Сообщения

Review of the "Arvutimängude areng ja mõju" group work.

  Introduction This review is written for the group work "Arvutimängude areng ja mõju", which was written in a Wiki-article format for the ITSPEA course. After reading this work, I would like to express that work left more positive emotions, but as nothing is ideal, there are some drawbacks that could be improved. Topic selection In my opinion, topic is chosen correctly, since this theme is quite relevant nowadays. With quick growth of personal computers and video games, frequent prejudices have appeared that playing this type of games makes children aggressive and injured, and so on. Topic became even more actual since the global isolation started. For staying safe, plenty of people prefer spending their free time with video games, so that there would be no need to go outside for having more familiar types of entertainment. Therefore, this group work can be useful in educating unexperienced people, letting them find out the history of video games and its influence. Work'

Teema 15 - Eetika ja IT

Analytize ACM’s Code of Ethics The Association for Computing Machinery, or ACM in short, designed a well-documented guideline for ethical conduct which all computing professionals should follow. When violations occur, the code can be used upon a remediation basis. The Code serves as a basis for decision-making when it comes to ethical judgement, it specifies which multiple principles should be taken into account. The professional (enterprise) computing environment as a whole befits from the ethical decision-making process being transparent and accountable to all stakeholders. The Code of Ethics addresses four sections, this analysis will briefly describe section 1; the fundamental ethical principles. The other three sections address more specific situations as well as leadership and compliance, which means they are not relevant for the scope of this blog; which is describing the fundamental principles of ACM’s Code of Ethics. The Code describes seven principles all computing prof

Teema 14 - Andmeturveː tehnoloogia, koolitus ja reeglid

  Mitigations against Trojan horses using the “Mitnick formula”. Within the world of IT, security is a very important aspect. There are several types of threats that compromise your security and cause damage to your company. Within this article, Trojan horses will be analyzed and will be described how to mitigate the three components of the “Mitnick formula” to minimize risk of infection. A Trojan horse is a type of malware. It is hidden in a computer program, and after installation a Trojan horse gives criminals access to your computer unnoticed. It is a kind of backdoor that can be used by malicious people to secretly gain control over your computer and files. This is also where the name Trojan Horse comes from; it is a reference to the Trojan Horse, which was used by the Greeks to open the gates of Troy from the inside for a large-scale invasion. There are several ways in which your computer can become infected with a Trojan horse. For example, this can happen via an attachmen

Teema 13 - Teistmoodi IT

Disabilities in the world of technology. Technology is built around people whom are able to fuction like a normal human, however there are people with certain disabilities such as being blind which means they can’t use a computer. To assist this group of disabled people, several years ago a Braille display was invented. "Braille', as almost everybody knows, is the typeface for Braille readers. Braille readers can read texts by scanning combinations of dots with their fingers. Braille letters can be printed in (thick) paper, but can also be formed by an electronically controlled, mechanical device, a so-called Braille reader. It is certainly not the case that every blind person is able to read Braille "smoothly". An experienced Braille reader achieves reading speeds comparable to, or sometimes even higher than, a sighted person. On the other hand, many blind people only use Braille for short texts. Inscriptions on the various jars in the kitchen, for ex

Teema 12 - Inimese ja arvuti suhtlus, ergonoomika ja kasutatavus

Usability: Big blunders  Often when I’m searching information about certain subjects I’ll come across websites I’ve never used before. However, all necessary information isn’t usually on the same page. Then it’s needed to find the other page, but to my surprise, many of these websites don’t have a search function.  It’s very disappointing when you know exactly what you’re looking for but can’t be bothered to look at how the website’s structure works and how to navigate it. I’d identify myself as a search-dominant user, as Jakob Nielsen defined it. It’s very frustrating when websites aren’t easy to use and common useful features aren’t available.    Usability: Content supporting images & videos  Supporting your text with images and videos.  Pictures/videos are not only important to attract the attention of your visitors, Google also finds pictures very important. Images make your content easier to read and pages that are well viewed and read are automatically considere

Teema 11 - Arendus- ja ärimudelid

Deezer: Business Model Deezer utilizes a freemium-type business model. The app is available for free to download on a big variety of platforms, such as Android, iOS (including MacOS) & Windows (10). However, without paying a monthly subscription, only a limited number of features is available. It uses the same easy to navigate GUI (Graphical User Interface) as the premium subscription for comfortable usage, which makes it appealing to many people. However, in this free version, only a low audio playback quality is available, you can’t download your playlists and after every few songs you play there is an ad, either about how you can benefit from paying the monthly subscription, or from a sponsor. When you pay the subscription, you get access to all features for a reasonable price. This business model is a perfect method to get many people to download your app, as it is free, while also making a ton of money as people will easily get annoyed by all ads which means they

Teema 10 - Võrkude rikkusː vabast tarkvarast vaba kultuurini

  Review on Eric S. Raymondi Hacker-HOWTO.   The poem is nice, it describes the path you should follow to become a hacker perfectly. Learn from the best, practice, and become a professional yourself. To be recognized as a hacker and gain respect, I think it is natural to believe you should always share your precious knowledge and in turn preserve other’s knowledge. To achieve your dreams, you cannot give up. Even if you must perform the same task repeatedly, you continue. It may be boring, but it will pay off in the end. I do believe however, that as much as you can develop your own instinctive hostility towards censorship and so on, you cannot break the law. In my opinion the law should always be respected. Practice and dedication are key for success. Python is a very good choice when it comes to learning your first programming language, however, C# or C++ can be much more powerful. The article is a bit outdated from my point of view, Java may still be commonly used withi