Saturday, December 28, 2019

Video Game Violence Essay - 1280 Words

Video Game Violence Concerns about the effect of media violence on children extends back at least to the beginning of the mass media, with the issue raised with reference to films, radio, television, comic books, and so on. As technology brings new types of media to the fore, the issue shifts to depictions of violence in these new media. Both popular sources and scholarly address this issue, asking in effect how violent video games change children’s behavior and make them more violent, assuming that it is believed that this is the case. The first issue is clearly whether or not violent video games have a detrimental effect at all. This issue has†¦show more content†¦1, 3). Of course, not all such games are violent, though Gale says 80 percent have violent content and then writes, The American Psychological Association, the American Academy of Pediatrics and the American Medical Association have all concluded that there is a relationship between television violence and aggression among children (Gale, 2003, para. 9). As Provenzo (1992) shows, concerns about this are not new, though the spread of such games has increased greatly over the past decade. As Provenzo notes, one of the greatest appeals of the video game is also one of the major reasons for concern: Part of the appeal of video games might lie in giving children a means to activate the passive medium of television. In video games, children can enter into the character of movie and television heroes and take action as that character. The idea that video games are a means by which children can activate television is of crucial importance (Provenzo, 1992, para. 3). Children acting out violent actions as television heroes may transfer this behavior to other situations. Television heroes have an influence on the behavior of children in any case, and when the child puts him or herself in the role of that hero, the lesson learned can be evenShow MoreRelatedVideo Game Violence : Video Games892 Words   |  4 PagesVideo Game Violence On December 14, 2012, a twenty year old boy named Adam Lanza shot twenty children and six staff at Sandy Hook Elementary School in Newtown, Connecticut. Before arriving to the school, he shot his mother then committed suicide after the shooting. The reports say that he was influenced to shooting others by the video game â€Å"Call of Duty†. Video game violence is defined as a behavior including physical violence intended to hurt, damage, or kill someone or something impacted by videoRead MoreVideo Game Violence : Violent Video Games1626 Words   |  7 PagesDavis English III 27 March 2015 Video Game Violence Violent video games have been being created since the first console. Yet only recently have we been blaming them for aggression in the player. We as humans have a tendency to blame our violent behavior on other things rather thin ourselves. Now aggression is being defined in many ways in this situation but mainly people point to the anger that’s brought out in the real world after the game or maybe it’s the gamers’ tendency to haveRead MoreVideo Games : Video Game Violence Essay1693 Words   |  7 PagesVideo Game Violence Blood and gore, intense violence, strong sexual content, use of drugs. These are just a few of the phrases that the Entertainment Software Rating Board (ESRB) uses to describe the content of several games. The future of entertainment revolves around technology. Along with the evolvement of technology, video games are also changing. More ways of playing violent video games are created each year, but most of us have this question in mind; do violent video games influence peopleRead MoreVideo Games : Video Game Violence1502 Words   |  7 Pages2013 Video Game Violence The evolution of video games has taken a drastic change since the 1970’s when video games were first introduced. Since then every decade video games have become more violent in nature with strong language and realistic to suit society today. Craig Anderson states that with more violence in video games they would sell better than games with less violence (Anderson, Gentile, and Beckley pg.5). Violent video games really became popular when the first person shooter games wereRead MoreVideo Games and Violence1011 Words   |  4 Pagesare probably millions and billions of video games sold every year to people. Some people seem to believe that violence correlates directly with video games. Video games are something that is usually a big interest in people at the ages of 13 to 19 years old. Video games usually start off as a little fun and then turn into a major hobby for some people. Emotions change based on whatever happens while a person is engaging in these games most of the ti me. These games are another way to observe how peopleRead MoreVideo Games : Violence And Violence1301 Words   |  6 PagesThe issue of violence in these media products has been a highly-debated issue for the past few decades. Recently it has become extremely popular in the subject of violence in video games. It is rumored that games such as â€Å"Call of Duty, Mortal Kombat, Battlefield, Halo and many more