Wednesday, December 25, 2019

The Acceptability Of Digital Evidence - 849 Words

few published papers describing how judges make this decision. There weren t publicly published results of such or similar scientific research in the region (Balkan Country, The South East Europa and wider). Essential for understanding the acceptability of digital evidence is to understand two basic principles which are mentioned within the acceptability of digital evidence in courts. These are Daubert principle and Frye test. Daubert principle, as mentioned, replaced longtime used „Frye testâ€Å", and according to it, science and scientific methods are increasingly introduced as mandatory in expertise and presentation of digital evidence. American Rule 702, as part of the Federal Rules of Evidence, provides guidance on expert qualification and reduces the possibility of bias in expertise. Rule 702 of the American legislation is used as a preventive for possible speculations by experts, and which judge could use. In order to be properly informed and to be able to make decisions on the acceptability of digital evidence in court, and to understand expert witness testimony, the judges and the jury must own certain knowledge about information and communication technologies (ICTs) [1, 2,3]. In most case that knowledge is not based on formal training and education, rather than on personal experience and knowledge which is gained through computer and Internet use [4,5]. In his research Mason [6] presented several complex situations with which the judges encounter and have to copeShow MoreRelatedEffects Of Hypertension On Patients With Hypertension1347 Words   |  6 Pagesgarlic as an intervention in patients with hypertension. Ried et al (2010) conducted a double blind parallel-randomized placebo-controlled design, quantitative study. The purpose of this study was to assess the effect, tolerability and acceptability of aged garlic extract as an additional treatment to already antihypertensive medication in patients with treated, but uncontrolled hypertension (Ried et al, 2010). The researchers used specific criteria to select their participants. Some criteriaRead MoreImproving The Medication Adherence On Health Behaviors Across Races1503 Words   |  7 Pagesincluded all diabetes patients who were prescribed statins and who refilled prescriptions with Kaiser Permanente Northern California (diverse patient population) [4]. Statins were used as a medication class on which the refill function was studied. The evidence was in the form of percentage of time without statins. The data were interpreted using statistical tools for analysis and interpretation. It was observed through the analysis that 12.9% was the average percentage of time without the supply of statinsRead MoreSocial Media And Its Impact On The Current Population1019 Words   |  5 Pagesallows the creation and exchange of user-generated content.†(1) Social Media is a web-based product that is optimized solely by the use of its public. The only way social media can expand depends exclusively on the user and their wants. The new digital age has brought about extraordinary developments in technology that has altered the way many people access and use information. The consistent technological developments that help connect the world can be seen as either beneficial or detrimental toRead MoreDisadvantages Of Technology1714 Words   |  7 Pagesexpend on their digital devices surpasses the amount of sleep they receive in a days’ time. Within today’s society technology reigns over every aspect of life. However, one element has eluded this sovereignty all the while remaining prevalent in our world still exists. This entity that has survived is simply called school. Although the current education system has remained constant for millennia, it is time for the