So far I have no suggestion to improve the course , is quite well and everything runs smoothly. Lecturer is friendly and patients to teach us in the class. I learn new knowledge , it gave me a deep understanding about the technology computer.. Besides , during the lab I learn to create a better slide show by using the tools in Microsoft PowerPoint. ✌✌✌
Thursday, August 8, 2019
The importance of privacy, security, legal and green computing awareness for society
The role of automation in sustainable development is not in doubt. Computerization in particular has permeated every facet of human endeavour, enhancing the provision of information for decision-making that reduces cost of operation, promotes productivity and socioeconomic prosperity and cohesion. Hence, a new field called information and communication technology for development (ICT4D) has emerged.
Nonetheless, the need to ensure environmentally friendly computing has led to this research study with particular focus on green computing in Africa. This is against the backdrop that the continent is feared to suffer most from the vulnerability of climate change and the impact of environmental risk. Using Nigeria as a test case, this paper gauges the green computing awareness level of Africans via sample survey. It also attempts to institutionalize green computing maturity model with a view to optimizing the level of citizens awareness amid inherent uncertainties like low bandwidth, poor network and erratic power in an emerging African market. Consequently, we classified the problem as a stochastic optimization problem and applied metaheuristic search algorithm to determine the best sensitization strategy. Although there are alternative ways of promoting green computing education, the metaheuristic search we conducted indicated that an online real-time solution that not only drives but preserves timely conversations on electronic waste (e-waste) management and energy saving techniques among the citizenry is cutting edge. The authors therefore reviewed literature, gathered requirements, modelled the proposed solution using Universal Modelling Language (UML) and developed a prototype. The proposed solution is a web-based multi-tier e-Green computing system that educates computer users on innovative techniques of managing computers and accessories in an environmentally friendly way. We found out that such a real-time web-based interactive forum does not only stimulate the interest of the common man in environment-related issues, but also raises awareness about the impact his computer-related activities have on mother earth. This way, he willingly becomes part of the solution to environment degradation in his circle of influence.
The origins of the Internet date back nearly 40 years, with the U.S. military's funding of a research network dubbed Arpanet in 1969. Since then, the Internet has undergone more than just a name change. The number of computers connected to the Internet has grown exponentially, while the number of users has risen from a handful of computer scientists to 1.5 billion consumers. The network's reach has expanded beyond the United States to every corner of the globe. But its popularity has a dark side, as it has evolved from a friendly research network to a hotbed of criminal activity including fraud and identity theft.
Internet usage has exploded since 1995, when researchers first started tracking this statistic. Although estimates vary from the Internet having 1 billion to 1.5 billion users, everyone agrees that the 'Net has room for growth as the worldwide population tops 6 billion. That leaves more than 4 billion people around the world without Internet access today.
Internet becomes a global phenomenon.The Internet has changed from a U.S.-dominated communications medium to one that is seeing its fastest growth in Asia and Europe.Now everybody is using internet in every second,and can't live without internet.
Web Authentication is the process of verifying the identity or authenticity of a person or an entity. Let's go back to the time that the world was not yet introduced to computers and the internet. If a customer of a bank had to withdraw some money from the branch, how would it take place? The teller at the branch would ask the customer for a proof to confirm that he/she is the valid customer. The customer would then sign on a piece of paper, which would be compared with the signature provided by the customer at the time of opening the account. With the advent of computers, the signature was replaced by the password. The user would set a password value during registration and then provide it each time to access the account.
Authentication is the process of verifying the identity or authenticity of a person or an entity. Let's go back to the time that the world was not yet introduced to computers and the internet. If a customer of a bank had to withdraw some money from the branch, how would it take place? The teller at the branch would ask the customer for a proof to confirm that he/she is the valid customer. The customer would then sign on a piece of paper, which would be compared with the signature provided by the customer at the time of opening the account. With the advent of computers, the signature was replaced by the password. The user would set a password value during registration and then provide it each time to access the account.
However, as the internet has been evolving, authentication schemes have also been evolving. Let's take a look at some of the authentication schemes starting from the simplest HTTP Basic authentication to more sophisticated schemes.
Five sentences in your native language and translate into English
Hi, how are you? 嗨, 你好吗 ( Hāi, nǐ hǎo ma )
I don’t know. 我不知道。 ( Wǒ bù zhī dào )
Where are you? 你在哪儿? ( Nǐ zài nǎ'er )
Who are you? 你是谁? ( Nǐ shì shéi)
I’m sorry.对不起。 ( Duì bù qǐ )
Things that I like in Malaysia
Welcome to Malaysia 😃💙 , Malaysia is a multiracial country. Malaysia is unique because of its diversity of races , religions and cultures and many places of interests. There are a lot of things in Malaysia. In Malaysia there are many foods you can try like nasi lemak , roti canai. My favourite food is nasi lemak. Nasi Lemak is made of Malaysian coconut milk rice , served with sambal , fried crispy anchovies , toasted peanuts and cucumber. Try it, you will never regret !
Introduction to Myself
Hi everyone , I'm Loo Hol Ven and this is my first blog ever. I am 17 years old currently is my first year studying electrical & electronic engineering in a university. I am a plain and simple person who playing around enjoying my life in university. It's just a short introduction to myself , do check out my others post in my blog 😏. Peace! 💨