have been the culprit behind a recent spike in childhood aggression. Many people have their own views on the subject, but it has been most commonly deduced that aggression is caused by the games, but violence does not alwaysRead MoreVideo Games Violence664 Words   |  3 PagesUNV - 104 August 11, 2013 Video Games and Violence Video games and violence have different effects on children according to the type of video games that is being watched It is important to understand the world of video games. All video games do not prevent violence in children. Parents should take into consideration in monitoring their child while choosing video games. Depending on the video game that is chosen, does not mean the child will result in violent behavior later on in lifeRead MoreThe Violence Of Video Games971 Words   |  4 PagesMost kids today play video games to entertain themselves and it’s their hobby. Today kids and even young adults play games like Grand Theft Auto V (GTA V), Call of Duty, and Fallout 4. All three of these games were one of the top games of their respective year of release. What do they all have in common? They depict violence in a way that its becoming more realistic every year they’re sequels are released. But what’s up with people blaming video games for mass shootings and other heinousRead MoreVideo Games and Violence942 Words   |  4 Pages Video Games and Violence Awe entering in more advanced society of technology, video games has become a popular source of entertainment among us. Almost all of us has rented or owned a video game and we have spent hours playing it. As we all know, video games have become the second most popular form of entertainment after television; the source of entertainment is proven to be violent. Excessive playing of video games has a huge impact on our life as well asRead MoreVideo Games and Violence1981 Words   |  8 Pagesconcerned about violent video games due to the increased reality in the games. However, society may not realize how children and teens are affected by these games. In modern times, children and young adults are affected by violent games in a negative way by causing changes in their behavior. The average American child watches 28 hours of television a week and by the age of eighteen will have seen 16,000 murders and 200,000 violent acts (Gallagher). People who defend violent games like to point ou t that

Thursday, December 19, 2019

Should Marijuana Be Legalized - 1579 Words

Legalize Marijuana Marijuana consumption has become a very prominent sub-culture within the United States with users including virtually everyone from teenagers to the elderly people. Some individuals use it because they enjoy the feeling they get from smoking or eating it, whereas others use it for medical reasons. Marijuana is starting to become decriminalized in most states, with Colorado and Washington having already made it legal for recreational use. Moreover, a handful of states throughout the country have already implemented a medical marijuana policy into their state healthcare system. Having potential to provide so many social, economic and medicinal benefits throughout the many facets of society, the federal government should†¦show more content†¦Colorado is setting the precedent for how to legalize marijuana and is doing so in an extremely efficient way. Governor John W. Hickenlooper, speaker of â€Å"Experimenting with Pot: The State of Colorado’s Legalization of Marijua na†, says â€Å"Colorado is taking the proactive approach. We are working as a convener for all interested parties and experts to shape public policy that utilize the decades of public health gained from regulating alcohol and tobacco. We have applied these lessons to marijuana and our making every effort in our laws, regulations, and revenue allocations to address public health and safety concerns, prevent young people’s use of marijuana, and educate parents and children about the risks of its use.† Colorado is setting a prime example for the federal government, should they choose to legalize marijuana. If the federal government were to treat weed the same way they treat tobacco and alcohol, it would prove to be extremely beneficial. On top of taxing the substance, marijuana education programs could be implemented into schools to help teach kids how they should interact with marijuana, similar to the alcohol education programs already in place. If marijuana were to be legalized, the economic outcome would be highly favorable. The tax revenues generated from dispensary sales could help the United States toShow MoreRelatedShould Marijuana Be Legalized?849 Words   |  4 Pageswhether marijuana should be legalized. Around 23 states have legalized marijuana for medical and recreational use. In the state of Illinois, medicinal use of marijuana has been passed on April 17, 2013. Since January 2014, patients are able to obtain marijuana with a doctor s recommendation. The new debate is whether marijuana should be legalized for the general public as a recreational drug. Although some believe that marijuana is harmless, and that it has beneficial medicinal uses, marijuana shouldRead MoreShould Marijuana