past to interchange into the future. The upbringing of the digital age has arrivedRead MoreThe Impact Of Electronic Patient On Patient Care : A Systematic Review Of Controlled Trials1646 Words   |  7 Pagesas systemic review has alrea dy been conducted, paper on telemonitoring systems were also not included where the focus was only to provide information to patients. A literature search was conducted on PubMed, Cochrane Library, CINAHL, EMBASE, ACM Digital Library and UMIT’s own Evaluation Database for relevant studies [2]. The search for the research paper was done by feeding query. The query search was ‘medical record system’ and ‘patient portal’. The duplicates were then removed. The authors wereRead MoreCurrency Money For Digital Currency And Advantages Of Different Forms Of Money2880 Words   |  12 Pages From commodity money to digital currency advantages and disadvantages of different forms of money 1. Introduction Throughout the history we can see different standards of values and structures of using money, for example commodities (gold, silver, cooper, salt), paper money, credit card, mobile phone banking services via SMS, Euro currency in 23 countries, Bitcoin or most latest Facebook Credits. There was an interesting and very accurate assumption made by J. Surowiecki (2012), he wrote thatRead MoreHow Microvascular Reconstructive Surgery Is An Effective Way For The Medical Team Essay2429 Words   |  10 Pagesadjunct method of free flap monitoring comparted to traditional methods. This proposal will discuss the relevance of using digital photographs and internet technology as a means to improve response times between the nurse and the primary plastic surgeon that increase salvage rates of ischemic flaps. Conclusive findings from two studies involving 200 free flaps indicate that digital photographs and smart phone communication resulted timely intervention by the plastic that contributed to the success ofRead MoreEssay Describing and Discussing the Processes and Challenges Involved in Identifying, Recovering, Securing, Examining, Analysing and Preparing Digital Evidence from a Crime Scene4924 Words   |  20 PagesTable of Contents Section1: Introduction 2 Section 2: Describe digital evidence 2 Section 3: Explain the key principles of cyber forensics 5 Standardization 5 Evidence integrity and reliability 5 Section 4: Discuss investigation processes 6 Preserve evidence 6 Locate evidence 6 Select evidence 7 Analyze evidence 7 Validate evidence 7 Present evidence 7 Section 5: Discuss and the importance of crime reconstruction hypotheses and alternative 7 Section 6: Conclusion 8 Reference 8 ResearchRead MoreAfrican Immigrant s Beliefs And Lifestyle Behaviors That May Impact Health2272 Words   |  10 PagesAfrican immigrant’s beliefs and lifestyle behaviors that may impact health. According to the researchers, there is need to find out how health providers can help to promote healthy eating and physical activity. Researchers indicated that Limited evidence shows that African immigrants tend to be healthier than US-born white and African Americans. Immigrants may face barriers in maintaining healthy native diets or acquiring healthy physical activity habits in their new countries. The researcher indicatesRead MoreThe Impact Of Internet On Its Day Today Happenings2313 Words   |  10 Pagesof human life. Out of all, banking operations have greater impact of ICT on its day-today happenings. An e-cash payment system is one of the evidence of impact of internet and information Communication technology jargons. In this process a consumer/client opens an account with the banking organization or other which could give and receive money in the digital coins form. In the case client s account is deposited in the form of real money, as it is attached to the client s checking account in reality

