StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Discussion questions1-10 - Essay Example

Cite this document
Summary
There exist 3 types of polymorphism, namely, Ad-hoc polymorphism, parametric polymorphism, and Subtype polymorphism or inclusion polymorphism. In the event that a non-technical…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Discussion questions1-10
Read Text Preview

Extract of sample "Discussion questions1-10"

Discussion In the programming language, Polymorphism, uniform interface handles the different types of data. There exist 3 types of polymorphism, namely, Ad-hoc polymorphism, parametric polymorphism, and Subtype polymorphism or inclusion polymorphism. In the event that a non-technical project team member makes the statement that polymorphism is just a fancy word for messaging, it would be appropriate to say that, it has wider knowledge and ideas involved in it. Polymorphism allows two or more objects respond to the same message.

In Polymorphism a sending object communicates with different objects in a consistent manner without worrying about the different implementations of a message. Java supports polymorphism excellently in terms of, Inheritance, method overloading and method overriding. It is the method overriding which allows java to invoke method based on a particular object during run-time, other than the usual declared type while coding. class TradingSystem{ public String getDescription(){return "electronic trading system";}}class DirectMarketAccessSystem extends TradingSystem{public String getDescription(){return "direct market access system";}}class CommodityTradingSystem extends TradingSystem{public String getDescription(){return "Futures trading system";}}Discussion 2It is very important to identify candidate solutions to make sure that all of the viable approach had been evaluated.

The candidate solution is the toolkit of technologies and it helps in achieving the desired goals. An architectural spike is a test implementation of a small part of the applications overall design or architecture. The purpose is to analyze a technical aspect of a specific piece of the solution in order to validate technical assumptions, choose between potential designs and implementation strategies, or sometimes to estimate implementation timescales. A baseline architecture describes the existing system ,it is how your system looks today.

If this is a new architecture, your initial baseline is the first high-level architectural design from which candidate architectures will be built. A candidate architecture includes the application type, the deployment architecture, the architectural style, technology choices, quality attributes, and crosscutting concerns. I will choose architectural spike because it is a very effective way to refine and evolve a solutions design regardless of the development approach adopted.Discussion 3The four factors to be used in deciding whether a use of copyrighted material is a fair use are as follows:-1.

The purpose and character of the use, together with whether such use is of a business nature or is for nonprofit organizations2. The nature of the work copyrighted 3. The amount and substantiality of the segment used in relation to the copyrighted work as a whole; and4. The effect the use will have on the potential market for or value of the copyrighted work.Discussion 4There exist various technical means of protecting copyright of intellectual property on the Web. Encryption is widely used method to protect the content on the web.

Before the distribution of the content begins, encryption algorithm is run, thereby providing the means to reverse the algorithm only by the devices that could understand it. Therefore, it curtails the accessibility of the content in its original form to certain devices alone. Watermarks and fingerprints are also widely used to monitor content on web. Watermarks are created by the originator of the content and the fingerprints are made by the purchaser of the copyright work. Thereby it allows the device to recognize and authenticate digital prints, and grant permission or deny access.

The e-watermark may be used in a form which is readily apparent like the usual copyright notice on the margin of a photograph. It is possible to embed the watermark throughout the document in a manner of documents printed on watermarked paper; or it may be embedded in manner that the watermark is on the whole undetected and could be extracted only if you know how and where to look.Discussion 5Rights have paved the way in to digital media, and digital rights provide protection to individuals to access the computer and use it.

The positive rights are the rights to obtain some gain or benefit. Positive rights are quite different from negative rights. The negative rights allow or oblige inaction. Whereas, the positive rights allow or oblige action. Quite a number of human rights have been recognized as relevant in connection with the Internet. An example of negative rights is freedom of expression and association. An example of positive right is the expression of copyright. Some of the other rights recognized in the computer field are internet access to everyone; access to knowledge, shared learning and creation - free and open source software and technology development; privacy, surveillance and encryption; governance of the internet; awareness, protection and realization of rights.

Discussion 6:The four kind of software that helped expand use of the Web are:-1. Web browser 2. Internet Relay Chat3. Email 4. CompuServe /Bulletin Board SystemDiscussion 7:There are two approaches to the problem of protecting personal information are (a) the free market view and (b) the consumer protection view. With respect to the issue of a company disclosing personal information, there exist difference between the free market view and consumer protection view. In free market approach, the consumers expect that commercial entities would keep their privacy to a certain degree.

Whereas, in a consumer protection approach, it is recognized that consumers do not have the time or knowledge to make informed choices. Therefore, in the consumer protection approach, it advocates greater government definition and enforcement of privacy standards. Credit bureau is also known as consumer reporting agency or credit reference agency. Credit bureau collects information from various sources and provides consumer credit information on individual consumers for a variety of uses. In a free market approach, commercial entities are not responsible for the errors in the data about an individual.

The consumer protection approach, the organization is liable for any such error committed, as the consumer is devoid of the time or knowledge.Discussion 8An opt-in policy is permission based marketing. In this, it requires a potential customer for self selecting the services they wish to subscribe to. In this they can select the way in which information provided by them may be used. In opt-out policy, existing customers receives e- communications, based on prior relationship, without actually providing express permission.

