StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The LZ Encoding - Coursework Example

Cite this document
Summary
From the paper "The LZ Encoding" it is clear that information security continues to be an essential part of computing. Passwords are used as methods of limiting access to information or data. Short passwords can be easily cracked as opposed to long ones. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
The LZ Encoding
Read Text Preview

Extract of sample "The LZ Encoding"

The LZ encoding was developed in 1984 and has been identified as simple to implement due to its compatibility with hardware. Its purpose is to compress large English language documents. The encoding has been used in PDF files and allows the reduction of the size of a document. The compiler can be said to be a program used in the translation of computer language (Layton, 2007). It simplifies the original language of information into another language, normally easy to understand. An example of a compiler is the JAVA software. Applications software is a class of software used to perform a specified function. An office suite is an application used for editing written documents. Another example is a media player whose function is to play music files. Graphics software also falls under this category and performs the function of image editing.
Unicode is an established standard of encoding regulating consistency. It is essential in modem computers to ensure the compatibility of information generated by the computer with others. As opposed to Unicode, ASCII supports limited characters. It represents text in computers while Unicode represents all data encoding. Unicode is only used in computers and ASCII can be used in other devices that use text.
John Von Neumann remains one of the notable figures in the development of computers. He is accredited with stochastic computing in 1953, although the system was entirely implemented when advancements in computing were realized. He also developed the Monte Carlo method allowing the approximation of problems using random numbers. His simulation algorithm with a biased coin played a crucial role in some number generators in the future.
Firmware is a common term used to refer to programs that perform certain support functions within a computer. The hard disc, for example, can be said to be firmware for storing information (Evans, 2011). A combination of firmware makes a computer system functional. The software used in providing updates can also be termed firmware. There exists a close relationship between firmware and software.
In the case of Sunil, information security is an essential aspect of his operations. He needs to secure the information from access by unauthorized persons. This may entail the use of passwords and other encryptions to secure the information contained in the websites. This is essential because he comes under constant threat of losing information over the web should someone hack into his system. He needs to have large storage hardware to store and provide backups for his database. Compilers are also essential in Sunil’s line of work as they can allow information from other servers to be shared efficiently.
Leon needs to ensure extensive utilization of application software for repairing equipment. He should integrate software that can detect the faults in the equipment he repairs. He should ensure clear record-keeping for the various problems he encounters. This can become an essential reference point in future operations. It would also be necessary for him to properly secure his database to minimize the chances of losing valuable information. These requirements would simplify his work by availing references for future duties. He needs to have proper conversion software to allow his scanning gun to be able to scan different equipment encryptions. An advanced security system would be essential as it can allow him to retrieve information contained in faulty equipment.

It is an accepted method commonly providing guidelines for information security. Changes have been proposed to the triad to include other elements like accountability and others. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computing Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1586571-computing
(Computing Coursework Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1586571-computing.
“Computing Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1586571-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF The LZ Encoding

Instances in Inferno by Dante

This paper will trace the instances in Dante's Inferno in which Virgil becomes impatient or so to say even offended with Dante.... This paper will elaborate certain examples from the text and examine errors of judgments committed by Dante.... On the other hand, it will also cover and discuss Virgil's responses to these errors....
5 Pages (1250 words) Essay

Electronic Communication Technology

"Electronic Communication Technology" paper focuses on the super-heterodyne receiver, one of the most common forms of receivers in use today.... It finds applications in almost all televisions and broadcast radios because of its significant advantages over other types of receivers.... ... ... ... The signals are made orthogonal to each other to prevent interference between carriers....
16 Pages (4000 words) Essay

Coding Schemes in Optical Fibre, Dicode Pulse Position Modulation, Reed Solomon Code, and FPGA

eed Solomon codes, encoding, and decoding ... This study "Coding Schemes in Optical Fibre, Dicode Pulse Position Modulation, Reed Solomon Code, and FPGA" is concerned with a literature review considering the main aim of the research which involves the development and investigation of the connection of the Dicode Pulse Position Modulation....
33 Pages (8250 words) Literature review

Communication Channel

It performs the encoding of the given information, which implies that it changes the messages for transmission reasons.... encoding is utilized for security reason.... This encoding and decoding will exceptionally help full in military and versatile correspondences....
9 Pages (2250 words) Assignment

What Are the Different Factors Contributing to Network Activities Across Firms With ICE Programs

This paper under the following headline "What Are the Different Factors Contributing to Network Activities Across Firms With ICE Programs?... examines the interplay among organisational, individual, and programmatic components that enrich network activities for ICE.... .... ... ... Attributes of network structure include the number and strength of relationships among network members, which impact knowledge flows between individuals and across the network....
18 Pages (4500 words) Research Paper

Every Problem in Marriage has a Solution

This paper 'Every Problem in Marriage has a Solution' contains an analysis of Diana Hacker's book.... One version contains the pointing towards mistakes while the other essay contains corrected mistakes.... The essay is checked with the help of rules related to writing.... ... ... ... The author states that the book contains a number of mistakes in it that need to be corrected....
5 Pages (1250 words) Essay

Error Detection and Correction for ATM Technology - Reed-Solomon Detection

The paper "Error Detection and Correction for ATM Technology - Reed-Solomon Detection" discusses that FEC codes are considered as a powerful tool in combating transmission errors caused by a noisy channel and it allows communications to achieve the same level of transmission reliability.... ... ... ...
17 Pages (4250 words) Case Study

Optical Wireless Communication

This work "Optical Wireless Communication" describes a complementary technology to the convectional RF wireless communications systems.... The author outlines the benefits of the technology that OWC remains as the most attractive solution, especially when it comes to environment settings where radio communications are likely to encounter difficulties....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us