Tuesday, December 17, 2019

The First Programmable Computer Ever Created - 1281 Words

The first programmable computer ever created, ENIAC made in 1946 sparked a promising advancement in technology. Each passing generation brought a new groundbreaking advancement in computer technology. And with each advancement, the previous generation quickly became obsolete. A computer made in 1985 would almost certainly be inferior to a computer made the next year. But a computer made in 2010 can still be widely used and integrated into 2016 computing. This leads me to believe that improvements in computers are slowing down and furthermore, that computer technology is plateauing. Arguably the most important creation would be the integrated circuit which allowed cpus and the circuit board to pack more power into a smaller design. But after this technology was created, there was a noticeable lack of any more groundbreaking advancements. â€Å"Each technology generation alters circuit physics and requires new computer aided design software.†(Markov). Markov makes a good point here. He says that for every stone we pass in technology, circuit physics advances or changes and we must account for it. When this happens, we must also change the means in which we manufacture, typically with computer-design software. Take for example when the integrated circuit was created, we could not use obsolete technology in our chips and electronics, Small scale integration (SSI) of the integrated circuit began in 1964, seeing their first use in early aerospace projects. The next level ofShow MoreRelatedSteve Jobs Essay862 Words   |  4 Pagesdropouts joined together to st art Apple Computer in 1976. They are credited for inventing the first computer for home use. They made it possible for people to have a computer anywhere in their home, or on an office desk, where previously a single computer took up a whole room. There creation changed the world. However Steve Jobs didn’t change what was in the products but how they looked, functioned, and what they meant. In 1776 the Apple I was finished being created. Jobs and Wozniak had spent six monthsRead MoreA Comparative Study Of Risc, Mainframe, And Vector Processor Architectures Essay1218 Words   |  5 Pages A comparative study of RISC, CISC, Mainframe, and Vector processor architectures Over all the world there are software programmable devices for all applications for different uses and purposes. Also there are software programmable devices that are used only for networking applications, they are called Network Processors. Network Processors have evolved over the years and have a lot of different types for same and different purposes. Network Processors are used for moving data from place to anotherRead MoreAnalyzing The Multi User Operating System With Li And Ci Analysis811 Words   |  4 Pagesin addition to show realistic, gives a greater number of abilities than prohibitive character-based interface. In any case the character interface is truly essential and considered great from another perspective: it is more programmable and more capable than any GUI can ever be. Additionally we have to recognize that thought of GUI interface from most regular execution - mouse-based registration drop sort of interface that is frequently connected with this term. It is only one conceivable usage ofRead MoreAutomation And The Assembly Line Essay1443 Words   |  6 Pages Automation has taken many forms in the past century with new technologies being introduced and great innovations being made. Automation was first established in 1913 with the assembly line: â€Å"The introduction of the assembly line at Ford Motor Company in 1913 is often cited as one of the first forms of automation† (Dias, 2014). While this type of automation is very different from what we experience today, it is a great example of just how time saving it can be to add automation to a production processRead MoreHistory of Video Games740 Words   |  3 PagesIn 1943 the first ever computer was built by British engineer, Tommy Flowers. It was a digital programmable computer. In 1952 a Tic-Tac-Toe based game was created by Alexander Douglas. You could say that was the first video game but in 1958 a game called Tennis for Two was created by William Ginbotham and Robert Dvorak. Afterward for people began and started to explore video games. In 1962 Space War was created by Steve Russle but was never released , this started a roar for the first gamers. WallaceRead MoreComputer Company : A Whole New Era Of Technology1426 Words   |  6 Pagesof the very first computer company was founded, thus beginning a whole new era of technology that has evolved over a period of 76 years and has yet to slow down. Throughout the decades computers have transformed from machines that took up the space of an entire room, to fitting in the palm of your hand. Computers come in all shapes, sizes, and types such as desktops, laptops, cellphones and even game systems. While computers have an assortment of functions and purposes, some computers only have oneRead MoreHistory Of Computers During World War II948 Words   |  4 PagesHistory of Computers Introduction In today’s modern world, it’s hard to imagine life without computers. Throughout the decades, computers have gotten better, faster, and smaller. It’s hard to imagine that before the 20th century almost all calculations were done by mechanical devices such as the electromechanical computers; or, the first digital computers that had huge tubes around them that you had to designate a whole room just to fit the computer in. Today we have Internet, phone book, picturesRead MoreGrace Murray Hopper:The Spark for the Information Explosion Essay599 Words   |  3 PagesMany people today complain about how slow their computer is. They claim it takes forever to boot up, has slow internet, and can’t run the latest game. But, can you imagine if you didn’t have a computer at all? Nowadays, computers have revolutionized almost everything: mail, news, business, marketing, schools, and even gaming. They are trusted with humanly-impossible tasks and are many peopl e’s main gateway to the real world. Have you ever given thought to who is to thank for all of this? Was itRead MoreSteve Wozniaks Journey to Creating Apple Computers Essay993 Words   |  4 Pagesall full. So Steve went back to his parents to tell them the news, and they agreed to send him to Colorado University for his first year of college. He was not a dedicated student, since he liked to pull pranks such as jamming residents cable in the dorms. Regardless, he will land several engineering jobs which would eventually lead to the invention of the Apple Computer. Steve wanted to continue at Colorado University, but he knew his parents could not afford it. He decided to go to DeAnzaRead MoreThe Impact Of Modern Day Cryptography On Society Today1407 Words   |  6 Pagescreation of the computer it existed in a very primitive form. During World War I cryptography became an important focus in order to create secure messages that were not vulnerable to enemy capture. With the invention of the computer, it quickly became possible to create complex encryption schemes that are nearly impossible to attack. The beginnings of modern day cryptography can be traced back to the 1920s with the Enigma machine and the 1940s with the creation of electronic computers such as Colossus