Be Legalized?1715 Words   |  7 PagesMarijuana in Society Cannabis, formally known as marijuana is a drug obtained from the tops, stems and leaves of the hemp plant cannabis. The drug is one of the most commonly used drugs in the world. Only substances like caffeine, nicotine and alcohol are used more (â€Å"Marijuana† 1). In the U. S. where some use it to feel â€Å"high† or get an escape from reality. The drug is referred to in many ways; weed, grass, pot, and or reefer are some common names used to describe the drug (â€Å"Marijuana† 1). Like mostRead MoreShould Marijuana Be Legalized?1489 Words   |  6 Pagescannabis plant or marijuana is intended for use of a psychoactive drug or medicine. It is used for recreational or medical uses. In some religions, marijuana is predominantly used for spiritual purposes. Cannabis is indigenous to central and south Asia. Cannabis has been scientifically proven that you can not die from smoking marijuana. Marijuana should be legalized to help people with medical benefits, econo mic benefits, and criminal benefits. In eight states, marijuana was legalized for recreationalRead MoreShould Marijuana Be Legalized?1245 Words   |  5 PagesMarijuana is a highly debatable topic that is rapidly gaining attention in society today.   Legalizing marijuana can benefit the economy of this nation through the creation of jobs, increased tax revenue, and a decrease in taxpayer money spent on law enforcement.   Ã‚  Many people would outlaw alcohol, cigarettes, fast food, gambling, and tanning beds because of the harmful effects they have on members of a society, but this is the United States of America; the land of the free and we should give peopleRead MoreShould Marijuana Be Legalized?1010 Words   |  5 PagesThe legalization of marijuana became a heated political subject in the last few years. Twenty-one states in America have legalized medical marijuana. Colorado and Washington are the only states where marijuana can be purchased recreationally. Marijuana is the high THC level part of the cannabis plant, which gives users the â€Å"high† feeling. There is ample evidence that supports the argument that marijuana is beneficial. The government should legalize marijuana recreationally for three main reasonsRead MoreShould Marijuana Be Legalized?1231 Words   |  5 Pagesshows the positive benefits of marijuana, it remains illegal under federal law. In recent years, numerous states have defied federal law and legalized marijuana for both recreational and medicinal use. Arizona has legalized marijuana for medical use, but it still remains illegal to use recreationally. This is absurd, as the evidence gathered over the last few decades strongly supports the notion that it is safer than alcohol, a widely available substance. Marijuana being listed as a Schedule I drugRead MoreShould Marijuana Be Legalized?1350 Words   |  6 Pagespolitics in the past decade would have to be the legalization of marijuana. The sale and production of marijuana have been legalized for medicinal uses in over twenty states and has been legalized for recreational uses in seven states. Despite the ongoing support for marijuana, it has yet to be fully legalized in the federal level due to cultural bias against â€Å"pot† smoking and the focus over its negative effects. However, legalizing marijuana has been proven to decrease the rate of incrimination in AmericaRead MoreShould Marijuana Be Legalized? Essay1457 Words   |  6 PagesSHOULD MARIJUANA BE LEGALIZED? Marijuana is a drug that has sparked much controversy over the past decade as to whether or not it should be legalized. People once thought of marijuana as a bad, mind-altering drug which changes a person’s personality which can lead to crime and violence through selling and buying it. In the past, the majority of citizens believed that marijuana is a harmful drug that should be kept off the market and out of the hands of the public. However, a recent study conductedRead MoreShould Marijuana Be Legalized?1145 Words   |  5 PagesLegalizing Marijuana Marijuana is a drug that has been actively used for centuries. This drug can be traced back to 2737 BC by the Chinese emperor Shen Nung. He spoke about the euphoric effects of Cannabis and even referred to it as the â€Å"Liberator of Sin.† Since early on, marijuana was seen as a medicinal plant that was recommended for medical uses. Marijuana is currently in schedule I, which means that physicians are not allowed to prescribe it in the United States (Hart, Ksir 2013). This drugRead MoreShould Marijuana Be Legalized?1596 Words   |  7 Pages But what needs to be known before a user can safely and completely make the decision if trying Marijuana is a good idea? Many do not want the drug to be legalized because they claim that Cannabis is a â€Å"gateway drug†, meaning it will cause people to try harder drugs once their body builds up a resistance to Marijuana, because a stronger drug will be needed to reach a high state. This argument is often falsely related to the m edical side of the debate over legalization. It is claimed that this would

Wednesday, December 11, 2019

Emerging Technologies of Hacktivism Samples †MyAssignmenthelp.com

