PC's, Central-System Computing, And Government Functionality In Term Paper

PC's, Central-System Computing, and Government Functionality In this article, the authors use correlational methods to prove their point-of-view. The way that this is accomplished is through a survey. They used percentages comparing two sets of subjects as well as a statistical analysis based on Cramer V scoring. The importance of the correlation was based upon whether or not the values in the study were greater than.20 on the Cramer V scale. If the score was under.20 it showed a weak relationship, while scores greater than.20 on the Cramer V scale showed a moderate relationship.

The authors address the computing problem quickly. The problem being the widespread belief that PC's can easily and cheaply replace mainframe computers in governmental operations (page 1, paragraph 3, lines 1-4). The problem itself was deduced from research studies completed over the last decade and is answered by the study conducted by the authors. The objective of the study is stated as, "Our aim is to assess whether the two computing environments are functionally equivalent, as many of the PC advocates would have it, or whether PC-only environments provide only some of the functions, applications, and benefits of their bigger brothers and sisters -- the mainframe and minicomputer environments" (page 2, paragraph 3, lines 1-4). There are two types of variables used...

...

The first being the independent variable defined by the authors as the computing environment (page 7, paragraph 5, line 2). The second is the dependent variable, defined as the relationship between specific impacts (page 7, paragraph 5, line 1). These variable were used throughout the study, except for one instance where due to the wording of the questionnaire these variables where unable to be used.
The scope of the study conducted by the authors clearly addresses all of the concerns raised in the article. However the population of this study is defined as, "...two sets of cities..." (page 2, paragraph 4, line 1). The description of this population is very vague in that there is no clear definition as to the size of the cities involved. It is impossible for the reader to know whether this study is based on small cities or a large metropolis. The population used in studies referenced by the authors range from small to medium cities, but no reference is made as to whether or not the authors used the same size population in their own study. The authors specify the sampling of this study to be, "Assistant managers, department heads, technical staff, and administrative staff..." (page 4, paragraph 3, line 3), and referred to studies used for comparison that used the same sampling. It is unclear as to whether the same population…

Cite this Document:

"PC's Central-System Computing And Government Functionality In" (2002, April 23) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/pc-central-system-computing-and-government-130549

"PC's Central-System Computing And Government Functionality In" 23 April 2002. Web.26 April. 2024. <
https://www.paperdue.com/essay/pc-central-system-computing-and-government-130549>

"PC's Central-System Computing And Government Functionality In", 23 April 2002, Accessed.26 April. 2024,
https://www.paperdue.com/essay/pc-central-system-computing-and-government-130549

Related Documents

Components contributing to the library's decision making process include the library per se; its purposes' its structure and organization' its functions and forms/kinds of data; its resources in/for staff/volunteers; its facilities; its equipment. Management teams and other groups play a key role in strategic decision making," Nancy H. Leonard, Laura Beauvais, and Richard Scholl (2005) relate the importance of involving groups in strategic decision making. "These groups include top management

Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently

Security Plan for the Maryland Public Safety Education and Training Center This paper will focus on a security plan designated for the Maryland Public Safety Education and Training Center. Here emphasis will be given on many things including facility assets that require protection, various threats which are directed towards the assets and the probability of loss. It is important to note that there are many complexes and facilities associated with the

Wireless Broadband Technology
PAGES 50 WORDS 20344

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

This section of the paper is providing the disadvantages of smart phones and tablets technology for the employees working in private and government organizations. a. Cost Undoubtedly, the biggest disadvantage of smart phones and tablets technology is the cost as compared to the standard mobile phones. Since, it has been examined that the cost of smart phones is more upfront as compared to the less than about a third of such

Metrics, Implementation, and Enforcement (Security Governance) How can you determine whether there has been a malware outbreak? The threat situation today has become more dangerous than in the past. Security and safety threats have been increasing in an alarming rate; there are more than 70,000 brand new bits of malware recognized daily. Well-funded cybercriminals have been currently making advanced malware that has been made to bypass present security options by launching prior