Monday, December 9, 2019

Finance Asian Financial Crisis

Question: Discuss about the Financefor Asian Financial Crisis. Answer: Solution: The Asian financial crisis occurred in 1997-98 provided valuable lessons which are as follows: There is a need to receive debt in terms of foreign currencies at low level as overborrowing in foreign currencies results in the occurrence of financial crisis. This has led to low external debt to GDP ratio and low corporate short term external debt. Therefore it is advisable to the companies to hold debt in terms of foreign currencies at low level. In addition to this, the financial crisis of Asia also results in the provision of flexibility in the Asian currencies. The main reason behind it is that the financial crisis occurred due to loss of value of various Asian currencies to 50% during the financial crisis (Wolf, 2007). In addition to this, many Asian countries have forced to bailout to International Monetary Fund due to which in recent years countries focused on building up its foreign exchange reserves as a buffer to cover approximately 15 months of imports. Liquidity in the domestic bond market provide an opportunity to Asian markets to borrow for finance spending. The financial crisis in 1997-98 has provided a lesson to offset capital outflows by maintaining current account surpluses. Besides this, decline in the commodity prices have helped in increasing the trade surpluses as the Asian countries are net importers of commodities. After 1997, the Asian countries manage their short term liquidity problems by making a multilateral currency swap agreements. This also helps in increasing the transparency in the information related to finances of the countries (Carney, 2009). Solution: Credit risk is a default risk on a debt when a borrower fails to make the payment of the debt. It is the risk in which a lender may lose the payment to be received as a principal and interest associated with the loan. This risk arises due to the expectation of the borrower to utilize future cash flows to repay the current debt (Wagner, 2008). Solution: There are two approaches used by banks to measure the credit risk capital adequately as a component of pillar 1 namely standardized approach and internal ratings based approach. Under the standardized approach, credit risk is measured in a standardized manner as supported by external credit assessments. In the internal rating based approach, there is a requirement of explicit approval of the supervisor of a bank in which the internal ratings systems is used to calculate credit risk (Musch, et al. 2008). Solution: Under Standardized approach, there is a set of credit risk measurement techniques under the capital adequacy rules of Basel II for banking institutions. Under this approach, commercial banks are required to use the ratings provided by external credit rating agencies for the purpose of quantify the required capital for credit risk. In this method a capital ratio is calculated by the use of regulatory capital and risk weighted assets. Besides this, the capital ratio must not be lower than 8%. Besides this, risk weighted assets are calculated by multiplying the capital requirements related to market risk and operational risk by 12.5 and addition of the figures obtained to the sum of risk weighted assets for credit risk (Musch, et al. 2008). Solution: Nowadays, it is mandatory for the companies to disclose the relevant and material information related to the business activities by the companies listed on stock exchanges which are sensitive to the movement of stock prices on stock exchange. The main reason behind it is that the disclosed information results in affecting the decisions of the investors. It is required for the companies to disclose important information related to it such as corporate restructuring, expansion of the business, disclosure of financial information and so on which has a direct impact on the investment decisions of the investors. Such information has a direct impact on the stock prices of the companies listed on the stock exchange (Westbrook, 2014). It is necessary for the companies to provide information related to the changes made in the organization for the purpose of attracting investors to make investment in the companies which in turn helps in raising funds for the company. Thus, information is consi dered as the lifeblood of an efficient stock exchange. Solution: A company that has a knowledge that a particular piece of information has a significant impact on the prices of the stock of a company are required to be disclosed to ASX. The information disclosed by the company would be considered material if the people that commonly invest in the securities are likely to be affected by the piece of information as per the Corporations Act. Besides this, such information is also considered material if it has a significant influence on the buying and selling decisions of the investors. In addition to this, it is also important for the companies listed on ASX to provide continuous reporting of the events carried out by the company in order to provide full information to the investors in a quick manner so that they can make effective decisions in a quick manner (Plessis, McConvill, and Bagaric, 2005). Solution: Five pieces of information that are being regarded as material and should be reported to stoick exchange include the following: It is essential for the companies to disclose information related to a transaction that results in bringing a significant change in the nature of the activities of an entity. It is also essential for the company to provide the information related to under subscription and over subscription of an issue of securities. The information related to the termination, variations and entry into material agreement. Such information entails the grabbing of an opportunity by the company and has a significant impact on the financial position of the company. The information related to appointment of a administrator or liquidator by the company. The information related to