What Are the Four Components of a Modern Computer?

Computers are programmable electronic device that perform the information-processing cycle. They are integral to our daily lives and used by millions daily. You will as of now know merely can utilize a computer to type records, send e-mail, play recreations, and browse the Net. You’ll moreover utilize it to alter or make spreadsheets, introductions, and indeed video. A computer could be a programmable gadget that stores, recovers, and forms information. The term ‘computer’ was initially given to people (human computers) who performed numerical calculations utilizing mechanical calculators, such as the math device and run the slide show. The term was afterward given to a mechanical gadget as they started supplanting the human computers. Modern computers are electronic gadgets that acknowledge information (input), prepare that information, deliver yield, and store (capacity) the results.

There are four main components of a modern computer: 1) CPU; 2) main memory; 3) I/O devices; 4) system interconnection.

Central Processing Unit (CPU)

A CPU, in some cases alluded to as a computer’s brain, is the workhorse of the machine. It performs the calculations required by a framework, and can shift in speed. The work that a CPU does produce warm, which is why your computer contains a fan interior. A more effective CPU is vital for strongly computer work like altering high-definition video or programming complex software. The two ordinary components of a CPU incorporate the taking after: the number juggling rationale unit (ALU), which performs number juggling and coherent operations, and the control unit (CU), which extricates enlightening from memory and interprets and executes their registers (portion of the CPU; exceptionally quick; exceptionally restricted capacity).

Main Memory

  1. Random-access memory (RAM) incidentally stores information and enlightening for the CPU volatile-contents eradicated after the computer is closed off permits CPU to get to or store information and enlightening rapidly through RAM’s memory address highlight recognizes and finds put away information comes within the frame of memory modules or memory cards RAM is temporary memory.
  2. Read only memory (ROM) uses to store manufacturer’s operating instructions. It cannot be erased or changed; keeps information even after unplugging the power.

The Input/Output Unit (I/O)

The term I/O is utilized to depict any program, operation or gadget that exchanges information to or from a computer and to or from a fringe gadget. Each exchange is a yield from one gadget and an input into another. Gadgets such as consoles and mouses are input-only gadgets whereas gadgets such as printers are output-only. A writable CD-ROM is both an input and a yield device.

  • Input unit. With the assistance of input unit information from exterior can be provided to the computer. Program or information is examined into fundamental capacity from input gadget or secondary capacity beneath the control of CPU input instruction. Case of input gadgets: Console, Mouse, Difficult disk, Floppy disk, CD-ROM drive etc.
  • Output unit. With the assistance of yield unit computer comes about can be given to the client or it can be put away in capacity gadget forever for future use. Yield information about the fundamental capacity go to yield gadget beneath the control of CPU yield instructions. Illustration of yield gadgets: Printer, Screen, Plotter, Difficult Disk, Floppy Disk etc.

System Interconnection

It is the direct connection of two or more IT systems for the purpose of sharing data and other information resources.

Conclusion

The modern computer is a very important factor in our lives, and we rely on it daily in all areas. The computer components and their functions that are explained in detail are the pillars that make the computer work.

Essay about Computer Shopping

The service which I like to speak about is online shopping services. This service has numerous benefits for shopping lovers. This service provides consumers numerous benefits they can see numerous dress styles in one place and the consumers don’t need to go to numerous malls to get their style dresses they can this online shopping like Flipkart, Snapdeal, and Amazon. These applications would provide discounts and show that dresses which according to consumers’ budget and convenience. This application would help business affiliation to promote its stock products increase consumers’ interest in that product brand and suggest those brand products to other consumers. This application would provide a wide variety of stocks which would be convenient for shopping from anywhere. This application would be budget-friendly to consumers and this shopping site would gain recognition from other models. This application is utilized for comparing models of dresses.

This online shopping could be utilized for shopping anytime we would like and services that application shall be good. This application has the feature of online tracking which could be utilized for knowing delivery. Shipping of that consumer product could be also tracked by utilizing the internet in that application platform. This application would provide numerous discounts for those platform’s customers and this would gain that platform customers’ attention and shop more on that site. For these online platforms, the Google shopping engine would be supportable. This engine would be utilized by numerous business affiliations in this business world. This service engine would be utilized for promoting those platforms’ ads. This search engine would suggest products of that online platform which would increase sales of that online platform. This engine has demand compared with other search engines. This engine would show top shopping Ads which has increased the customer’s trust.

Reply 1:

This online platform for shopping was presented around 2000 when electronic business was presented in this information system. This administration has various advantages for shopping sweethearts. This administration gives purchasers various advantages they can see various dress styles in one spot and the buyers don’t have to go to various shopping centers to get their style dresses they can this internet shopping like Flipkart, Snapdeal, and Amazon to shop. These applications would give limits and show that dresses which as per shoppers’ financial plans and accommodations. This application would help the business associations to advance their stock items and increment purchasers’ advantage in that item mark and recommend those brand items to different customers. This application would give a wide assortment of stocks which would help shop from any place. This application would be a financial plan neighborly to purchasers and this shopping site would pick up recognition from different models. This application is used for looking at models of dresses.

Reply 2:

This Internet shopping could be used for shopping whenever we might want and administrations that application will be acceptable. This application has the element of internet following which could be used for knowing conveyance. Delivery of that buyer item could be additionally followed by using the web in that application stage. This application would give various limits to those stage’s clients and this would pick up that stage clients’ consideration and shop more on that site. For these online stages, the Google shopping motor would be legitimate. This motor would be used by various business affiliations around here world. This administration motor would be used for advancing those stages’ advertisements. This web index would propose results of that online stage which would be expanded deals of that online stage. This motor has request contrast and other web crawlers. This motor would show top shopping Ads which has expanded the client’s trust. 

