayer University April 29, 2012 Statement of Need Ocper, Inc. currently has 20 Windows peer-to-peer client computers which are all connected via coax cabling. The president also indicates that the company plans to double in size over the next two years, but she is leery about drastically altering the computer environment. They have indicated that they will possibly be expanding from 20 to 40 users over the next few years. The president has indicated that she would prefer to hold the costs down thought she has indicated that this upgrade is an investment for the future.. My proposal consists of the following: First of all I have proposed to her that they upgrade their PC’s to an Ethernet network which will add more speed and stability to their network. I have suggested that Ocpar buy a total of (20) twenty Intel Gigabit CT PCI Desktop Network adapters at $31.99 per for a total of $639.80. I am also proposing they upgrade their network to a scalable distributed backbone network centralized around a Cisco Small Business 300 Series Managed Switch SF300-24 (24 ports) at a cost of $224.99. The one large item I am proposing to change their network is the purchase of one (1) Dell PowerEdge T310 Server at $3,643.00. This server will suffice what their work is now but it is also something they can grow into. The PowerEdge T310 includes the following: Hard Drives 500GB 7.2K RPM SATA 3.5in Cabled Hard Drive plus one (1) 1TB 7.2K RPM SATA...

Words: 550 - Pages: 3

Premium Essay

Hacker

...been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize those effects. Different issues regarding hacking are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found. The society response to hacking attacks lacks till this moment the ability to stop or completely prevent attacks from happening because as long as security tools are developed, more sophisticated hacking attacks are invented. That’s why we should start to think about hacker’s psychology as the main way to prevent and stop attacks by understanding their needs or desires. Introduction The Oxford English Dictionary defines hacking as “cut or chop roughly; mangle: cut (one’s way)”… to its present definition as “gain unauthorized access (to data in a computer)”. Banks (1997:11) defines hacking as “something that boring mainframe computer operators did to improve performance and battle boredom.” Here banks focuses on boredom as the reason of hacking. A more technical definition of hacking according to Digital Guards data base (2001) is “unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network.” Darlington (2001) believes hacking is not limited...

Words: 4368 - Pages: 18

Premium Essay

Final Exam Schedule of Spring 2015-2016

...MARKETING [MKT.] PROFESSIONAL PRACTICE STATISTICS & PROBABILITY STATISTICS & PROBABILITY CONTEMPORARY ISSUES IN GLOBAL ECONOMY INTRODUCTION TO ECONOMICS PUBLIC SPEAKING POWER STATIONS Released on March 29, 2016 SECTIONS A,B,C,D,E,F,G,H,I,J,K,L,M,O,P,Q,R A,B,C,D,E A A,B A A A,B A,C1,C2,C3,C4,C5,C6,C7,C8 A A A,B,C A,B,C,D,E,F,G,H A,B,C,D,E,F,G,H,I A,B,C B,C,D,I,J A,B A A,B,C,D,E,F,G,H,I,J,K,L,M,N,O F1 A A A,C,D A,B,C,E,F,G,H,I, A,B,C,E,F,G,H,I A A,B,C A A N,O,P,Q A,B,C,D,E,F,G,H,I,J,K,L,M A A A A,B,C,D,E,F,G Day 2: April 24, 2016 (Sunday) TIME Building 1, 5 & 4 BUSINESS MATHEMATICS – 1 BASICS IN NATURAL SCIENCE ISLAMIC FINANCE & BANKING CONTEMPORARY ARCH. THEORY Building 7 COMPUTER NETWORKS MULTIMEDIA SYSTEMS ANALOG ELECTRONICS 1 9:3011:30 INTERMEDIATE MICROECONOMICS BIOMEDICAL INST. MEASUREMENT & DESIGN SALES MANAGEMENT [MKT.] INTRODUCTION TO SOCIOLOGY LOGIC AND PHILISOPHY 12-2 BUSINESS...