discovery of a material, mineral or hydrocarbon. Such type of information has a direct influence on the stock prices and decisions of the investors in a significant manner (Plessis, Hargovan and Bagaric, 2010). Solution: In the dividend reinvestment schemes, the investors receive additional shares in place of cash dividend. These shares are issued at a discount on the current market price of the shares of the company. In addition to this, due to occurrence of capital gain tax, the investor receives a cash dividend and then buys the addition shares. It has many advantages as a source of equity funding. The companies can retain its capital by providing dividends in the form of shares rather than in cash which can be used to pay debt or make investment to expand the business operations (Brigham and Houston, 2012). Solution: The main advantage of the dividend reinvestment scheme from the viewpoint of the company is that it results in the retention of the capital of the company in order to make investments in expansion of the business activities or paying off of the debt of the company. In addition to this, from the view point of the investor or shareholder is that there is no need to make the payment of the brokerage fees by the shareholder. Besides this, this also results in increasing the savings of the investors as they do not the dividend in the form of cash so that they can spend rather their profit is being reinvested in the company in an automatic manner to generate more profits (Damodaran, 2010). Solution: There is a possibility that the company has limited investment opportunities due to which there is no requirement of the additional funds raised through dividend reinvestment scheme due to which companies suspend the schemes from time to time. This may also results in diluting the earning per share of the company (Lumby and Jones, 2003). Solution: The strategy adopted by the company is that the company has save the amount to be paid in cash related to dividend by issuing one bonus share on three shares held by the investor. Such funds can be utilize for making investment in expansion of the business or paying off the debt of the company. The term cum-dividend refers to the payment of the dividend to shareholder in the near future. In this, the company has made the announcement of making a payment of the dividend but it has yet to be paid. Under this, if a shareholder has sold the shares of cum dividend then they are not entitled to receive a dividend on the sold shares. In case of ex-dividend, the shareholder is entitled to receive the dividend even if it sells the ex-dividend shares to another person. In this case the new owner of the shares is not entitled to receive dividend on the shares (Steiner, 2012). Solution: The theoretical price of the share after the bonus issue and the dividend payment occurred is ($14.70-$0.45) $14.25. Solution: First of all, the share prices have been assumed for a company for 6 months and then a line chart has been drawn. In addition to this, a return has been calculated by subtracting the share price of next month with previous month and divided by the share price of previous month. In this manner return has been calculated for 6 months. After that a line chart has been drawn. Solution: The head and shoulder pattern is the most popular pattern in the trend line. It is a reversal pattern which is formed and moved against the previous trend. The top of a head and shoulder signals that a price of security tends to fall once the pattern is completed and is formed at the peak of an upward trend. The inverse head and shoulder pattern signals that the prices of security is tend to rise and forms during a downward trend (Cheng, 2007). Solution: During the analysis of trend lines, the five reasonably reliable generalizations are as follows: If a trend line is long and tested more number of times then it has a greater validity. Along with this, if there is an occyurrence of indecisive break due to carrying out three or four tests at the time the trend line is long then the original trend is retained and there is an ignorance of penetration. When the established trend line is broke due to intra- day trades then it signalizes weakening trend if break out is on high trading volumes. If the chartist has not attained well established trend on return line that it would result in the deterioration of the trend. If a trend is break at the downside then fall in the prices from it often make a return move towards the line. This provides a good selling point to the trader if it has not sold it at a break of the trend (Acar and Satchell, 2002). References Acar, E. and Satchell, S. 2002. Advanced Trading Rules. Butterworth-Heinemann. Brigham, E.F. and Houston, J.F. 2012. Fundamentals of Financial Management. Cengage Learning. Cheng, G. 2007. 7 Winning Strategies For Trading Forex: Real and actionable techniques for profiting from the currency markets. Harriman House Limited. Damodaran, A. 2010. Applied Corporate Finance. John Wiley Sons. Lumby, S. and Jones, C. 2003. Corporate Finance: Theory Practice. Cengage Learning EMEA. Musch, F.C. et al. 2008. Basel II Implementation in the Midst of Turbulence. CEPS. Plessis, J.D., McConvill, J. and Bagaric, M. 2005. Principles of Contemporary Corporate Governance. Cambridge University Press. Plessis, J.J.D., Hargovan, A. and Bagaric, M. 2010. Principles of Contemporary Corporate Governance. Cambridge University Press. Steiner, B. 2012. Mastering Financial Calculations: A step-by-step guide to the mathematics of financial market instruments. Pearson UK. Wagner, N. 2008. Credit Risk: Models, Derivatives, and Management. CRC Press. Westbrook, I. 2014. Strategic Financial and Investor Communication: The Stock Price Story. Routledge. Wolf, M. 2007. The lessons Asians learnt from their financial crisis. [Online]. Available at: https://www.ft.com/cms/s/0/efb6e612-08ca-11dc-b11e-000b5df10621.html?ft_site=falcondesktop=true#axzz4Ub04hTao [Accessed on: 2 January 2017]. Carney, R. 2009. Lessons from the Asian Financial Crisis. Routledge.