Research Essay on Computer Science

Abstract:

The number of women pursuing computer science majors in college has dropped almost 20 percent in the last thirty years. Even though many tech industries claim to have found solutions to fix the gender gap problem, this issue has not changed over the years. My contribution essay will analyze the reasons behind the wide gender gap in computer science. I will look at various scholars and their studies on what they think causes the gender gap in tech industries. I will then argue my perspective on how education systems in middle school or elementary school are key reasons why gender inequality in tech industries exists. A lot of scholars tend to focus on the education of women in universities and often tend to overlook education for young children. Studies have shown that girls possess the same mathematical and logical skills boys have. However, girls have been discouraged from pursuing STEM subjects as early as elementary school due to gender stereotypes. Other reasons that I will analyze include the role of social media, the work environments, and treatment of women in tech industries, and the differences in the perception of men and women in viewing tech jobs.

Contribution:

The tech industry has boomed tremendously over the years, yet where are the women? Computer science is not assigned to a specific gender and knowing this information is significant for resolving the gender gap. Over the years, technology has become a part of our everyday lives. Unfortunately, the level of women versus men in technology has declined nationally, as far as women acquiring college degrees and getting tech occupations (Stiffler, Lisa). Identifying the reasons causing the gender bias present in many tech industries is challenging. This is due to the difficulty in “recognizing whether the sexual orientation inclination is because of subliminal perspectives during the enrollment procedure, or from the progressing cycle that sees women getting lower pay and less advancement”, putting women below men (Buser, Thomas). Multiple reasons cause a wide gender gap; however, I believe that the most contributing factor causing gender inequality is largely due to the education of the youth.

Gender Stereotyping in Youth Education:

A key root causing the huge gender gap in tech industries can be traced back to schools. Studies have shown that girls possess the same mathematical and logical skills boys have. However, girls have been discouraged from pursuing STEM subjects as early as elementary school (Friendenberg, Michael). Partially because there are not enough female role models advertised in the computer science industry. “I think for girls, you cannot be what you cannot see,’ Reshma Saujani, CEO and founder of Girls Who Code claims. A study done in 2016 discovered that only twenty-one percent of STEM professors were female. If girls do not see female role models in the tech industry, they will most likely not strive to work in technology. John Locke states that breaking down the stigma in the youth can have positive impacts on decreasing the gender gap in tech industries. According to Figure 1, women have always been the minority in pursuing a computer science degree (Lemons, Mary). Girls learn to associate computer science with men, and therefore, an industry that has no place for females, decreasing their interests.

Gender studies professor Janet Shibley Hyde at the University of Wisconsin believes that another reason why not a lot of girls pursue STEM subjects is due to other interests and not the lack of role models. Young girls have other interests based on their strengths in verbal skills and are given the same opportunity as young boys to pursue their passions. However, if girls possess the same mathematical and logical skills boys have, then would there not be an equal amount of boys and girls pursuing the same career?

This is why I believe that gender stereotyping for children is a huge problem that demonstrates that boys and girls are expected to be different and have different interests. For example, toys for girls are mainly associated with dolls or the color pink, whereas toys for boys are usually cars or construction objects. The difference in toys encourages boys to focus on machinery and engineering at a very young age, giving them an advantage in their careers. By not diversifying the types of toys available for girls and boys, children are taught that certain interests have gender stereotypes, whereas engineering and computer science are associated with boys. This is also applied to other things like clothes or jobs that are marketed for a specific gender despite recent developments to stop the trend.

Impact of Social Media:

This gender inequality is further expressed through social media and the press. Women are not promoted to the same extent men are in the news (Hempel, Jessi). When people found out that I wanted to study computer science in university, they would be surprised and say something along the lines of “Isn’t that for boys?”. This shows how not only is the gender gap known to society, but it has also become “normal” for computer science to be a male career. Often computer scientists are represented as “nerds”, or people who do not go out. They are called terms that young females do not want to be called. Furthermore, the income difference between male and female computer scientists is clear on the internet. As a result, many women do not want to go into computer science because they already know that they will be paid less no matter what. Once an industry has the connotation described above, it is extremely hard to get rid of it. Considering that the tech industry is already very male-dominated, jobs in computer science are already only targeted to men on social media because businesses already assume that women will not apply.

In any technology area, for example, video games, the majority of them advertise only to males. Commercials online only depict young boys using or playing a new video game. When was the last time a video game was created that only targeted girls? Eighty-five percent of characters in video games are male (Bhardwaj, Prachi). If a female character is included, the majority of the time, they are represented in a sexist way. The representation of computer science and technology in social media greatly impacts the way females view the technology field. The depiction of women in video games makes females feel unwelcome in the industry.

Melinda Gates states that universities are graduating fewer women technologists than in previous years, which is not good for society. Many universities claim that they strive to have an equal proportion of men and women in technological majors. Yet, in reality, only 18 percent of women are computer science majors (Bhardwaj, Prachi). This is concerning considering that 37 percent of women were computer science majors in the mid-1980s (Friendenberg, Michael). This raises the question of what happened over the years that caused fewer women to study computer science. However, these statistics hide the fact that the same amount of women earning computer science degrees was about the same in 2003 and 1987. The reason why the numbers do not show this is because the number of men who earned computer science degrees has grown while the percentage of women has remained lower (Hempel, Jessi). A lot of universities have shown significant improvement in accepting more female computer science majors. For example, 48.5 percent of computer science majors at Carnegie Mellon University are female. However, after college, it is extremely tough for these females to find jobs.