Words: 1987 - Pages: 8

Free Essay

Chemistry

...White hat hackers are the ethical, legal hackers (2002). Companies pay them to find holes in software or networks and fix the problems. The difference between white hat hackers and black hat hackers is that white hats have permission to carry out their attacks on a company to fix the problems. (2) A majority of company owners say that white hat protection is the only true way to ensue security in their businesses. White hats use the same programs and knowledge as black hats do. They usually stay in the cyber underworld to keep updated on attacks and information. Black hat hackers are the most rare and elite of all the hacker groups. Most are connected with criminal activities, such as espionage. (2001) Not all hackers labeled black hat hackers are connected with criminal activities in real life. There are many "old school" hackers considered black hat. They are the ones that are usually from the 1960's and use the word hacker with honor and freedom. (Quinter 2) Most of these hackers do not have a negative intent they are usually programs from Stanford or MIT. They have good ethics and believe in open source and fixing flaws in programming. Most black hat hackers are criminals and are very powerful. (Glenn 8) Political and personal revenge is a major motivating factor in becoming a true black hat hacker, but the most elite hackers go for the money. Industrial espionage is one of the best paid jobs for a hacker. A typical espionage attacks takes about three weeks and they...

Words: 4683 - Pages: 19

Free Essay

Wearable Computing: the Next Big Thing in Smart Technology?

...Wearable Computing: The Next Big Thing in Smart Technology? Prepared for Edward Moss, Instructor ENGW 3304 Northeastern University Prepared by Varun Kukreja Northeastern University February 13, 2014 INTRODUCTION Ever since the development and introduction of wearable devices to consumers, much debate has evolved around its use compared to smartphones and other smart technology products. Dave Evans (2013) pointed out that while consumers begin to adapt to wearable technology, personal computing is getting even more personal, with electronic products and chipsets being attached to “clothing, jewelry, shoes, glasses, watches, and even on your skin” (Stedmon et al., 1999). Developments in wearable technology have indeed suggested that it is possible to fully integrate both physical and functional aspects of smart devices, thereby increasing their operational efficiency. These findings suggest that wearable technology has the potential to be far better than the smartphone...

Words: 4042 - Pages: 17

Free Essay

Russian Patriotic Hacking

...beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating regardless of its size. Global governments need to continue working on creating workable laws that accurately describe the problem of cyberattacks and effectively enforce the solution. The modern world still has a long way to go before all security threats are addressed, appropriate defence is in place and all the critical computer infrastructure...

Words: 8586 - Pages: 35

Free Essay

Disaster Plan

...| Disaster plan | | | | 6/6/2010 | | Abstract This is a disaster plan that I created for the IST Department of XYZ Computers company in order to prevent any future problems that may arise such as the situation they had over the weekend when a major water pipe broke and flooded the first floor, causing extensive damage to the servers. Included in the disaster plan I will address a few issues that will aid the company in protecting against such things as any natural disasters that may occur as well as any other occurrences that may deem necessary for such a disaster plan. I will detail my recommendations for using a RAID system for data protection in order to have a well placed back up plan with the most up to date information possible. In short I plan to properly detail a disaster plan the best possible way that I can in order to have a good disaster recovery plan in place rather than having to spend the time and money on extra recovery efforts. Hopefully having such a plan in place will keep from losing important data to unforeseen issues, such as natural disasters due to the geographical location among other issues that may arise at the most in opportune time possible. When creating a disaster plan the first thing to keep in mind is to do a complete risk assessment of the entire existing computer systems. In order to accomplish this task all the risks and probabilities will need to be noted such as any delays to system uptime and how close at hand these...

Words: 1273 - Pages: 6

Premium Essay

How a New Strategy Saved and Created a Bright Future for Ibm in 90s.

...Term Paper Proposal To: Dr. Vijay Karan From: Ming-Tzu Chou Date: 13 February 2012 Subject: Management control system Proposed Research Topic: How a new strategy saved and created a bright future for IBM in 90s. Statement of problem: In the early 1990s, IBM suffered in dramatically declining in the revenue of the mainframe sales, and the stock price also dropped. During the period, the personal computer was the most popular products in Information Technology market, and the mainframe was already outdated. Last but not least, IBM could not reduce its cost according to its size and bureaucracy. As a result, many people believed that IBM could only fell or be divided to smaller companies. Louis V. Gerstner, Jr., who was the new CEO, saved IBM and implemented different strategies in the company. Objective & Method: The purpose of the study is to evaluate how a new strategy affected IBM. Except the abstract, the term project will be separated to four parts: problem statement, strategy formulation and strategy planning of solutions, the summary of results, and recommendations. The term project should reach the following goals through in the four sections. 1. Problem statement will describe IBM’s previous business situation and introduce how problems had generated before Gerstner arrived. 2. The solutions from Gerstner will be deeply analyzed according to the theories from strategy formulation and strategy planning in the textbook. 3. The summary of results will be presented...