Question: Discuss about the Emerging Technologies of Hacktivism. Answer: Introduction Hacktivism refers to the way of hacking or the breaking of someone into the system of someone for the purpose of motivating the peoples in the field of political and social aspects. The persons who performs the act of hacktivism is known as hacktivist. A hacktivist uses the same methods used by a hacker to break into the system but the breaking is done so as to disrupt the system and bring the attention of the users towards some political or social cause (Bodford and Kwan 2017). One example of hacktivism is leaving a message that is highly visible on the homepage of various website that gets a lot of traffic or the websites that are embodying a point of view and is being opposed. Another example is the launching of the Denial-of-Service attack so as to disrupt the traffic in a certain cite. The debate always rises if the act of a hacktivist is a crime or not. Person who opposes the hacktivism says that hacktivism causes a disruption and damage in the forums that has an ample opportun ity of free speech. Along with this the peoples who are in favour of hacktivism says that this process is almost similar to a protest which results in making it a protected and free form of speech (PytlikZillig et al 2015). Discussion The main goal of hacktivism is to highlight the issues and the causes that are responsible for the changes in a social world (Micali 2016). Hacktivism can also be considered as an activism due to the fact that the achievement of goals by this process is done in a peaceful manner. Hacktivism is also included in the components of hacking. People in favour of hacktivism justifies hacktivism as the new form of protest, political activism or civil disobedience. As all this thing are justified then hacktivism is also justified. They also say that hacktivism is done for a good reason like confrontation of the corrupted government, they also targeted the sites for child pornography and many more (Aviles 2015). According to them all the informations should be free and accessible to everyone. The primary agenda for them is the free flow of the informations. Production of social benefit is done by the exposure of the flaws of the internet securities and encouraging the society to protest agains t the data. And according to the peoples against the hacktivism says that everyone has their fundamental rights towards their privacy and hacktivist violets all this rights (Solomon 2017). Along with this people also have rights to property and hacktivist also violets this right. They also refer the hacktivists as vigilantes who are working outside the law. And one of the important thing is hacktivists are always anonymous and there is no accountability for all this action making them enjoy the legal impunity and are not able bought to justice in spite of doing harm to innocent peoples (Milan 2015). They also say that hacktivists are responsible for the jeopardizing of the national security. LulzSec make an attack on the internet website named www.porn.com in the year of 2011 and published almost around 26000 email addresses and their passwords in an attempt to confront and embarrass the users. The confrontation included to officials from the Malaysian government and three US military members. By this process an unexpected amount of response from Facebook as they prevented the users having the same email address to access the Facebook accounts. LulzSec also attacked InfraGrade which is a partnership business with Federal Bureau of Investigation of US. In this attack the InfraGrade was defaced thereby damaging the Senate with release of some of the secure data which also made the site of CIA go down for almost two hours. Another attack it attempted was on the UK National Health Service but in this case it was for the public interest as it sends an email to the NHS informing them to increase the security of their site by pointing out the vulnerabilities it found in it. Hacktivism is a nonviolent use of the illegal or legal ambiguous digital tools which pursuits the political ends. This may include blocking or defacing of the websites so as to promote the political freedom of individuals (Deseriis 2016). Most of resources that are used by the hacktivist are online making anything and anyone become the target. Despite of the main goal of a hacktivist their activities also causes less distraction and irritation along with many activities that causes disruption, loss of reputation and many more. Activities of the hacktivist can be seen as good as well as bad and it depends on what side it lands. Many instances are there when people confuse it with cyberterrorism (Follis and Fish 2017) The only similarity between them is that they are both carried out online. Cyberterrorism aims at harming peoples whereas hacktivism aims at raising awareness about a certain issue. Most of the hacktivist are considered illegal when viewed from the statutes of domestic an d international. Many of the damages are incurred whereas many were carried through to prosecution. Tracking down of the people who are responsible for