UCSI has always been a comprehensive university that offers wide range of courses in their campus. The range of disciplines that is being offered are medicine, pharmacy, engineering IT, applied sciences, business, architecture, music, social sciences, creative arts, hospitality, at undergraduate and postgraduate levels. It has cater to a number growing of students and there will be more academic programmes being offered in the future. Policy makers from the ministry of education have always ensure that the university is responsible for the compulsory education that is taking place. The purpose for the blog is for me to write a suitable suggestions that can be deem helpful to the university and improve the course.
It is often seen as plausible for the UCSI university to improve the teaching standard or learning practices that have been taking place. Part of the improvement process is that lecturers should post the necessary syllabus, contents and tips on the websites that would allow the students to know an upcoming topics before heading to the classroom. Students are able to understand the context effectively this way as they would identify, evaluate and estimate the type of questions that could come up. Instructors are also able to provide a frequent interactions that can be responsive to the students' needs when necessary. Lecturer is able to response in time to the questions need whenever students are preparing for the exam. Moreover, students and lecturers are able to communicate with other and discuss its content via online communication applications such as Whatsapp. Learning resources such as videos can deem to be helpful as it would allow the students to understand the topic betters. Another way to improve the course is to increase the number of practical exercises as the students are able to identify the type of questions that would appear in the exams.
In additions, university facilities should be upgraded to meet the current standard academic requirements. In the existing electrical laboratory, facilities and the equipment should be taken properly to ensure that students are able to use the equipment properly. There should be a proper notice that states the rules of using the laboratory to ensure that equipment are being used in a proper manner. Motivation is also part of the learning engagement that would create a positive education environment. UCSI university should provide a necessary relaxing environment that would create a positive vibe around the atmosphere such as the walls of the classroom should be painted yellow. Yellow colour is often associated with the colour of sunshine, hope and happiness. There has been a great number of study research that shows a great joy or happiness can have a powerful influence towards our study. It would at least increase the student's motivations towards education achievements
In conclusions, a suggestion of a learning process is deem vital and would continue to be such in the future. With an adequate suggestions, it should be deem enough to provide a necessary improvements.
Introduction
It has been evident, that in the modern times, people would rely on their computing devices that would solve the problems and make their lives easier, hence that would create an effective way of delivering their required results in a faster way. By using a traditional methods, people have often took a longer time to finish their task can be saved by the usage of computers. More ever, an individual would be able to easily close deals or sign online via electronic devices in any locations while spending their own desired time. In this essay, i would describe an importance of privacy, security, legal and green computing awareness for society. In my opinions, these are the fundamental changes that been a brought a significant that have been major factor that contributes to the economy and society.
Privacy
Privacy has included a lot of rights or certain privacy which would take into account of storing , purposing, provision of third parties, especially it could display a data that would be relevant to oneself by means of internet. It is often vital to have a privacy, as it would protect a certain individuals from being accessed by an authorized users. For example, if a certain user is establishing their own websites in the internet, that person would want to protect their individual folders that contain confidential data from getting accessed by certain visitors. The user is able to set up a configuration files and indicate the level of accessibility for the folders. Privacy often allows us to justify oneself, as they do not have to consume unnecessary times to find the data and that person will be able to use the data anytime. Privacy is often perceived as sensitive to individual which could affect reputations. Privacy would often allow a person to exercise power over information about themselves. If the data is leaked to the wrong hand of a person. It could damage unnecessary reputations about the individuals and would cause great harms.
Security Computer security has been stated as a certain protection of information systems from theft or damages that may arise. It would also cause a damage to hardware, software, or data on them, including interference to services that are being delivered. Moreover, the importance of computer security can prevent an important data theft such as credit card information which could cause a firm a millions of dollars. Data that is being presented in computer can be misused by intruders. It is often a safe way to browse a websites that include HTTPS. A security such as anti virus could protect the firm from a malware attack that could cause a crash to the computer operating system. Though there is a cost in getting an antivirus, its feature is to identify and protect the data from malware attacks that cause could a crash to the operating system. A staff should be trained regular in order ensure majority of the security is taking place such as setting up login credentials, a proper instructions of a website lits that should not be enter, thus prevent a mishaps from happening.