Treatment of women:

A study done by Kieren Synder found that women who get a job in the computer science industry right out of college tend to leave the industry seven to ten years later. One of the main contributing factors of women not wanting to come back to their work is due to the technology industries not being hospitable enough to women who become mothers. It is important to consider that when these women leave, they do not leave due to gender discrimination, they leave to find industries with friendlier sectors towards them (Stiffler, Lisa). Women leave the tech industries at more than twice the rate men do. Research has also shown that women are more likely to get interrupted at work meetings than men. Women are also evaluated on their personality in a way that men are not. These all result in women experiencing sexism and the feeling that they do not belong (North, Melissa).

The recruitment of new employees for businesses plays a major role in why more females are not applying for tech jobs when they get out of college. According to a paper by Alison Wynn and Stanford sociology professor Shelley Correll, some of the recruiting sessions taking place in college computer science courses directly discourage women from applying at all. Studies show that barely a quarter of women show up to recruitment sessions (Hempel, Jessi). The researchers discovered that these numbers were understandable due to the unwelcoming environment put forth, the sexist jokes made about women, and making fun of the absence of women engineers. These all contribute to women feeling intimidated or alienated. Companies complain that it is hard to fix a gender gap when they do not have a lot of women applying in the first place. The American Sociology Review study discovered that managers tended to recruit individuals who were culturally similar to themselves (Wynn, Alison ). When applied to the computer science recruitment world, it is understandable that men will recruit other men when trying to expand their business. Changing the way tech industries pitch their businesses at colleges could drastically change the tech field (Bhardwaj, Prachi).

Tech start-ups are supposed to be attractive to both men and women due to their high paying salary, however, studies show that women try to avoid working for a start-up tech company. As many as seventy-five percent of tech start-ups are destined to fail. Lower-income students try to avoid start-ups and work for stable tech companies where they are ensured a paycheck. Start-ups that are led by women are more likely to perform worse than startups led by men according to the Harvard Business Review (North, Melissa). However, this is because all-male venture capital firms tend to financially support start-ups. Therefore, due to the financial instability of startups, women avoid creating or joining tech start-ups.

Gender Differences:

Scott Jaschik believes that the reason for the gender gap present in the computer science industry is purely caused by the choices of women. One of his main arguments is that women are perfectionists. Programming can be very frustrating at times, which can discourage people from working if their code does not work the way they want it to work. He states that “confidence in programming is a huge factor that contributes to the gender gap” (SLU Contributor). Jaschik believes that women contain less confidence than men when coding, which, therefore, is a vital reason why women do not tend to go into computer science fields.

Kieren Synder contains a similar perspective to Scott Jaschik in terms of the levels of confidence in men and women affecting job opportunities. If a woman feels that she does not meet all of the requirements for a job, she will most likely not apply for the job due to the lack of confidence, and the feeling of not feeling qualified enough to take the job. Kieren Synder’s findings found that men with the same qualifications as women are much more likely to take risks in applying for jobs (Lemons, Mary). This demonstrates that men and women do not view or take jobs the same way, which is a significant factor contributing to the gender gap.

In conclusion, multiple contributing factors lead to the gender gap in the computer science industry. Children exposed to gender stereotypes and a lack of education in computer science are the most significant factors. This creates a domino effect of all the other factors discussed. Children are taught at a very young age that boys and girls must have different interests than each other. They grow up with social media which only worsens their idea of what they want to study or do in the future. Having no female computer science role models or having social media not target women in job recreation directly creates a large gender gap. Social media plays a big role in influencing children in today’s society. Not one factor directly is the cause of the gender gap. However, I believe starting to change the education systems and the way technology is portrayed on social media at the beginning of children’s childhoods can tremendously decrease the gender gap over the years. Technology companies need to embrace gender equality by starting by including more women in their workforce and by providing women with equal opportunities and possibilities.

Bibliography:

    1. Bhardwaj, Prachi. “Melinda Gates Says the Early Rise of ‘Male-Focused’ Computer Games Is a Big Reason There Are Fewer Female Computer Science Graduates Today than in the 80s and 90s.” Business Insider, Business Insider, 8 June 2018, www.businessinsider.com/melinda-gates-early-male-focused-pc-games-reason-fewer-women-studying-computer-science-2018-6.
    2. Buser, Thomas, et al. “Sexual Orientation, Competitiveness, and Income.” Journal of Economic Behavior & Organization, vol. 151, 2018, pp. 191–198., doi:10.1016/j.jebo.2018.03.017.
    3. Hempel, Jessi. “Why Are There Few Women in Tech? Watch a Recruiting Session.” Wired, Conde Nast, 20 Nov. 2018, https://www.wired.com/story/why-are-there-few-women-in-tech-watch-a-recruiting-session/.
    4. Friendenberg, Michael. “Women in tech. (From the CEO)(Column).” CIO 25.10 (2012): n/a. Print.
    5. Locke, John. Two Treatises of Government by John Locke. London printed MDCLXXXVIIII reprinted the seventh time by J. Whiston, W. Strahan, J. and F. Rivington, L. Davis, W. Owen [and 18 others in London], 1772.
    6. Lemons, Mary A., and Monica Parzinger. “Gender Schemas: A Cognitive Explanation of Discrimination of Women in Technology.” Journal of Business and Psychology, vol. 22, no. 1, 2007, pp. 91–98. JSTOR, www.jstor.org/stable/25092991.
    7. North, Melissa. ‘Gender Discrimination is Hindering Tech Industry Growth: How to Address the Issue?’ Talent Acquisition Excellence Essentials, 10, 2017. ProQuest, https://search-proquest-com.proxy.library.cmu.edu/docview/2043490198?accountid=9902.
    8. Radford, John. Gender and Choice in Education and Occupation. Routledge, 1998. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=79873&site=ehost-live.
    9. “Silicon Valley: You and Some of Your VCs Have a Gender Problem.” TechCrunch, TechCrunch, 7 Feb. 2010, https://techcrunch.com/2010/02/07/silicon-valley-you’ve-got-a-gender-problem-and-some-of-your-vc’s-still-live-in-the-past/.
    10. SLU Contributor. “The Gender Gap in Computer Science, Explained.” Her Campus, 26 Apr. 2018, 1:00 pm, www.hercampus.com/school/slu/gender-gap-computer-science-explained.
    11. Snyder, Kieran. “Why Women Leave Tech: It’s the Culture, Not Because ‘Math Is Hard’.” Fortune, Fortune, 3 Dec. 2014, fortune.com/2014/10/02/women-leave-tech-culture/.
    12. Stiffler, Lisa. “20 Years in Tech, through the Eyes of 8 Women: How These Computer Scientists Made Their Way in an Industry Dominated by Men.” GeekWire, 24 Mar. 2016, www.geekwire.com/2016/20-years-in-tech-through-the-eyes-of-8-women-computer-scientists/.
    13. Wynn, Alison T., and Shelley J. Correll. “Puncturing the Pipeline: Do Technology Companies Alienate Women in Recruiting Sessions?” Social Studies of Science, vol. 48, no. 1, Feb. 2018, pp. 149–164, doi:10.1177/0306312718756766.

