Posts

Showing posts from May, 2022
Kantianism Week-15 Kantianism, also known as Kantian ethics, is a set of universal moral principles that apply to everyone, regardless of circumstance or setting. Immanuel Kant, a German philosopher, called the principles the "Categorical Imperative", and they are defined by their ethics and sense of independence. Kant's system was a syncretism, or fusion, of British empiricism which highlights the importance of experience in the development of knowledge; Isaac Newton's scientific techniques; and Christian Wolff's metaphysical apriorism (or rationalism), which formalized Gottfried Wilhelm Leibniz's philosophy with its focus on mind. Hereby, a mixture of materials with very disparate origins and natures attracted students to read their own biases into it.
 Review on "Power of Facebook" "Power of Facebook" gives an overview of Facebook's specifications in depth and from where its power is coming from.  In today's world, Meta's importance and connection with Facebook has been mentioned very well.  The article is overall well written. Without delving too deeply into the terminology, the language used is straightforward and appropriate for the subject. There were few terms that are used without a definition, but it was not really a must as they are pretty common in the field of IT. I very enjoyed reading this paper as a whole and found it on point as it was both entertaining and useful. I would recommend it for everyone so that they would also refresh their knowledge on one of today's biggest social media platforms.
Image
 Book Review Future Crimes by Marc Goodman           This is the book which I really enjoyed reading and get to know many aspects of IT which I have not really aware of.  To start with, the book introduces us the dark side of the digital world. How to sabotage the world's best-protected nuclear facility?  Why are the top secret records of million dollar companies on paper?  With which software are the world-wide trading exchanges manipulated?  What is hidden in the depths of the Internet?  Why are the internet services you use every day free?  Why does the game you just downloaded on your phone want to access your guide?  How are virtual money and online games used for money laundering?  Is the future the age of hackers and malware?  The answers to all these questions are included in the book. The book focuses on new types of crime in our age.  Cyber ​​attacks, computer viruses, hackers and malware.  It tells about the most interesting cybercrimes of today and the future.  It discu
Image
 Accessibility to the technology Week-14 Gaming Players with physical limitations are something that some developers have a hard time accommodating. To excel in many games, you'll need quick reflexes and rapid, precise inputs. And, especially in multiplayer settings, difficulty and other gaming features cannot be adjusted just for one person, as this could be exploited. Input controllers must be modified to do this.  Everyone can like gaming. Some games can be less approachable than others, but the medium as a whole must be accessible. When cost-effective, it's critical for developers to take steps to cater for a wide range of abilities. When that isn't possible, input elements that are specifically intended can aid.