Erickgoose
On this page, you find all documents, package deals, and flashcards offered by seller Erickgoose.
- 31
- 0
- 0
Community
- Followers
- Following
31 items
Differences Ethics and Rights- Study Guide and Document
Rights are contract-based theories and are the consequences of our actions.Historically, humans have set the guidelines defined by the communities and groups that they belonged to. These guidelines later became rights or the values that keep society fair, just and equal. 
They protect all of us. 
Although the definition of rights is debatable, it can be formally defined as anything legal, social, ethically privileged, or entitled to do as a citizen, individual, or human being.John Locke (Pronunc...
- Class notes
- • 16 pages •
Rights are contract-based theories and are the consequences of our actions.Historically, humans have set the guidelines defined by the communities and groups that they belonged to. These guidelines later became rights or the values that keep society fair, just and equal. 
They protect all of us. 
Although the definition of rights is debatable, it can be formally defined as anything legal, social, ethically privileged, or entitled to do as a citizen, individual, or human being.John Locke (Pronunc...
Types of ethical principles - Study Document and Guide
When it comes to ethical theories, we view our decision to be good, or just, based on two factors, namely, 
a. Action, and 
b. Result 
When ethics is implied in decisions that determine actions, the ethical approach follows the non-consequentialist theory. This ethical approach focuses on the decision-making process rather than the consequence of the decision or the outcome. 
Here, the decision-making is taken as a form of obligation or duty. And, the followers of this approach are known as non-...
- Class notes
- • 20 pages •
When it comes to ethical theories, we view our decision to be good, or just, based on two factors, namely, 
a. Action, and 
b. Result 
When ethics is implied in decisions that determine actions, the ethical approach follows the non-consequentialist theory. This ethical approach focuses on the decision-making process rather than the consequence of the decision or the outcome. 
Here, the decision-making is taken as a form of obligation or duty. And, the followers of this approach are known as non-...
Ethics and Principles - Study Guide and Document
Ethics comes from the Greek word ethos, which means customs, behaviours or habits. 
Therefore, ethics simply is the study of what it means to do the right thing. Moreover, it is a major branch of philosophy that deals with having the right behaviour and leading a good life.
- Class notes
- • 18 pages •
Ethics comes from the Greek word ethos, which means customs, behaviours or habits. 
Therefore, ethics simply is the study of what it means to do the right thing. Moreover, it is a major branch of philosophy that deals with having the right behaviour and leading a good life.
Normalization and its importance- Study Guides and Notes
Data in databases are usually stored in large volumes. And if we do not organize them correctly, it will be a tedious task to retrieve specific data from them. This is where normalization comes in. 
That means, with the help of normalization, we can reduce data redundancy and organize data more efficiently. 
Thus, normalization is a database design process used for database creation or data modelling. This is where we can decompose and systematically form tables to reduce data redundancy and dat...
- Class notes
- • 10 pages •
Data in databases are usually stored in large volumes. And if we do not organize them correctly, it will be a tedious task to retrieve specific data from them. This is where normalization comes in. 
That means, with the help of normalization, we can reduce data redundancy and organize data more efficiently. 
Thus, normalization is a database design process used for database creation or data modelling. This is where we can decompose and systematically form tables to reduce data redundancy and dat...
White Box Testing Study Guide and Notes
White-Box testing It is a test case design approach that uses the control structure (described as part of procedural design) to DERIVE test cases.•We can derive test cases that: 
a.Guarantee that all independent paths within a module have been exercised/covered at least once. 
b.Exercise all logical decisions on their true and false sides. 
c.Execute all loops at their boundaries and within their operational bounds. 
d.Exercise internal data structures to ensure their validity.
- Class notes
- • 12 pages •
White-Box testing It is a test case design approach that uses the control structure (described as part of procedural design) to DERIVE test cases.•We can derive test cases that: 
a.Guarantee that all independent paths within a module have been exercised/covered at least once. 
b.Exercise all logical decisions on their true and false sides. 
c.Execute all loops at their boundaries and within their operational bounds. 
d.Exercise internal data structures to ensure their validity.
Logical Consequences and Validity of Arguments - Study Guide
In this document, i have: 
Explained the concept of logical consequences and arguments with examples, 
and 
Solved problems related to logical consequences and validity of the arguments
- Class notes
- • 13 pages •
In this document, i have: 
Explained the concept of logical consequences and arguments with examples, 
and 
Solved problems related to logical consequences and validity of the arguments
Succesfully Pass a Network Audit - Technical Report
When we talk about a network, basic devices that we have to talk about are routers, switches and firewalls, these three devices are the base of any network. Therefore, an audit to those devices is mandatory to verify correct configurations and precautions in order to avoid cyber-attacks. Successfully attack or compromise a network is relatively easy to do it, all we need is an attacker running a Pen testing Operating System like Kali Linux and access to the physical network. This tool can easy t...
- Presentation
- • 11 pages •
When we talk about a network, basic devices that we have to talk about are routers, switches and firewalls, these three devices are the base of any network. Therefore, an audit to those devices is mandatory to verify correct configurations and precautions in order to avoid cyber-attacks. Successfully attack or compromise a network is relatively easy to do it, all we need is an attacker running a Pen testing Operating System like Kali Linux and access to the physical network. This tool can easy t...
Collaboration Diagram - Objects, Actors, Links, Messages, Use-Case diagram
In this document, we study about 
Describe Collaboration Diagram 
 
Understand the relation between sequence diagrams and collaboration diagrams. 
 
Identify symbols and components of collaboration diagram 
 
You’d be able to convert a use case into a collaboration diagram
- Class notes
- • 18 pages •
In this document, we study about 
Describe Collaboration Diagram 
 
Understand the relation between sequence diagrams and collaboration diagrams. 
 
Identify symbols and components of collaboration diagram 
 
You’d be able to convert a use case into a collaboration diagram
Security Policies & Practices For E-Government
With the rise of technology and digital transition, e-government has been an important 
medium for the government and its citizens to interact. It has been very helpful to both the 
government and citizens in terms of reduced cost/time and other many things. Citizens have 
been able to get served promptly. But along with its advantages, there are many serious 
challenges and issues to sustain it. One of the critical challenges is cybersecurity and various 
security threats associated with it. So...
- Thesis
- • 18 pages •
With the rise of technology and digital transition, e-government has been an important 
medium for the government and its citizens to interact. It has been very helpful to both the 
government and citizens in terms of reduced cost/time and other many things. Citizens have 
been able to get served promptly. But along with its advantages, there are many serious 
challenges and issues to sustain it. One of the critical challenges is cybersecurity and various 
security threats associated with it. So...
Thesis on CROP RECOMMENDATION SYSTEM USING MACHINE LEARNING ALGORITHM
As per the world bank, the main source of food, employment, and income is agriculture. To increase productivity, the government needs to focus on irrigation, implement hybrid seeds, and use fertilizers in the high yield areas. Due to the lack of distribution of those needs Nepali agriculture is being backward nowadays. (bank, 2020) 
Although new technology in agriculture has improved production levels but farmers still facing problems. These problems can be solved by using new technologies such ...
- Thesis
- • 43 pages •
As per the world bank, the main source of food, employment, and income is agriculture. To increase productivity, the government needs to focus on irrigation, implement hybrid seeds, and use fertilizers in the high yield areas. Due to the lack of distribution of those needs Nepali agriculture is being backward nowadays. (bank, 2020) 
Although new technology in agriculture has improved production levels but farmers still facing problems. These problems can be solved by using new technologies such ...