Order from us for quality, customized work in due time of your choice.
Introduction
This proposal is about the study of Disability and ICT education. It proposes to study how the disabled can be taught ICT and the benefits of introducing ICT education to the disabled. ICT has no universally accepted definition because the concepts, methods and applications involved constantly evolves every day.ICT entails products that manipulate, store, receive or transmit information in the digital form electronically. Examples are computers. Cellphones etc. (tutor2u.net). Disability simply put is the inability to do an activity normally due to impairments such as weak limbs or blindness (uchospitals.edu/online).
Problem Statement
The disabled have been neglected for a long time in the issues of ICT that a majority if not all are computer illiterate or have limited knowledge in ICT. This has reduced them to bystanders as the world progresses and integrates ICT into their daily lifestyles. Some can not even perform basic tasks like making calls or making withdrawals from the ATMs, thereby relying on others for tasks they can perform on their own if trained or educated on ICT.
ICT has become an integral part of our day to day life and it is dictating everything in our lives, for example, emails, ATMs cellphones etc. therefore it will be great of importance to teach it to the disabled so that they can be self-reliant and feel part of the global ICT village.
Objectives
The research project proposes to address the following questions.
-
Why is ICT education important?
-
Why should ICT education be introduced to the disabled?
-
What is the importance of introducing ICT education to the disabled and what are the benefits of this programme?
-
How and when should ICT education be introduced to the disabled?
The local schools for the disabled are willing to allow us to interview their learners to make this research viable in the hope that this research will help improve their knowledge and increase their access to ICT.
Methodology
In order to achieve the research objectives, I am going to use the interview and questionnaire methods to get a response. I have chosen the interview method because
-
We are going to get direct and first-hand information from the study group
-
Because it is difficult for the respondent to give false information during
-
The questionnaire will be useful for those respondents who can not speak. Hear.
-
The interview method will also save research time and resources.
Resources
I will need money to travel to these learning institutions to interview the respondents and to print the questionnaires.
Resource material from the library to get more information about ICT.
Schedule
Qualifications
I am a masters student therefore I am qualified to do this research and come up with empirical findings that will help solve this
Cost/Benefit Analysis
In this global ICT community, it is unthinkable to let anyone lag behind whether disabled or not as the world continues to grow technologically with new technologies developed each day. Therefore the benefit of this research outweighs its cost in that we will be able to make the disabled be at par with the rest technologically to make them independent and self-reliant.
Worms, Viruses and Trojans
Introduction
This proposal is about the study of Worms, Viruses and Trojans. It proposes to study how these security threats are developed, how they can be eliminated and how we can protect our network from their invasion. These security threats have proved fatal and their effects have caused serious damages to our systems that it is high time we should find a permanent solution to rid us of this menace and make our computers safe.
Problem Statement
Trojans, viruses and worms are programmes developed to damage the computer or alter how a programme runs without the consent or knowledge of the owner. (webopedia.com). A virus is a programme that disrupts computer function without the permission of the user, while a Trojan horse contains malicious codes that trigger loss of data and it does not replicate like viruses. A worm on the other hand is a programme that multiplies itself from one system to another while using a host file. It only exists inside other files and spreads through them. (service1.symantec.com). These software threats have wreaked havoc on our systems causing damages that have outreaching consequences to our network systems. Therefore it will be of great value to study how to keep these threats at bay.
Objectives
The research project proposes to address the following questions.
-
Why and how are these security threats developed?
-
How do they enter into our systems and corrupt them?
-
How can we prevent these software threats from corrupting our systems?
-
Is there a way that we can get rid of these software threats completely?
Methodology
In order to achieve the research objectives, I am going to use both the interview and questionnaire methods to get a response from various companies on how these threats get into their system, how it affects their systems and how they control them. I am also going to use internet and library resources to get more information about these software threats and their control measures. These methods are effective because they
-
Will save time
-
I will get adequate and reliable information.
-
I will utilize minimum resources
Resources
I will need money to travel to these companies and to print the questionnaires. I will also internet and library facilities to do in-depth research.