Words: 319 - Pages: 2

Free Essay

Technology Emergence Papaer

... 2012). Bleeding technology is relatively, new technology. Bleeding technology is unreliable because it has not been tested and it has not proven its worthiness or authenticity. A user will be taking a huge risk to use the bleeding technology which would be more expensive than the leading technology. Bleeding edge technology could be very costly and it could turn into something that could be the beginning of a serious problem. The reason why bleeding edge technology could cause many problems is because it is new and might be quite risky because of the instability. Bleeding edge technology has not been thoroughly tested and has not proven itself to be reliable. As an example of bleeding technology would be an early development of a new computer product that is being develop for the very first time. When a consumer decides to purchase the product, the cost is not the only thing that the consumer faces when choosing to purchase the bleeding edge technology; it is possible that the customer might get stuck with...

Words: 1786 - Pages: 8

Premium Essay

Computer as a Catalyst for Change

...1 Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Sara L. Dexter and Ronald E. Anderson University of Minnesota Henry Jay Becker University of California, Irvine This paper was published in the Journal of Research on Computing in Education. The citation for it is: Dexter, S., Anderson, R. E., & Becker, H. J. (1999). Teachers’ views of computers as catalysts for changes in their teaching practice. Journal of Research on Computing in Education, 31 (3), 221239. Abstract: In this study we examined the use of computers by teachers in their instructional practices and their perception of the impact of computers on changes they have made to their classroom practice. These data draw from 47 teachers from 20 K-12 schools across 3 states who each completed a questionnaire, participated in 3 semi-structured interviews, and allowed 3 observations of their classroom. The teachers who had adopted more progressive teaching practices over time felt computers helped them change but they did not acknowledge computers as the catalyst for change. Instead, they cited catalysts that included: reflection upon experience, classes taken, and the context or culture of the school. We conclude that in order for teachers to implement the use of educational technology in a constructivist manner, they must have opportunities to construct pedagogical knowledge in a supportive climate. Research funded by the program of Research on Education Policy and Practice at the National...

Words: 9206 - Pages: 37

Premium Essay

Capstone Wbs Dictionary

...WBS Dictionary Team One Technologies Project Management | From start to finish lay out of the project | Scope / Requirements | Team One Technologies is determined to helping Greenway Bank develop an approach to examine their scale or level of risk management. | Design | The office will house a local LAN, create a revenue stream, a new inbound customer service call center | Headquarters and four branch locations | Four branches located in New York, Seattle, Orlando, and Los Angeles, corporate offices in St Louis | Budget breakdown / Materials | Total cost on parts, labor and time | Complete data network and communication to all locations | Networks connect large numbers of users to share information and resources | Physical Layout for Voice & Data | A building by building layout or diagram for the Physical layout for the voice and data network | Data storage and off site backups for all 5 locations | off-site data protection, or vaulting, is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.Example: Barracuda Networks | Network Configuration Plan | the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. | Documentation for business continuity | The activities performed by Team One Technologies to ensure that critical business functions will be available to customers, suppliers, regulators, and...

Words: 655 - Pages: 3

Free Essay

Information Technology

...1. what is e-classroom? 2. what is industrial robot? Explain that. 3. Describe about the process that Mubin told about his parents. 4. ICT used for doing many dangerous situation succesfully. Explain that. Answers: 1. main book. 2. Industrial robot is a robot that is used in many dangerous work. Now all the industrial work in industry are done by industrial robot. Human become tired,bored but robot never. Robot can do work for long time. In the big industry of the world now robot is uses as labor. 3. Mubin told his parents about the use of computer in operating phone. He also told about the drone system. Mubin works in air force thats why his parents always anxious for him.They think about the airplane accident. Then mubin told them about the latest technology that used in aircraft. Now all the airplane are opetated by computer. Now pilot dont have to do many things. So the posibility of the plane accident now become less. Now a days there is no pilot in the fighter plane. The drone system is used normally in war. 4. Besides the use in aircraft ICT also used in many dangerous sector for doing many dangerous work. Now most of the work in the big industry is done by robot bacuase robot dont get tired or bored like human. Now human just observe the work either its right or wrong. Now in transportation the use of ICT increased a lot. In future if car dmis driven by robot then the number of road accidents will definately less. So now ICT is used in many dangerous sector...

Words: 679 - Pages: 3