hacktivism are difficult due to the hacktivisms global nature and the anonymous face of most of the people that are involved in the act of hacktivism (Applegate 2015). Many people argue that hacktivism is an activity that is falling underneath the banner of the free speech and are protected accordingly whereas other consider it to be a fallout of those efforts that goes against those free speeches that can harm both the corporations as well as the individuals. There are various precautions that need to be taken which can help in preventing hacktivism and this includes the use of virus protections and programs for the detection of the virus. Along with this monitoring of the public facing accounts present on the internet should be done and this mainly includes the email, website, social media and many more. It should also be made sure that all the personally identifying informations are not available online. Updating of the systems and the defence programs should be done on a regular basis so as to protect the system from potential threats. Hacktivism and activism are commonly related however hacktivism is different as it is done mostly in a digital form. Hacktivist are not after any financial gain but are doing their activites so as to make a statement (Fish and Follis 2015). The primary reason that lies behind the hacking of a hacktivist is that they want to highlight a cause. Instead of following the civil disobedience they want to use the internet for digital disruption and a crucial tool for carrying out any type of message all around the world. Hacktivist makes use of resources that are legal as well as illegal in pursuit of the messages that re important for them and this are mostly cantered around the political and human right issues. Informations are gathered underneath the banner of causes from a single place without any travelling (Tanczer and Tanczer 2015). This empowers both the group as well as the individuals in any type of actions and efforts for the digital disruption. With the involvement of low cost i n accessing the internet hacktivists make use of the tools that are free and easy to learn for the purpose of carrying out the operations. All the operations are online and due to this the involvement of the peoples physically is also low along with involving of people legally due to the reason that most of the hacktivism (Anderson 2015) campaigns are not pursued by any type of law enforcement agencies unless and until they cause any physical or financial harms. There are various types of hacktivism and with the evolution of the internet in the field of technology the hacktivists are provided with more and more resources. Some of the tactics that are used by the hacktivists are doxing which is the short form of document and refers to the process of finding sharing and publishing of the personally identified informations of the people (Thackray et al. 2017) that are found on the web or website or forum or any type of other venues accessed by the public and this mainly includes full legal names addresses and many more personal data, DDoS or the denial of distributed service which is a more common type of hacktivism which is simple due to its effectiveness, data breaches this is familiar to the idea of identity theft and finally the vandalizing or hijacking of online properties and this one of the popular hacktivism activity, cracking of the code into the back end of a targeted website with the intended effect which aims at disrupting the websi tes message in some way. Hacktivists are able to make use of the data available on the social media (Richterich et al 2017). In the year of 2015 Anonymous posted a video which declared a war on the ISIS. Anonymous was able to identify various accounts associated with twitter so as to stop the distribution of propagandas that are associated with the ISIS. Anonymous is the most prolific hacktivist group which is well known for a number of hacks that it has made over the last few years. This group started to operate in the year of 2003 but was not prominent until the year of 2008. It became prominent after the its attack on the Church of Scientology in a massive DoS attack. For the purpose of carrying out their operations what the hacktivist do is they create new tools on regular basis or integrate the softwares that are available in the internet. Softwares or the websites are used so as to achieve the political purposes. Website mirroring is the technique used for circumventing the tools for bypassing the censorship blocks present on the websites (Cammaerts 2013). This is the technique which involves the coping of the contents of a censored website and then posting it on the various domains and the subdomains which are not censored. Geo-bombing is which the geo-tags are added by the netizens during the editing process of the YouTube videos so as to display the videos on the google earth. Anonymous blogging refers to the process of speaking out dedicating the wide audience about the issues that are related to the human rights and many more by utilizing the tools present in the web that are free. IP masking and blogging software is used for the