Disability and Information Technology Education

Introduction

This proposal is about the study of Disability and ICT education. It proposes to study how the disabled can be taught ICT and the benefits of introducing ICT education to the disabled. ICT has no universally accepted definition because the concepts, methods and applications involved constantly evolves every day.ICT entails products that manipulate, store, receive or transmit information in the digital form electronically. Examples are computers. Cellphones etc. (tutor2u.net). Disability simply put is the inability to do an activity normally due to impairments such as weak limbs or blindness (uchospitals.edu/online).

Problem Statement

The disabled have been neglected for a long time in the issues of ICT that a majority if not all are computer illiterate or have limited knowledge in ICT. This has reduced them to bystanders as the world progresses and integrates ICT into their daily lifestyles. Some can not even perform basic tasks like making calls or making withdrawals from the ATMs, thereby relying on others for tasks they can perform on their own if trained or educated on ICT.

ICT has become an integral part of our day to day life and it is dictating everything in our lives, for example, emails, ATMs cellphones etc. therefore it will be great of importance to teach it to the disabled so that they can be self-reliant and feel part of the global ICT village.

Objectives

The research project proposes to address the following questions.

  1. Why is ICT education important?
  2. Why should ICT education be introduced to the disabled?
  3. What is the importance of introducing ICT education to the disabled and what are the benefits of this programme?
  4. How and when should ICT education be introduced to the disabled?

The local schools for the disabled are willing to allow us to interview their learners to make this research viable in the hope that this research will help improve their knowledge and increase their access to ICT.

Methodology

In order to achieve the research objectives, I am going to use the interview and questionnaire methods to get a response. I have chosen the interview method because

  1. We are going to get direct and first-hand information from the study group
  2. Because it is difficult for the respondent to give false information during
  3. The questionnaire will be useful for those respondents who can not speak. Hear.
  4. The interview method will also save research time and resources.

Resources

I will need money to travel to these learning institutions to interview the respondents and to print the questionnaires.

Resource material from the library to get more information about ICT.

Schedule

GATHER BACKGROUND INFORMATION 20THOCTOBER, 2008
INTERVIEW AND ANALYSIS DATA COLLECTED 21ST-25THOCTOBER, 2008
MAKE A CONCLUSION AND PRESENT THE RESEARCH 26THOCTOBER, 2008

Qualifications

I am a master’s student therefore I am qualified to do this research and come up with empirical findings that will help solve this

Cost/Benefit Analysis

In this global ICT community, it is unthinkable to let anyone lag behind whether disabled or not as the world continues to grow technologically with new technologies developed each day. Therefore the benefit of this research outweighs its cost in that we will be able to make the disabled be at par with the rest technologically to make them independent and self-reliant.

Worms, Viruses and Trojans

Introduction

This proposal is about the study of Worms, Viruses and Trojans. It proposes to study how these security threats are developed, how they can be eliminated and how we can protect our network from their invasion. These security threats have proved fatal and their effects have caused serious damages to our systems that it is high time we should find a permanent solution to rid us of this menace and make our computers safe.

Problem Statement

Trojans, viruses and worms are programmes developed to damage the computer or alter how a programme runs without the consent or knowledge of the owner. (webopedia.com). A virus is a programme that disrupts computer function without the permission of the user, while a Trojan horse contains malicious codes that trigger loss of data and it does not replicate like viruses. A worm on the other hand is a programme that multiplies itself from one system to another while using a host file. It only exists inside other files and spreads through them. (service1.symantec.com). These software threats have wreaked havoc on our systems causing damages that have outreaching consequences to our network systems. Therefore it will be of great value to study how to keep these threats at bay.

Objectives

The research project proposes to address the following questions.

  1. Why and how are these security threats developed?
  2. How do they enter into our systems and corrupt them?
  3. How can we prevent these software threats from corrupting our systems?
  4. Is there a way that we can get rid of these software threats completely?

Methodology

In order to achieve the research objectives, I am going to use both the interview and questionnaire methods to get a response from various companies on how these threats get into their system, how it affects their systems and how they control them. I am also going to use internet and library resources to get more information about these software threats and their control measures. These methods are effective because they

  1. Will save time
  2. I will get adequate and reliable information.
  3. I will utilize minimum resources

Resources

I will need money to travel to these companies and to print the questionnaires. I will also internet and library facilities to do in-depth research.

Resource material from the library to get more information about ICT.

Schedule

GATHER BACKGROUND INFORMATION 20THOCTOBER, 2008
DISTRIBUTION AND FILLING OF QUESTIONNAIRES AND ANALYSIS DATA COLLECTED 21ST-25THOCTOBER, 2008
MAKE A CONCLUSION AND PRESENT THE RESEARCH 26THOCTOBER, 2008

Qualifications

I am a master’s student therefore I am qualified to do this research and come up with empirical findings that will help solve this problem.

Cost/Benefit Analysis

In this ICT community, it is unthinkable to leave our expensive computer systems at the mercy of viruses, Trojans, and worms unprotected. This will help us protect our computers and the valued information in them. Therefore the benefit of this research outweighs its cost.