Sunday, December 1, 2019

Jane Eyre Essays (345 words) - English-language Films, British Films

Jane Eyre annon Charlotte Bronte uses violence in several scenes throughout the novel. The violence in the novel is not fatal to anyone, it is just used to catch the readers eye. This novel consists of many emotional aspects. For example, the violence in the scene where Mr. Mason gets attacked. The attack really upsets Jane and Mr. Rochester. In the novel Jane Eyre Charlotte Bronte uses several acts of violence to create suspense, mystery, and characterization. This scene is probably the best one to create the suspense of the novel. It keeps a person interested in the book and wanting to know what happens next. There is no way of knowing why this happened, who does it, or if Mr. Mason is going to live or die. That is why Charlotte Bronte used violence to create this kind of suspense. So a person would be interested enough in the novel to keep reading. The mystery is a mystery itself, there is a secret at Thornfield and Jane can sense this. Then there is the mystery of the person who committed this act of violence. Jane suspects who it might be, but she is not for sure. To find out the mystery of the house and the person who did it a person has to solve it. Finally, there is the characterization of Bertha. From the way Rochester talks about Bertha at first she seems pretty normal, but he says how she become after they get married. She turned into someone he did not know, a crazy psychopath, mad woman. Rochester wanted to hide this from everyone even Jane, Bertha cares for no one but herself. She does not care who she hurts, she proved this when she hurt Mr. Mason her own brother. At last, the end of the novel, The suspense, mystery, and characterization are all told. The person that this all revolved around was Bertha. It was Charlotte Bronte s clever way of keeping the novel interesting and the reader interested. She even tells us what happens ten years later. She does this so they will be no mystery or suspense of what was going to happen in their future.