Lets say I am filling out a survey for an online magazine, if the email newsletter subscriptions are unchecked by default, then it is an opt-in policy. If I am given the option to opt-out in the future by certain means, it is known as opt-out policy.Discussion 9Anonymity on internet is useful to those who like to discuss certain personal stuffs openly which otherwise would be embarrassing to talk about openly. Should a person be located in a country with a repressive political regime, anonymity serve as a boon to provide their political opinions and avoid persecution at the same instance.

However, there is a dark side of anonymity. A criminal can be protected from anonymity for performing many different crimes, like slander, distribution of child pornography, illegal threats, racial agitation, fraud, intentional damage such as distribution of computer viruses, etc. Anonymity is also widely used to seek contacts for performing illegal acts. Anonymity could be used for offensive communication. There are various means to remain anonymous online. Some of the software that assist in accomplishing the goal are Anonymizer, GhostSurf, Hide My IP.

One can remain anonymous by not disclosing any private information. In certain cases when it is required, such as to fill up the last name; can fill it up in partial information such as only last initial.Discussion 10Free software means software that respects users freedom and community. Roughly, the users have the freedom to run, copy, distribute, study, change and improve the software. With these freedoms, the users control the program and what it does for them. Open source refers to a program or software in which the source code is available to the general public for use and/or modification from its original design free of charge.

Proprietary software is computer software licensed under exclusive legal right of the copyright holder. In a free software source code for the program is not released for public. An Open-Source software is one in which both source code and application is released for public, and one can edit source code to make it better or simply use the application free of cost. A proprietary software is both not free and the source code is not available.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discussion questions1-10 Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Discussion questions1-10 Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1595705-discussion-questions1-10
(Discussion Questions1-10 Essay Example | Topics and Well Written Essays - 500 Words)
Discussion Questions1-10 Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1595705-discussion-questions1-10.
“Discussion Questions1-10 Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1595705-discussion-questions1-10.
  • Cited: 0 times

CHECK THESE SAMPLES OF Discussion questions1-10

Chapter 14 discussion question

1.... It is difficult to evaluate the ethics and morality of individual leaders.... The reason that it is so difficult to evaluate these attributes in leaders is because ethics and morality are subjective.... For some people an act committed by a leader might be perceived as unethical, but the same decision might be viewed as an ethical act by another....
3 Pages (750 words) Essay

Discussion Question Week 2-1D

1.... Difference – Research Question & Hypothesis Statement: The basic difference between a hypothesis statement and research question is latter's association with researcher's stance of making enquiry regarding an issue or a problem.... More specifically, a research question is any specific and investigative remark which reflects an inquisition over which the study is intended....
1 Pages (250 words) Essay

Discussion Questions Week 1

The workplace is often inundated with information on processes, machinery, and the methods that are used to accomplish a task.... Often times our decisions are made based upon a… Only by utilizing critical thinking can we break out of the box of preconceived notions and get a more accurate description of the situation....
2 Pages (500 words) Essay

Week 1 discussion questions

Managing change has become intrinsic part of business strategy to facilitate process improvement opportunities of projects within the organizations.... hellip; different contextual factors vis-à-vis size, technology, environment, diversification and globalization are vital elements that have significant impact on the managerial decision making....
2 Pages (500 words) Essay

Discussion Question 2 Week 10 - Short- and Long- Run Impact

What was initially thought of as tedious and extremely challenging, turned out to be effective in deterring fraud and in ensuring compliance to accounting… According to Wagner & Dittmar (2006), the SOA has “benefitted firms' governance, management, and investors” (p.... 1) through enabling the improvement of the following endeavors: “standardize and consolidate key financial processes Short and Long Run Impact al Affiliation Short and Long Run Impact Evaluate the overall effectiveness of the Sarbanes-Oxley Act todate, and determine who has benefitted most from the passage of the act....
1 Pages (250 words) Assignment

Discussion Week 11 Question 2 Looking Ahead

One learned a lot in this course, specifically in contemporary issues and concerns pertaining to business organizations and legal regulations that need to be considered in their regular course of operations.... One of the more important moral include balancing work life… As such, concepts and applications would assist in one's current and future endeavors especially in terms of the need to be aware of regulations Looking Ahead al Affiliation Looking Ahead Discuss what you have learned in this that will help you in your current or future career....
1 Pages (250 words) Assignment

Discussion question week 11

The role of a professional nurse educator is always multidimensional and therefore maintaining competence is mandatory if there is a need for good results in the nursing field.... The National League of Nursing expects all nurses to have full commitment in their role and maintain… Practicum provides nursing students like me with a platform to learn and practice the theoretical knowledge we have acquired in the class....
1 Pages (250 words) Assignment

Discussion Question 12

To achieve this, nurses must demonstrate sincerity, courtesy, and kindness.... They should also have an effective mastery of communication through… With effective communication, there is a high likelihood of providing holistic and high quality care.... It also fosters a good relationship between the patients as well as the professionals and nurses are able to appreciate and embrace diversity Importance of Communication in Nursing Importance of Communication in Nursing As an advanced professional nurse, effective communication is a key element in ensuring successful outcome and reducing medical errors....
1 Pages (250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us