Rhetorical Essay about Computer

The concept of a computer, a technological marvel that has transformed virtually every aspect of modern life, is ripe for a rhetorical analysis. Through a closer examination of its impact, imagery, and language, we can better understand how this ubiquitous tool has become an integral part of our existence.

Introduction and Context

The introduction of the concept of a computer immediately captures our attention due to its omnipresence in contemporary society. This technology has not only changed the way we work but has revolutionized communication, entertainment, and information dissemination. Its mere mention conjures images of sleek devices and digital landscapes that have irrevocably altered our world.

Imagery and Symbolism

When contemplating the computer, we are bombarded with vivid imagery that shapes our perceptions of its capabilities. It stands as a symbol of innovation and progress, conjuring mental pictures of interconnected networks, bustling data centers, and streams of information flowing like digital rivers. The imagery evokes a sense of wonderment, underscoring the transformational power of this invention.

Language and Metaphor

The language used to describe computers is often infused with metaphors that liken them to human minds. Phrases like “artificial intelligence,” “machine learning,” and “neural networks” suggest a level of sophistication that borders on the realm of human cognition. These linguistic choices establish a rhetorical connection between the capabilities of computers and the intricate workings of the human brain.

Appeal to Authority

Given the complexity of computer technology, experts and authorities often play a pivotal role in shaping our understanding. Computer scientists, programmers, and tech pioneers have become the authority figures who guide our perceptions of this intricate system. When these experts discuss the potential of quantum computing, for instance, they tap into a persuasive rhetorical strategy that underscores the limitless boundaries of computer innovation.

Social Impact and Ethos

The computer has ingrained itself in our lives to such an extent that it possesses its own ethos, a reputation forged through its transformative impact on education, commerce, and daily interactions. The conveniences and efficiencies it provides have elevated its status to that of an indispensable tool, fostering a sense of dependency that further solidifies its ethos.

Contrast and Paradox

A rhetorical analysis of the computer concept reveals intriguing contrasts and paradoxes. It is both a symbol of connectivity and a source of isolation. While it facilitates instant global communication, it has the potential to alienate individuals from face-to-face interactions. This dichotomy creates a tension that encourages further contemplation of the computer’s intricate role in our lives.

Visual Rhetoric and Design

The visual rhetoric associated with computers also plays a significant role in shaping our perceptions. Sleek, minimalist designs of modern laptops and smartphones evoke a sense of sophistication and efficiency. The juxtaposition of clean lines and advanced functionality creates an aesthetic allure that appeals to our desire for both form and function.

Impact and Conclusion

The concept of a computer, when subjected to rhetorical analysis, reveals its profound impact on modern society. Its imagery, language, and appeal to authority have combined to create a tool that defines our era. As a symbol of progress, connectivity, and innovation, the computer has transcended its mechanical origins to become an integral part of the human experience.

Final Thoughts

The rhetorical analysis of the concept of a computer sheds light on its multifaceted nature. The interplay of imagery, language, ethos, and paradoxes showcases how this invention has become more than just a machine; it has become a symbol of our time, an emblem of innovation, and a harbinger of a digitally connected future. Through this analysis, we gain a deeper appreciation for the profound role computers play in shaping the way we live, communicate, and understand the world around us.

Essay about Computer Shopping

The service which I like to speak about is online shopping services. This service has numerous benefits for shopping lovers. This service provides consumers numerous benefits they can see numerous dress styles in one place and the consumers don’t need to go to numerous malls to get their style dresses they can this online shopping like Flipkart, Snapdeal, and Amazon. These applications would provide discounts and show that dresses which according to consumers’ budget and convenience. This application would help business affiliation to promote its stock products increase consumers’ interest in that product brand and suggest those brand products to other consumers. This application would provide a wide variety of stocks which would be convenient for shopping from anywhere. This application would be budget-friendly to consumers and this shopping site would gain recognition from other models. This application is utilized for comparing models of dresses.

This online shopping could be utilized for shopping anytime we would like and services that application shall be good. This application has the feature of online tracking which could be utilized for knowing delivery. Shipping of that consumer product could be also tracked by utilizing the internet in that application platform. This application would provide numerous discounts for those platform’s customers and this would gain that platform customers’ attention and shop more on that site. For these online platforms, the Google shopping engine would be supportable. This engine would be utilized by numerous business affiliations in this business world. This service engine would be utilized for promoting those platforms’ ads. This search engine would suggest products of that online platform which would increase sales of that online platform. This engine has demand compared with other search engines. This engine would show top shopping Ads which has increased the customer’s trust.

