— I selected “Steve Jobs” as the computer person project — Must follow the attached Rubric(Checklist) instruction.  —   Submission Upload Requirements 1.

— I selected “Steve Jobs” as the computer person project

— Must follow the attached Rubric(Checklist) instruction. 

—   Submission Upload Requirements

1. Infographic (.pdf or jpg or other format only)

2. Assignement  Document (.pdf format only)

—   CTH –Computer Person Project

Who are the Computer People?

In the 20th century, the ENIAC computer set the stage for a fast paced technology revolution that we are living in during the 21st century. Who are important to the advancement of computer or computer technology?

The following people have been instrumental in the development of computer science in various ways as has many others. These are not listed in a particular order, nor is this an exhaustive list.  However, these are important people to recognize that have helped computer science move forward in the realm of technology and problem solving. At the same time society and ethics concerns have arisen as the computer technology has flourished.  Consider these two items as you work on creating your infographic using a Web2.0 tool to highlight the person’s

  • accomplishment
  • the social,      ethical, or economic concerns that were created from the advancement
  • MUST FOLLOW attached Rubric(Checklist) instruction

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can