Resource material from the library to get more information about ICT.
Schedule
Qualifications
I am a masters student therefore I am qualified to do this research and come up with empirical findings that will help solve this problem.
Cost/Benefit Analysis
In this ICT community, it is unthinkable to leave our expensive computer systems at the mercy of viruses, Trojans, and worms unprotected. This will help us protect our computers and the valued information in them. Therefore the benefit of this research outweighs its cost.
Copyright Issues in the Global IT market
Introduction
This proposal is about the study of Copyright issues in a global IT market. It proposes to study how these issues limit and affect both hard and software use hence monopoly by developers and exorbitance in pricing and maintenance. Many software companies like Microsoft have been given copyright on their software and this they use to exploit their clientele. They know that no other company will or can provide competition to their software hence they overprice them. This copyrights issues also hinder the compatibility of different software and hardware from different companies. This, therefore, forces a user to stick to one software or hardware brand even if it does not serve ones purposes adequately.
Problem Statement
Copyright is an official concept that gives the inventor of an original work a special right to control its distribution to avoid plagiarism. (sunsite.berkley.edu). These rights give more leverage to the developers of IT software and hardware to exploit their clients through exorbitant pricing and monopoly. This paper proposes how to tackle the copyrights issue on the global ICT market without infringing on the rights of both the client and the software developing companies.
Objectives
The research project proposes to address the following questions.
-
Do copyright issues protect consumer rights?
-
Should copyright issues be implemented and whom should they protect?
-
How and when should copyrights issues be applied without undermining the rights of both the client and the software and hardware developer?
-
How can we avoid exploitation of the consumer through copyrights issues in ICT?
Methodology
In order to achieve the research objectives, I am going to use both interview questionnaire methods to get a response from various companies on how copyright issues affect them and their businesses. I also interview the government officials charged with copyrights issue on the best way forward.
Resources
I will need money to travel to these companies and to print the questionnaires. I will also need internet and library facilities to do in-depth research.
Schedule
Qualifications
I am a masters student therefore I am qualified to do this research and come up with empirical findings that will help solve this problem.
Cost/Benefit Analysis
It is not right to give one person or company exclusive rights to software and hardware development because they always abuse it. Therefore the benefit of this research outweighs its cost.
Network Security
Introduction
This proposal is about the research on Network security. It proposes the study on how we can make our systems more secure to avoid losing valued information in the systems through hacking or virus attacks.
Problem Statement
Network security involves making provision for the computer infrastructure to manage and or restrict network-accessible resources from illegitimate access. They are never adequately done hence constant illegal accessibility. (developers.net). clients continue to use a networked application like the internet to communicate and even transact business bringing with it new security threats thereby putting a lot of pressure on them to install more secure software that is expensive. (comptechdoc.org). This puts a lot of financial t strain on small business owners as they strive to make their computers more secure in order to protect their businesses. Corrupt systems also mean a longer time to clean and vital documents lost.
Objectives
The research project proposes to address the following questions.
-
How can we make our network secure?
-
Who and what should be involved in network security
Methodology
In order to achieve the research objectives, I am going to use both interview and questionnaire methods to get a response from various companies on how they have been affected by network insecurity and how they have tackled this network insecurity.
Resources
I will need money to travel to these companies and to print the questionnaires. I will also need internet and library facilities to do in-depth research.
Schedule
Qualifications
I am a masters student therefore I am qualified to do this research and come up with empirical findings that will help solve this problem.
Cost/Benefit Analysis
We need to make our network more secure and this research will provide us with solutions to this global problem, therefore its viability outweighs the cost.
Works cited
Comptechdoc. 2007. Web.
Developers. 2006. Web.
DidYouKnow. Web.
service1.symantec 2005.. Web.
Sunsite. 2005. Web.
Tutor2u. Web.
UC hospitals 2007. Web.
Webopedia 2007. Web.
Order from us for quality, customized work in due time of your choice.