Reply 1:

This online platform for shopping was presented around 2000 when electronic business was presented in this information system. This administration has various advantages for shopping sweethearts. This administration gives purchasers various advantages they can see various dress styles in one spot and the buyers don’t have to go to various shopping centers to get their style dresses they can this internet shopping like Flipkart, Snapdeal, and Amazon to shop. These applications would give limits and show that dresses which as per shoppers’ financial plans and accommodations. This application would help the business associations to advance their stock items and increment purchasers’ advantage in that item mark and recommend those brand items to different customers. This application would give a wide assortment of stocks which would help shop from any place. This application would be a financial plan neighborly to purchasers and this shopping site would pick up recognition from different models. This application is used for looking at models of dresses.

Reply 2:

This Internet shopping could be used for shopping whenever we might want and administrations that application will be acceptable. This application has the element of internet following which could be used for knowing conveyance. Delivery of that buyer item could be additionally followed by using the web in that application stage. This application would give various limits to those stage’s clients and this would pick up that stage clients’ consideration and shop more on that site. For these online stages, the Google shopping motor would be legitimate. This motor would be used by various business affiliations around here world. This administration motor would be used for advancing those stages’ advertisements. This web index would propose results of that online stage which would be expanded deals of that online stage. This motor has request contrast and other web crawlers. This motor would show top shopping Ads which has expanded the client’s trust. 

Research Essay on Computer Science

Abstract:

The number of women pursuing computer science majors in college has dropped almost 20 percent in the last thirty years. Even though many tech industries claim to have found solutions to fix the gender gap problem, this issue has not changed over the years. My contribution essay will analyze the reasons behind the wide gender gap in computer science. I will look at various scholars and their studies on what they think causes the gender gap in tech industries. I will then argue my perspective on how education systems in middle school or elementary school are key reasons why gender inequality in tech industries exists. A lot of scholars tend to focus on the education of women in universities and often tend to overlook education for young children. Studies have shown that girls possess the same mathematical and logical skills boys have. However, girls have been discouraged from pursuing STEM subjects as early as elementary school due to gender stereotypes. Other reasons that I will analyze include the role of social media, the work environments, and treatment of women in tech industries, and the differences in the perception of men and women in viewing tech jobs.

Contribution:

The tech industry has boomed tremendously over the years, yet where are the women? Computer science is not assigned to a specific gender and knowing this information is significant for resolving the gender gap. Over the years, technology has become a part of our everyday lives. Unfortunately, the level of women versus men in technology has declined nationally, as far as women acquiring college degrees and getting tech occupations (Stiffler, Lisa). Identifying the reasons causing the gender bias present in many tech industries is challenging. This is due to the difficulty in “recognizing whether the sexual orientation inclination is because of subliminal perspectives during the enrollment procedure, or from the progressing cycle that sees women getting lower pay and less advancement”, putting women below men (Buser, Thomas). Multiple reasons cause a wide gender gap; however, I believe that the most contributing factor causing gender inequality is largely due to the education of the youth.

Gender Stereotyping in Youth Education:

A key root causing the huge gender gap in tech industries can be traced back to schools. Studies have shown that girls possess the same mathematical and logical skills boys have. However, girls have been discouraged from pursuing STEM subjects as early as elementary school (Friendenberg, Michael). Partially because there are not enough female role models advertised in the computer science industry. “I think for girls, you cannot be what you cannot see,’ Reshma Saujani, CEO and founder of Girls Who Code claims. A study done in 2016 discovered that only twenty-one percent of STEM professors were female. If girls do not see female role models in the tech industry, they will most likely not strive to work in technology. John Locke states that breaking down the stigma in the youth can have positive impacts on decreasing the gender gap in tech industries. According to Figure 1, women have always been the minority in pursuing a computer science degree (Lemons, Mary). Girls learn to associate computer science with men, and therefore, an industry that has no place for females, decreasing their interests.

Gender studies professor Janet Shibley Hyde at the University of Wisconsin believes that another reason why not a lot of girls pursue STEM subjects is due to other interests and not the lack of role models. Young girls have other interests based on their strengths in verbal skills and are given the same opportunity as young boys to pursue their passions. However, if girls possess the same mathematical and logical skills boys have, then would there not be an equal amount of boys and girls pursuing the same career?

This is why I believe that gender stereotyping for children is a huge problem that demonstrates that boys and girls are expected to be different and have different interests. For example, toys for girls are mainly associated with dolls or the color pink, whereas toys for boys are usually cars or construction objects. The difference in toys encourages boys to focus on machinery and engineering at a very young age, giving them an advantage in their careers. By not diversifying the types of toys available for girls and boys, children are taught that certain interests have gender stereotypes, whereas engineering and computer science are associated with boys. This is also applied to other things like clothes or jobs that are marketed for a specific gender despite recent developments to stop the trend.

Impact of Social Media:

This gender inequality is further expressed through social media and the press. Women are not promoted to the same extent men are in the news (Hempel, Jessi). When people found out that I wanted to study computer science in university, they would be surprised and say something along the lines of “Isn’t that for boys?”. This shows how not only is the gender gap known to society, but it has also become “normal” for computer science to be a male career. Often computer scientists are represented as “nerds”, or people who do not go out. They are called terms that young females do not want to be called. Furthermore, the income difference between male and female computer scientists is clear on the internet. As a result, many women do not want to go into computer science because they already know that they will be paid less no matter what. Once an industry has the connotation described above, it is extremely hard to get rid of it. Considering that the tech industry is already very male-dominated, jobs in computer science are already only targeted to men on social media because businesses already assume that women will not apply.