Copyright Issues in the Global IT market

Introduction

This proposal is about the study of Copyright issues in a global IT market. It proposes to study how these issues limit and affect both hard and software use hence monopoly by developers and exorbitance in pricing and maintenance. Many software companies like Microsoft have been given copyright on their software and this they use to exploit their clientele. They know that no other company will or can provide competition to their software hence they overprice them. This copyrights issues also hinder the compatibility of different software and hardware from different companies. This, therefore, forces a user to stick to one software or hardware brand even if it does not serve one’s purposes adequately.

Problem Statement

Copyright is an official concept that gives the inventor of an original work a special right to control its distribution to avoid plagiarism. (sunsite.berkley.edu). These rights give more leverage to the developers of IT software and hardware to exploit their clients through exorbitant pricing and monopoly. This paper proposes how to tackle the copyrights issue on the global ICT market without infringing on the rights of both the client and the software developing companies.

Objectives

The research project proposes to address the following questions.

  1. Do copyright issues protect consumer rights?
  2. Should copyright issues be implemented and whom should they protect?
  3. How and when should copyrights issues be applied without undermining the rights of both the client and the software and hardware developer?
  4. How can we avoid exploitation of the consumer through copyrights issues in ICT?

Methodology

In order to achieve the research objectives, I am going to use both interview questionnaire methods to get a response from various companies on how copyright issues affect them and their businesses. I also interview the government officials charged with copyrights issue on the best way forward.

Resources

I will need money to travel to these companies and to print the questionnaires. I will also need internet and library facilities to do in-depth research.

Schedule

GATHER BACKGROUND INFORMATION 20THOCTOBER, 2008
DISTRIBUTION AND FILLING OF QUESTIONNAIRES AND ANALYSIS DATA COLLECTED 21ST-25THOCTOBER, 2008
MAKE A CONCLUSION AND PRESENT THE RESEARCH 26THOCTOBER, 2008

Qualifications

I am a master’s student therefore I am qualified to do this research and come up with empirical findings that will help solve this problem.

Cost/Benefit Analysis

It is not right to give one person or company exclusive rights to software and hardware development because they always abuse it. Therefore the benefit of this research outweighs its cost.

Network Security

Introduction

This proposal is about the research on Network security. It proposes the study on how we can make our systems more secure to avoid losing valued information in the systems through hacking or virus attacks.

Problem Statement

Network security involves making provision for the computer infrastructure to manage and or restrict network-accessible resources from illegitimate access. They are never adequately done hence constant illegal accessibility. (developers.net). clients continue to use a networked application like the internet to communicate and even transact business bringing with it new security threats thereby putting a lot of pressure on them to install more secure software that is expensive. (comptechdoc.org). This puts a lot of financial t strain on small business owners as they strive to make their computers more secure in order to protect their businesses. Corrupt systems also mean a longer time to clean and vital documents lost.

Objectives

The research project proposes to address the following questions.

  1. How can we make our network secure?
  2. Who and what should be involved in network security

Methodology

In order to achieve the research objectives, I am going to use both interview and questionnaire methods to get a response from various companies on how they have been affected by network insecurity and how they have tackled this network insecurity.

Resources

I will need money to travel to these companies and to print the questionnaires. I will also need internet and library facilities to do in-depth research.

Schedule

GATHER BACKGROUND INFORMATION 20THOCTOBER, 2008
DISTRIBUTION AND FILLING OF QUESTIONNAIRES AND ANALYSIS DATA COLLECTED 21ST-25THOCTOBER, 2008
MAKE A CONCLUSION AND PRESENT THE RESEARCH 26THOCTOBER, 2008

Qualifications

I am a master’s student therefore I am qualified to do this research and come up with empirical findings that will help solve this problem.

Cost/Benefit Analysis

We need to make our network more secure and this research will provide us with solutions to this global problem, therefore its viability outweighs the cost.

Works cited

Comptechdoc. 2007. Web.

Developers. 2006. Web.

DidYouKnow. Web.

service1.symantec 2005.. Web.

Sunsite. 2005. Web.

Tutor2u. Web.

UC hospitals 2007. Web.

Webopedia 2007. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2021, September 24). Disability and Information Technology Education. https://studycorgi.com/disability-and-information-technology-education/

Work Cited

"Disability and Information Technology Education." StudyCorgi, 24 Sept. 2021, studycorgi.com/disability-and-information-technology-education/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2021) 'Disability and Information Technology Education'. 24 September.

1. StudyCorgi. "Disability and Information Technology Education." September 24, 2021. https://studycorgi.com/disability-and-information-technology-education/.


Bibliography


StudyCorgi. "Disability and Information Technology Education." September 24, 2021. https://studycorgi.com/disability-and-information-technology-education/.

References

StudyCorgi. 2021. "Disability and Information Technology Education." September 24, 2021. https://studycorgi.com/disability-and-information-technology-education/.

This paper, “Disability and Information Technology Education”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.