purpose o f preserving the anonymity that is of high level (Wazid et al. 2013). RECAP is the free software made by the liberate US case law making it take the form of the distributed document collection and archival. Conclusion Along with the evolution of hacktivism it is also creating a striking opportunity for various groups for a good cause. Hacktivists must abandon attacks like the DDoS and which mainly focuses on the online demonstrations like the SOPA blackout. Hacktivists mainly aims at the serving for the good cause of the public by stealing of the personal data about the public and the threatening corporations associated with data loss of the specific data that does the opposite thing. DDoS is becoming more and more popular due to the fact that they are extremely insignificant in the running of the websites. Two different paths can be taken by hacktivists and this includes Militant and activist. A militant in an internet will take no prisoners and along with that they will destroy the networks and the systems of the enemies. An activist is a person who will raise millions of support against the enemies. Hacktivists cannot be taken seriously unless and until the values and the goals of them are made clear to the public instead of that they will just make splashes in the ocean of the web. A digital weapon has been added by the hacktivist in the digital arsenal of the common world. Without hacktivism people will use the conventional methods of protesting that is by rallies and marches which is often proved as ruthless in many cases. References: Anderson, T.G., 2015.Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies. ARMY COMMAND AND GENERAL STAFF COLLEGE FORT LEAVENWORTH KS. Applegate, S., 2015. Cyber Conflict: Disruption and Exploitation in the Digital Age. InCurrent and Emerging Trends in Cyber Operations(pp. 19-36). Palgrave Macmillan UK. Aviles, G., 2015.How US political and socio-economic trends promotes hacktivist activity(Doctoral dissertation, Utica College). Bodford, J.E. and Kwan, V.S., 2017. A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and Payoffs?.Cyberpsychology, Behavior, and Social Networking. Cammaerts, B., 2013. Networked Resistance: the case of WikiLeaks.Journal of Computer?Mediated Communication,18(4), pp.420-436. Deseriis, M., 2016. Hacktivism: On the Use of Botnets in Cyberattacks.Theory, Culture Society, p.0263276416667198. Fish, A. and Follis, L., 2015. Edgework, state power, and hacktivists.HAU: Journal of Ethnographic Theory,5(2), pp.383-390. Follis, L. and Fish, A.R., 2017. Half-Lives of Hackers and the Shelf Life of Hacks.Limn, (8). Micali, A., 2016.Hacktivism and the heterogeneity of resistance in digital cultures(Doctoral dissertation, University of Lincoln). Milan, S., 2015. Hacktivism as a radical media practice. PytlikZillig, L.M., Wang, S., Soh, L.K., Tomkins, A.J., Samal, A., Bernadt, T.K. and Hayes, M.J., 2015. Exploring Reactions to Hacktivism Among STEM College Students: A Preliminary Model of Hacktivism Support and Resistance.Social Science Computer Review,33(4), pp.479-497. Richterich, A., Wenz, K., Abend, P., Fuchs, M., Reichert, R., Bakardjieva, M., Beaton, B., Berry, D., Burgess, J., Cot, M. and Cremin, C., 2017. Making and Hacking. Solomon, R., 2017. Electronic protests: Hacktivism as a form of protest in Uganda.Computer Law Security Review. Tanczer, L.M. and Tanczer, L., 2015. Hacking the Label: Hacktivism, Race, and Gender.Ada: A Journal of Gender, New Media, and Technology, (6). Thackray, H., Richardson, C., Dogan, H., Taylor, J. and McAlaney, J., 2017. Surveying the Hackers: The Challenges of Data Collection from a Secluded Community. Wazid, M., Katal, A., Goudar, R.H. and Rao, S., 2013, April. Hacktivism trends, digital forensic tools and challenges: A survey. InInformation Communication Technologies (ICT), 2013 IEEE Conference on(pp. 138-144). IEEE.

Wednesday, December 4, 2019

Thesis Documentation for Digital Arts Essay Example For Students

Thesis Documentation for Digital Arts Essay Example: ITS-C: An Interactive Intelligent Tutoring System tort C Programming Abstract/Executive Summary From ISO to 200 words of short, direct and complete sentences, the abstract should be informative enough to serve as a substitute for reading the thesis itself It states the rationale and the objectives of the project, Do not put citations or quotes in this section. Avoid beginning the abstract with This paper/ The abstract should include at least five keywords that are relevant to the thesis project. For example: Keywords: agent, multimedia systems, communication, multi-agent systems, educational game For possible keywords and/or classification recommended by the Association of Computing Machinery (ACM) and Institute of Electrical and Electronics Engineers (IEEE), please see the following sites, respectively: http://WA. ACM. Org/class/; http://code_scuds. Du/keywords; http://code. scuds. Du/IEEE_keywords Observe the following format: I. Research Description 1. Overview of the Current State of Technology 2. Research 1. General Objective. Specific Objectives ? Note that the page number notation is as follows: Thus the first page tot