In any technology area, for example, video games, the majority of them advertise only to males. Commercials online only depict young boys using or playing a new video game. When was the last time a video game was created that only targeted girls? Eighty-five percent of characters in video games are male (Bhardwaj, Prachi). If a female character is included, the majority of the time, they are represented in a sexist way. The representation of computer science and technology in social media greatly impacts the way females view the technology field. The depiction of women in video games makes females feel unwelcome in the industry.

Melinda Gates states that universities are graduating fewer women technologists than in previous years, which is not good for society. Many universities claim that they strive to have an equal proportion of men and women in technological majors. Yet, in reality, only 18 percent of women are computer science majors (Bhardwaj, Prachi). This is concerning considering that 37 percent of women were computer science majors in the mid-1980s (Friendenberg, Michael). This raises the question of what happened over the years that caused fewer women to study computer science. However, these statistics hide the fact that the same amount of women earning computer science degrees was about the same in 2003 and 1987. The reason why the numbers do not show this is because the number of men who earned computer science degrees has grown while the percentage of women has remained lower (Hempel, Jessi). A lot of universities have shown significant improvement in accepting more female computer science majors. For example, 48.5 percent of computer science majors at Carnegie Mellon University are female. However, after college, it is extremely tough for these females to find jobs.

Treatment of women:

A study done by Kieren Synder found that women who get a job in the computer science industry right out of college tend to leave the industry seven to ten years later. One of the main contributing factors of women not wanting to come back to their work is due to the technology industries not being hospitable enough to women who become mothers. It is important to consider that when these women leave, they do not leave due to gender discrimination, they leave to find industries with friendlier sectors towards them (Stiffler, Lisa). Women leave the tech industries at more than twice the rate men do. Research has also shown that women are more likely to get interrupted at work meetings than men. Women are also evaluated on their personality in a way that men are not. These all result in women experiencing sexism and the feeling that they do not belong (North, Melissa).

The recruitment of new employees for businesses plays a major role in why more females are not applying for tech jobs when they get out of college. According to a paper by Alison Wynn and Stanford sociology professor Shelley Correll, some of the recruiting sessions taking place in college computer science courses directly discourage women from applying at all. Studies show that barely a quarter of women show up to recruitment sessions (Hempel, Jessi). The researchers discovered that these numbers were understandable due to the unwelcoming environment put forth, the sexist jokes made about women, and making fun of the absence of women engineers. These all contribute to women feeling intimidated or alienated. Companies complain that it is hard to fix a gender gap when they do not have a lot of women applying in the first place. The American Sociology Review study discovered that managers tended to recruit individuals who were culturally similar to themselves (Wynn, Alison ). When applied to the computer science recruitment world, it is understandable that men will recruit other men when trying to expand their business. Changing the way tech industries pitch their businesses at colleges could drastically change the tech field (Bhardwaj, Prachi).

Tech start-ups are supposed to be attractive to both men and women due to their high paying salary, however, studies show that women try to avoid working for a start-up tech company. As many as seventy-five percent of tech start-ups are destined to fail. Lower-income students try to avoid start-ups and work for stable tech companies where they are ensured a paycheck. Start-ups that are led by women are more likely to perform worse than startups led by men according to the Harvard Business Review (North, Melissa). However, this is because all-male venture capital firms tend to financially support start-ups. Therefore, due to the financial instability of startups, women avoid creating or joining tech start-ups.

Gender Differences:

Scott Jaschik believes that the reason for the gender gap present in the computer science industry is purely caused by the choices of women. One of his main arguments is that women are perfectionists. Programming can be very frustrating at times, which can discourage people from working if their code does not work the way they want it to work. He states that “confidence in programming is a huge factor that contributes to the gender gap” (SLU Contributor). Jaschik believes that women contain less confidence than men when coding, which, therefore, is a vital reason why women do not tend to go into computer science fields.

Kieren Synder contains a similar perspective to Scott Jaschik in terms of the levels of confidence in men and women affecting job opportunities. If a woman feels that she does not meet all of the requirements for a job, she will most likely not apply for the job due to the lack of confidence, and the feeling of not feeling qualified enough to take the job. Kieren Synder’s findings found that men with the same qualifications as women are much more likely to take risks in applying for jobs (Lemons, Mary). This demonstrates that men and women do not view or take jobs the same way, which is a significant factor contributing to the gender gap.

In conclusion, multiple contributing factors lead to the gender gap in the computer science industry. Children exposed to gender stereotypes and a lack of education in computer science are the most significant factors. This creates a domino effect of all the other factors discussed. Children are taught at a very young age that boys and girls must have different interests than each other. They grow up with social media which only worsens their idea of what they want to study or do in the future. Having no female computer science role models or having social media not target women in job recreation directly creates a large gender gap. Social media plays a big role in influencing children in today’s society. Not one factor directly is the cause of the gender gap. However, I believe starting to change the education systems and the way technology is portrayed on social media at the beginning of children’s childhoods can tremendously decrease the gender gap over the years. Technology companies need to embrace gender equality by starting by including more women in their workforce and by providing women with equal opportunities and possibilities.

