30.06.2015 Views

Assignments How to Write an Essay - Computer Applications in ...

Assignments How to Write an Essay - Computer Applications in ...

Assignments How to Write an Essay - Computer Applications in ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Suggested <strong>Essay</strong> Titles<br />

1. Discuss some of the emerg<strong>in</strong>g developments <strong>in</strong><br />

computer hardware <strong>an</strong>d software <strong>an</strong>d suggest<br />

three bus<strong>in</strong>ess opportunities that these will<br />

create.<br />

2. What is the difference between open <strong>an</strong>d<br />

closed source software? <strong>How</strong> do people make<br />

money from software developed with these<br />

different approaches? Illustrate with two<br />

examples.<br />

3. Discuss some of the problems with software<br />

piracy <strong>an</strong>d how comp<strong>an</strong>ies are attempt<strong>in</strong>g <strong>to</strong><br />

prevent it. <strong>How</strong> c<strong>an</strong> software piracy <strong>in</strong>crease a<br />

comp<strong>an</strong>y’s revenue?<br />

Suggested <strong>Essay</strong> Titles<br />

4. Outl<strong>in</strong>e the adv<strong>an</strong>tages <strong>an</strong>d disadv<strong>an</strong>tages of<br />

two software development practices. Suggest<br />

areas <strong>in</strong> which each is applicable.<br />

5. What are the costs of bad software? Illustrate<br />

with two case studies of poor development<br />

practices.<br />

6. Describe the hardware <strong>an</strong>d software beh<strong>in</strong>d a<br />

major e-commerce site. This c<strong>an</strong>not be<br />

MySpace, so search for your own example.<br />

David Gamez IUA Week 4 Autumn 2007<br />

David Gamez IUA Week 4 Autumn 2007<br />

Suggested <strong>Essay</strong> Titles<br />

7. Outl<strong>in</strong>e all of the steps (hardware, software, doma<strong>in</strong><br />

names, Internet service provider, comp<strong>an</strong>y registration,<br />

etc.) that you need <strong>to</strong> take <strong>to</strong> set up your own rival <strong>to</strong><br />

eBay.<br />

8. Give a detailed <strong>an</strong>alysis of three different ways of<br />

mak<strong>in</strong>g money onl<strong>in</strong>e <strong>an</strong>d do a detailed estimates of the<br />

costs. This should <strong>in</strong>clude startup <strong>an</strong>d ma<strong>in</strong>ten<strong>an</strong>ce<br />

costs for the site, shipp<strong>in</strong>g costs, advertis<strong>in</strong>g, likely<br />

revenue, etc. Typical examples would be a st<strong>an</strong>dard<br />

onl<strong>in</strong>e website sell<strong>in</strong>g goods, such as Pixm<strong>an</strong>ia, a<br />

website offer<strong>in</strong>g free services supported by advertis<strong>in</strong>g,<br />

such as Hotmail, Google, <strong>an</strong>d MySpace, <strong>an</strong>d a website<br />

that charges for a service, such as Paypal.<br />

9. Discuss three examples of Internet censorship <strong>an</strong>d<br />

describe three ways <strong>in</strong> which Internet censorship c<strong>an</strong> be<br />

circumvented.<br />

David Gamez IUA Week 4 Autumn 2007<br />

Suggested <strong>Essay</strong> Titles<br />

10.Expla<strong>in</strong> data warehous<strong>in</strong>g <strong>an</strong>d data m<strong>in</strong><strong>in</strong>g <strong>an</strong>d<br />

give two examples of how these have been<br />

used <strong>to</strong> improve a comp<strong>an</strong>y’s revenue.<br />

11.Discuss the economic cost of cyberattacks <strong>to</strong><br />

bus<strong>in</strong>ess <strong>an</strong>d how this c<strong>an</strong> be reduced.<br />

Illustrate with a couple of case studies.<br />

12.Produce a comprehensive computer security<br />

pl<strong>an</strong> for a small Internet comp<strong>an</strong>y. This should<br />

<strong>in</strong>clude physical security, staff tra<strong>in</strong><strong>in</strong>g, <strong>an</strong>d<br />

security at the hardware <strong>an</strong>d software level.<br />

Estimate some of the costs.<br />

David Gamez IUA Week 4 Autumn 2007<br />

Suggested <strong>Essay</strong> Titles<br />

13.<strong>How</strong> do data privacy issues affect comp<strong>an</strong>ies?<br />

Discuss some of the laws that apply <strong>to</strong> this<br />

area <strong>an</strong>d illustrate with a couple of cases.<br />

14.Discuss the adv<strong>an</strong>tages <strong>an</strong>d disadv<strong>an</strong>tages of<br />

Ajax technology. Suggest two services or<br />

applications that Ajax could be used for <strong>an</strong>d<br />

how these could make money.<br />

15.<strong>How</strong> is artificial <strong>in</strong>telligence applied <strong>in</strong><br />

bus<strong>in</strong>ess? Give three examples.<br />

16.What are the current markets for robots?<br />

Discuss three new bus<strong>in</strong>ess opportunities that<br />

are emerg<strong>in</strong>g <strong>in</strong> this area.<br />

• ?<br />

Questions<br />

David Gamez IUA Week 4 Autumn 2007<br />

David Gamez IUA Week 4 Autumn 2007<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!