Legal Legals law has been around the society which has been enforced throughout the governmental institutions in order to regulate behaviors. It is consider to be a system that regulates and to allow the individuals or communities to stick to the will of the country. Its uniformity and conviction provides a smooth path that would allow the communities to feel safe in the street. The procedure for the law usually has its own benefits that would protect human rights, or resolve disputes to ensure that communities have a peaceful place to live in. it usually serves as an understand so everyone could understand what can be done. A certain copyright protection which is intellectual property falls under the category among the Copyright Act in US. For example, a blogger or youtuber has to understand that the videos content that is being published are not plagiarized. Legal law often protects us from the humiliation or immorality. For example, if Kelvin from a community decides to defame John, Kelvin is able to utilized with the rules of law and sue back. Hence the person being held will be accountable for the actions and get detained if Kelvin is considered guilty under the court of law.
Green computing Green computer has been known as a a part of study of designing, manufacturing, utilization and disposal of an electronic items that would decrease environmental impact hence an eco-friendly way of using a electronic devices. People have started to understand that as most of the times contain toxic materials which would affect the health. Therefore, governments from certain countries would implement a law that would ensure that the products that are being produces are environmental friendly which can keep environment safes. Green computing often consumes less power compared to the old models. Display technologies known as electronic paper often doesn't require any powers when showing an image. Knowing this, to have green computer system in the firm would allow the customers to know that the firm is trying to do good deeds that increase brand and company images since they would do anything to decrease hazardous materials. Some firms try to replace their materials with recycling materials that often needs to be manufactured, which would other save energy and emissions.
It has been evident, at the modern times, people have spent majority of their times on the internets. It has been agreed that even though the internet usage have risen dramatically as the accessible for the communications are available over the world. It would eventually have an detrimental effects on the type of social interactions that are taking place. Internet has been known as a type of global computer network which brings forth a type of information, data, communication facilities available which will be made up of global networks via standardized communication protocols. During the mid 1990's, it has always been a famous form of telecommunication for anyone who's using the computer. Initially it was designed as a medium to for a United states research scientists for their purpose for communications. It has never been a secret that it had been been a part of people's lives.
In 1969, the 1st ever message was dispatch from one computer to the other via APRANET. It was a computer that was used only by the governments network during that time. It was stand for "The Advanced Research Projects Agency Network. An organisation called National Science Foundation was assuming responsibilities for the connection of the users from APRANET, which had been disassemble in 1990. Internet has grew so far that, majority of the people from legal system was unprepared at the time. In the same year, the first appearance of world wide web was made, that caused the internet to be famous. It was known as a type of multimedia interface which grants transferal of data known as web pages. It was the same browsers that majority of the people had been using till this day such as Mozilla Firefox, Google Chrome and Internet Chrome. Till these days, it have been providing a means for people to retrieve data or knowledge on any kind of topics. Federal courts, during the time, have allowed employers a permissions to monitor their worker's email twas deemed owned by a company, hence employees at the time had to have no expectation of privacy as long it was involved with a email of a firm.
Few studies were not observed that Internets could begin to explode and meddle in the political and legal issues in the societies. After all, many computer networks consisting of 160 countries were consider relentlessly in the media around 1990. Back in 1988, there was this browser known as Morris Worm which had a first attacks on the internet that affected around 60,000 computers around the world.The US Computer Emergency Readiness Team had ceased to find the sum of total attacks that were taking place. The numbers of attack were so huge that the figures became extremely difficult to pursue. It still remained debated issue up till this day. Likewise, computer viruses often caused a high number of damages to the company's share values that would affect the investors.
In the modern times, internet has allowed for a greater flexibility in the working hours as employees are able to work anywhere from different locations, as employees are able to able their data via servers or mobiles for work purposes without going to the actual locations. Many people have also use the world wide web in order to access news, or any social media related to keep up to date with the current news as it has been a mean that replaces a newspaper, hence save cost. In the modern time, firms have used this to expand their networks in order to serve a bigger market or sell their goods worldwide because once the firms have set up an appropriate websites, customers are able to order the products they are looking for. This brings convenience to the customers as majority of the information have already been set up in the website.
As for web authorizations, has been administered as way of specifying access rights to information that can be classified as confidential via computer system to particular users. For example, a department manager, could give an authorized access inside the application domain for customer to access the website such as to Lazada. Main resources can also be individual files, computer programs, or functionalities. The access control levels are categorized into a type of phases which are authorized,and a phase which access request can be approved or not. Access control throughout the years have been using the authentication as a method to identify and verify identities. Normally, an employees from companies are authorized if required to access web employee records, in a control system. During this operations, system could use the access control system to access they are granted a permission to access the systems.
Sometimes, when access can be stay in check under the combination of authentication or access control lists. The disadvantages are often to maintain a certain authorized data which could not be important, and would be perceive as unnecessary to manage authentication credentials. Sometimes the department managers also have to remove authorizations to certain users to protect the data from the outsiders which could steal that information and do unnecessary means such as using the data to steal money from their bank account