Bibliography:

    1. Bhardwaj, Prachi. “Melinda Gates Says the Early Rise of ‘Male-Focused’ Computer Games Is a Big Reason There Are Fewer Female Computer Science Graduates Today than in the 80s and 90s.” Business Insider, Business Insider, 8 June 2018, www.businessinsider.com/melinda-gates-early-male-focused-pc-games-reason-fewer-women-studying-computer-science-2018-6.
    2. Buser, Thomas, et al. “Sexual Orientation, Competitiveness, and Income.” Journal of Economic Behavior & Organization, vol. 151, 2018, pp. 191–198., doi:10.1016/j.jebo.2018.03.017.
    3. Hempel, Jessi. “Why Are There Few Women in Tech? Watch a Recruiting Session.” Wired, Conde Nast, 20 Nov. 2018, https://www.wired.com/story/why-are-there-few-women-in-tech-watch-a-recruiting-session/.
    4. Friendenberg, Michael. “Women in tech. (From the CEO)(Column).” CIO 25.10 (2012): n/a. Print.
    5. Locke, John. Two Treatises of Government by John Locke. London printed MDCLXXXVIIII reprinted the seventh time by J. Whiston, W. Strahan, J. and F. Rivington, L. Davis, W. Owen [and 18 others in London], 1772.
    6. Lemons, Mary A., and Monica Parzinger. “Gender Schemas: A Cognitive Explanation of Discrimination of Women in Technology.” Journal of Business and Psychology, vol. 22, no. 1, 2007, pp. 91–98. JSTOR, www.jstor.org/stable/25092991.
    7. North, Melissa. ‘Gender Discrimination is Hindering Tech Industry Growth: How to Address the Issue?’ Talent Acquisition Excellence Essentials, 10, 2017. ProQuest, https://search-proquest-com.proxy.library.cmu.edu/docview/2043490198?accountid=9902.
    8. Radford, John. Gender and Choice in Education and Occupation. Routledge, 1998. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=79873&site=ehost-live.
    9. “Silicon Valley: You and Some of Your VCs Have a Gender Problem.” TechCrunch, TechCrunch, 7 Feb. 2010, https://techcrunch.com/2010/02/07/silicon-valley-you’ve-got-a-gender-problem-and-some-of-your-vc’s-still-live-in-the-past/.
    10. SLU Contributor. “The Gender Gap in Computer Science, Explained.” Her Campus, 26 Apr. 2018, 1:00 pm, www.hercampus.com/school/slu/gender-gap-computer-science-explained.
    11. Snyder, Kieran. “Why Women Leave Tech: It’s the Culture, Not Because ‘Math Is Hard’.” Fortune, Fortune, 3 Dec. 2014, fortune.com/2014/10/02/women-leave-tech-culture/.
    12. Stiffler, Lisa. “20 Years in Tech, through the Eyes of 8 Women: How These Computer Scientists Made Their Way in an Industry Dominated by Men.” GeekWire, 24 Mar. 2016, www.geekwire.com/2016/20-years-in-tech-through-the-eyes-of-8-women-computer-scientists/.
    13. Wynn, Alison T., and Shelley J. Correll. “Puncturing the Pipeline: Do Technology Companies Alienate Women in Recruiting Sessions?” Social Studies of Science, vol. 48, no. 1, Feb. 2018, pp. 149–164, doi:10.1177/0306312718756766.

Essay on Computer Crimes

In the modern era, computers and the networks grew rapidly and at the same time it increased many opportunities for criminal activities, and organizations, law enforcement agencies are struggling to keep up from those attacks. Computer crimes not only include unauthorized user access but also include fraud, identity theft, altering user’s data, holding user information until ransom paid. Several methods of committing computer crimes are distributed denial of service (DDOS) attacks, ransomware attacks, viruses, worms, social engineering, phishing, key loggers. Computer crimes are rapidly growing which affecting many organizations and users as these crimes are frequently conducting in bulk and crimes span to the globe which leads to increased difficulty in finding the attackers.

Unauthorized access, informally called hacking which is a classic example of computer crimes. In so many ways, unauthorized access to a computer or computer system is like trespass which includes gaining access to sensitive information. An attacker can use the unauthorized access to the computer system in order to convert and use as per the attacker needs. A common example of such attacks called a botnet. A botnet is a computer network built on compromised systems that are used for resource-intensive tasks such as sending unwanted advertisement emails to a very large set of individuals at a time.

In recent years, there were many computer crimes conducted by attackers which affected many organizations and individuals by using the vulnerabilities found on the computer operating system. A common example of such an attack is ransomware attacks. A ransomware attack is one of the greatest security risks that most organizations currently face. Over the past few years, these attacks have been growing as it has the potential to cause much bigger damage to organizations which was evidenced in the last few years. The 2017 Ransomware WannaCry attacks and considered it as the biggest ransomware attack ever happen. This attack affected more than 200,000 computers across 180 countries including Britain’s National Health Services (Fruhlinger, 2018). WannaCry attacks mostly targeted Microsoft Windows operating system because of a vulnerability detected in the window’s server message block (SMB) protocol (Kilpatrick, 2019).

WannaCry ransomware first arrived on the malicious computer as a dropper program, a program that installs a malware onto a system drive or any other memory media which then extracts all other application components and then it proceeds to search/lookup for the kill switch to shut the device completely, if the kill switch hasn’t found on the computer, then the malware tried to encrypt all or some of the computer server data (Fruhlinger, 2018). Malware also tried to exploit the SMB vulnerability of windows operating system to spread out to other computer servers over the organization/user’s network rapidly and then displayed a ransom notice that your files have been encrypted and demanded payment through bitcoin. However, Microsoft has released the patch to the vulnerability before the attack, but the affected systems were not updated with the latest security patch and because of the unpatched systems were vulnerable to WannaCry ransomware attack.