Chapter 2 is 2-1, while the first page of Appendix A is A-I We will write a custom essay on Thesis Documentation for Digital Arts specifically for you for only $16.38 $13.9/page Order now List of Figures, List of Tables THESIS PROPOSAL DOCUMENT (ADAPTOR) 1. INTRODUCTION 1. Overview of the Current State of Technology / Project Context This section gives the reader an overview of the specific technology or field in the international or local setting. The information regarding the technology or field should be contemporary and not based on outdated sources, Discussion must not be too technical or too detailed. This section lays out the context for the proposed thesis project. This section ends with a discussion on the problems or issues faced by or that still exist in the specific technology or field (e. , limitations of existing software or algorithms, lack of interactivity in multimedia presentations). The problem statement would lead to the research objectives. I _ 2. Research Objectives I -2. 1 General Objective This section States the overall goal that must be achieved. 1. 2. 2 specific Objectives This subsection is an elaboration of the general objective. It states the specific steps that must be undertaken to accomplish the general objective. These objectives must be specific, measurable, attainable, realistic, and time-bounded. Each specific objective may start with to design/develop/survey/review/ analyze Studying a particular programming language or development tool (e. G. , to study Windows/Object-Oriented/Graphics/C++ programming) to accomplish the general objective is inherent in all theses and, therefore, must not be included here. 1. 3 Scope and Limitations of the project This section discusses the boundaries (with respect to the objectives) of the project and the constraints within which the project will be developed. 1. 4 Significance of the Project This section explains why such a project is necessary. It rationalizes the objective Of the research With that Of the stated problem or issue. Avoid including here sentences such as This research will be beneficial to the proponents/ department/college as this is already an inherent requirement of all DAD thesis projects. 2. REVIEW OF RELATED LITERATURE}SYSTEMS This chapter discusses the treasures, capabilities, and limitations of existing algorithms, systems, or software that are relevant and related/similar to the thesis. The reviewed work and system must be arranged either in chronological order, or by area (from general to specific). Observe a consistent format when presenting each of the reviewed works. In this section, the maximum number of pages is 20. At the end of this section, a table of summary should be included discussing the different systems discussed so far. 3. METHODOLOGY This chapter lists and discusses the specific steps and activities that will be performed by the proponents to finish the project. The discussion covers the activities from the proposal to the final thesis Stage. Examples Of activities include inquiry, survey, research, brainstorming canvassing, consultation, review, interviews, observe, experiment, design, test, document, etc. .u3c3999ef7c81a3626a21b2a425976f2d , .u3c3999ef7c81a3626a21b2a425976f2d .postImageUrl , .u3c3999ef7c81a3626a21b2a425976f2d .centered-text-area { min-height: 80px; position: relative; } .u3c3999ef7c81a3626a21b2a425976f2d , .u3c3999ef7c81a3626a21b2a425976f2d:hover , .u3c3999ef7c81a3626a21b2a425976f2d:visited , .u3c3999ef7c81a3626a21b2a425976f2d:active { border:0!important; } .u3c3999ef7c81a3626a21b2a425976f2d .clearfix:after { content: ""; display: table; clear: both; } .u3c3999ef7c81a3626a21b2a425976f2d { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u3c3999ef7c81a3626a21b2a425976f2d:active , .u3c3999ef7c81a3626a21b2a425976f2d:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u3c3999ef7c81a3626a21b2a425976f2d .centered-text-area { width: 100%; position: relative ; } .u3c3999ef7c81a3626a21b2a425976f2d .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u3c3999ef7c81a3626a21b2a425976f2d .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u3c3999ef7c81a3626a21b2a425976f2d .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u3c3999ef7c81a3626a21b2a425976f2d:hover .ctaButton { background-color: #34495E!important; } .u3c3999ef7c81a3626a21b2a425976f2d .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u3c3999ef7c81a3626a21b2a425976f2d .u3c3999ef7c81a3626a21b2a425976f2d-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u3c3999ef7c81a3626a21b2a425976f2d:after { content: ""; display: block; clear: both; } READ: Manifest Destiny EssayThe methodology also includes the following information: What will be done How it will be done When and how long will the activity be done Where Will it he done Why should be activity be done 4. CALENDAR OF ACTIVITIES This section contains the Giant chart showing schedule of the activities outlined in the previous section (Research Methodology), The following table is an example of a Giant chart: ACTIVITY I Data Gathering I Software Requirements Analysis JAN I FEB. MAR PAIR In. I Initial Architectural Design BIBLIOGRAPHY Appendix A.