

Browse
Education
Educating a new generation
Global education helps students develop their capacity to be informed, open-minded, responsible people who are responsive to diverse perspectives. Global education prepares us to address the world’s most pressing issues collaboratively, equitably, and sustainably. Global education helps students understand that pressing issues must be faced in an interdisciplinary way, given the complexity of environments and competing needs and interests.
By:
Jayathilini Lakshika Hewapathirana
Wednesday, May 12, 2021
HEALTH AND NUTRITION
+1
Leave a comment
THE CULTURAL CONTEXT OF HOME CARE
Culture affects the day-to-day organization of care. Consider the idea of a partnership between families and nurses sought by home health care agencies. Agencies rightly recognize that optimal self-management of disease and a person’s return to function depends on a reasonable division of labor, shared information, and the willingness of family caregivers to learn rehabilitation and nursing protocols, medication administration, the use of assistive technologies, and the like (Wolff et al., 2009). But a family’s involvement may depend on how they define this partnership and, in particular, whether or not the home health care provider is considered part of the family (Knox and Thobaben, 1997; McGarry, 2009). Similar effects of culture may be evident in the willingness of families to accept telehealth technology, express their degree of burden or need for help, or seek hospice care at the end of life.
By:
rupali
Wednesday, May 12, 2021
CULTURE AND SOCIETY
+2

Leave a comment
HOME CARE AND THE SOCIAL-ECOLOGICAL MODEL
The social-ecological model emerged from ecological systems theory (Bronfenbrenner, 1979), which explicitly sought to examine transactions between persons and their environments. The model stresses cross-level influences, in which community or organizational environments can shape individual behavior (top-down effects), but also examines how individuals form groups or take actions that may affect higher-level organizational or community spheres (bottom-up effects). The Centers for Disease Control and Prevention has incorporated social-ecological models into a number of its health promotion and disease prevention efforts.
The simple onion or Russian doll rendering of social-ecological relations as concentric circles is not in itself very informative. However, flowchart models based on such relationships can be useful for specifying hypothesized cross-level influences.
By:
rupali
Wednesday, May 12, 2021
WATER, ENERGY, AND THE ENVIRONMENT
+1

Leave a comment
Artificial intelligence
Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience. Since the development of the digital computer in the 1940s, it has been demonstrated that computers can be programmed to carry out very complex tasks—as, for example, discovering proofs for mathematical theorems or playing chess—with great proficiency. Still, despite continuing advances in computer processing speed and memory capacity, there are as yet no programs that can match human flexibility over wider domains or in tasks requiring much everyday knowledge
By:
Edwin Castel
Wednesday, May 12, 2021
CULTURE AND SOCIETY
+3

Leave a comment
computer network
A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes. The interconnections between nodes are formed from a broad spectrum of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies.
The nodes of a computer network may include personal computers, servers, networking hardware, or other specialised or general-purpose hosts. Hostnames serve as memorable labels for the nodes, rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication protocols such as the Internet Protocol.
By:
rupali
Wednesday, May 12, 2021
YOUTH EMPOWERMENT
+1
No Preview Available
Leave a comment
The foundations of networking: switches, routers, and wireless access points
Switches, routers, and wireless access points are the essential networking basics. Through them, devices connected to your network can communicate with one another and with other networks, like the Internet. Switches, routers, and wireless access points perform very different functions in a network.
By:
rupali
Wednesday, May 12, 2021
EDUCATION

Leave a comment
symmetric-key encryption
symmetric-key encryption is effective only if the symmetric key is kept secret by the two parties involved. If anyone else discovers the key, it affects both confidentiality and authentication. A person with an unauthorized symmetric key not only can decrypt messages sent with that key, but can encrypt new messages and send them as if they came from one of the two parties who were originally using the key.
By:
Edwin Castel
Wednesday, May 12, 2021
AGRI-FOOD SYSTEMS
+3
Leave a comment
symmetric-key encryption
symmetric-key encryption is effective only if the symmetric key is kept secret by the two parties involved. If anyone else discovers the key, it affects both confidentiality and authentication. A person with an unauthorized symmetric key not only can decrypt messages sent with that key, but can encrypt new messages and send them as if they came from one of the two parties who were originally using the key.
By:
Edwin Castel
Wednesday, May 12, 2021
AGRI-FOOD SYSTEMS
+3

Leave a comment
Encryption and decryption
Encryption and decryption address the problem of eavesdropping, one of the three Internet security issues mentioned at the beginning of this document. But encryption and decryption, by themselves, do not address another problem: tampering.
This section describes how public-key cryptography addresses the problem of tampering.
Tamper detection and related authentication techniques rely on a mathematical function called a one-way hash (also called a message digest). A one-way hash is a number of fixed length with the following characteristics:
The value of the hash is unique for the hashed data. Any change in the data, even deleting or altering a single character, results in a different value.
The content of the hashed data cannot, for all practical purposes, be deduced from the hash-which is why it is called "one-way."
By:
rupali
Wednesday, May 12, 2021
WATER, ENERGY, AND THE ENVIRONMENT
+1
Leave a comment
symmetric-key encryption
With symmetric-key encryption, the encryption key can be calculated from the decryption key and vice versa. With most symmetric algorithms, the same key is used for both encryption and decryption.Implementations of symmetric-key encryption can be highly efficient so that users do not experience any significant time delay as a result of the encryption and decryption. Symmetric-key encryption also provides a degree of authentication, since information encrypted with one symmetric key cannot be decrypted with any other symmetric key. Thus, as long as the symmetric key is kept secret by the two parties using it to encrypt communications, each party can be sure that it is communicating with the other as long as the decrypted messages continue to make sense.
By:
Edwin Castel
Wednesday, May 12, 2021
WATER, ENERGY, AND THE ENVIRONMENT
+1
Leave a comment
How does cloud computing work
You also have to purchase software as well as software licenses and then provide these softwares to your employees as they require. Whenever you hire a new employee, you need to buy more software or make sure your current software license allows another user. It is so stressful that you have to spend lots of money.
But, there may be an alternative for executives like you. So, instead of installing a suite of software for each computer, you just need to load one application. That application will allow the employees to log-in into a Web-based service which hosts all the programs for the user that is required for his/her job. Remote servers owned by another company and that will run everything from e-mail to word processing to complex data analysis programs. It is called cloud computing, and it could change the entire computer industry.
By:
rupali
Wednesday, May 12, 2021
EDUCATION

Leave a comment
Search engine optimisation
Search engine optimization (SEO) is the process of improving the quality and quantity of website traffic to a website or a web page from search engines.
SEO targets unpaid traffic (known as "natural" or "organic" results) rather than direct traffic or paid traffic. Unpaid traffic may originate from different kinds of searches, including image search, video search, academic search, news search, and industry-specific vertical search engines.
By:
Edwin Castel
Wednesday, May 12, 2021
EDUCATION

Leave a comment