In 2017 Equifax data was breached which is one of the largest credit card bureaus in US history, data breach revealed hundreds of millions of personnel user information were stolen including SSN, E-mails, addresses, date of births. Hackers used the vulnerability found on Apache struts, an enterprise open-source framework for creating enterprise Java applications. Attackers sent an HTTP request with malicious code which inserted into content header through the Equifax complaint web portal, in which struts could be tricked into running the code which opened to further intrusion into the system. The attackers were able to move the web portal to other servers because the Equifax system was not segmented, and the attackers were able to find the user information which was stored in plain text. However, Apache has released the patch for the vulnerability, but the Equifax didn’t patch the system on-time which resulted in the biggest data breach. The attacker was also able to pull the user’s information from the network in encrypted form in which Equifax was unable to detect the data transfer for months because Equifax mainly failed to renew their encryption certificate to one of their security tools.

In 2016, FACC an Austrian aerospace parts maker lost around $61 million through the attack that happens through email phishing. A hacker posed as the CEO of FACC and sent an email to an entry-level accounting employee of FACC who transferred the funds to a fake project resulting in a loss of million dollars. Phishing is the kind of situation where it underscores the importance of having strong security guidelines, educating the employees with cybersecurity awareness. The phishing attack has resulted in the company suing the CEO and CTO for not implementing strong security infrastructure, training employees and failed to set up internal controls.

Computer crimes have severe consequences if they are not addressed properly including loss of company user data such as credit cards, SSN, addresses and user information, company reputation and law settlements. In order, to protect the company assets from these computer crimes organizations must enforce strong security guidelines, training employees, frequently running security scans by using Microsoft business security analyzer which can run scans on an individual server or set of servers over the network by providing the IP Address range on the MBSA user interface. MBSA scan results are stored in XML format and can be able to review results set in HTML format, these reports include all the successful and failed tests along with the corrective measures and provide guidance how to resolve the issues. Scan result sets also include severity ratings from low too high in accordance with Microsoft’s recommended security standards. MBSA scans can be run through command-line interface and can be scheduled to run at any time. Running MBSA scans regularly will protect the windows server because it helps us in finding security misconfigurations, suggestions to improve the security standards and most importantly the MSBA scan also verifies whether system was updated or not if not, we need to install the patches on the system. Installing security patches, we can overcome the vulnerabilities found on the OS or the applications so, that we can avoid major computer crimes such as Ransomware. It is also equally important to enforce strong firewall rules to filter out the traffic in and out of network based on the current and future business requirements and need to make sure to review the firewall rules regularly so, no unauthorized users can pass through the firewalls and by strictly limiting open ports to prevent intruders from entering the corporate network.

Use of Computer in Criminal Investigation

Technological advancement in the criminal investigation system.

Technology is present everywhere in life and it became part of our life. Jobs related to criminal justice today involves GPS, advanced camera, robots, etc. all these technologies improve investigation system and made it easier. Some details about technologies are given below.

Database & information exchange

The computer database system is an important technology for criminal investigation systems. There are many database systems that deal with the profiling of criminals. They can also deal with DNA testing, hot-spot analysis, etc. this database can be transferred much faster between states and countries. There are Advanced matching technologies are also available. Also, there are many biometric tools that analyze fingerprints in more detail.

Digital video recording

The cameras that use this technology are in the practice already. These technologies are very practical and affordable. The video captured by this digital camera serves as important proof in the investigation system. These cameras are light weighted and don’t require more space and allow a police officers to carry them with their uniform or their car.

3D imaging of a crime scene

This technology looks like a part of science fiction. These devices take a 3D scan of the crime scene, switching a lot of photos. This way crime scenes can be shown in detail. By this method, crime scenes can be visualized and some missing proof can be found. This technology makes the investigation system easier and fast compared to the old system.

Crime pattern analysis system

The CPAC provides digital maps which display all or specific crimes that occur in a specific area. This system analyzes the data and prepares a colored graphical map to show the density of specific crimes. It also has a feature, using statics it extrapolates the total crime figure for many days and also predicts where crime will occur tomorrow.

Regional crime analysis project

This project was started by the university of Virginia along with their local police department. Recap uses a GIS with machine learning and statistical analysis to examine a corporate database. This system’s effectiveness is still good.

Ottawa police service

The Ottawa police service, Canada began the development of an expert system to investigate crime.

Eight initial functionality goals were set:

  1. Provide support for recording and gathering case data
  2. Generate suspect characteristics from the case
  3. Provide easy access to the investigators
  4. Identify the motive of suspects and cleared the cases
  5. Generate the list of possible suspects
  6. Identify patterns in the area
  7. Generate reports in the appropriate format
  8. Provide a graphic display capability

This system is used by many Canadian police departments and is marketed by a private software company.

Investigation management software

Case management software is a web-based solution to manage investigations. Dashboard reporting and custom report writing ability give you data on case status and crime trends. This software can be used for the investigation of fraud, employee relationships, privacy, security, and health and safety. It maintains complete case histories with instant access to all related information. Ex. i-sight, logikcull, formdocs etc.

Thus many new technologies help crime investigation systems. Some technologies are still under development like drones, robots, etc. these technologies also helps criminal to do crime effectively so investigation systems have to be one step ahead.

References:

  1. https://www.practicepanther.com/blog
  2. Personal interview with Mr. Paul Lee, Information Systems, Devon and Cornwall Constabulary 1600 hours Friday 3rd October 1997.
  3. Brahan, J.W. Valcour, L. Shevel, R. (1993), “The Investigator’s Notebook”, Unknown source, pp 37-46.
  4. Cantor D. V. (1994), Criminal Shadow Harper Collins, London.
  5. CRIS Sales Promotion Literature, Crime report Information System, Department of Technology, Metropolitan Police, London, England, 1997.
  6. https://www.capterra.com/investigation-management-software/