1.Part I. Reaction Paper
Read and understand the text below. Follow outline in writing your reaction paper at least 250-750
...
paper at least 250-750 words.
1. Introduction
2. Thesis Statement
3. Supporting details
4. Conclusion
The Digital Divide: The Challenge of Technology and Equity
(1) Information technology is influence the way many of us live and work today. We use the internet to look and apply for jobs, shop, conduct research, make airline reservations, and explore areas of interest. We use Email and internet to communicate instantaneously with friends and business associates around the world. Computers are commonplace in homes and the workplace.
(2) Although the number of internet users is growing exponentially each year, most of the worlds population does not have access to computers of the internet. Only 6 percent of the population in the developing countries are connected to telephones. Although more than 94 percent of U.S households have telephones, only 56 percent
have personal computers at home and 50 percent have internet access. The lack of what most of us would consider a basic communication necessity the telephone does not occur just in developing nations. On some Native American reservations only 60 percent of the residents have a telephone. The move to wireless connectivity may eliminate the need for telephone lines, but it does not remove the barrier to equipment costs.
(3) Who has internet access? The digital divide between the populations who have access to the internet and information technology tools and those who dont is based on income, race, education, household type, and geographic location, but the gap between groups is narrowing. Eighty-five percent of households with an income
over $75,000 have internet access, compared with less than 20 percent of the households with income under $15,000. Over 80 percent of college graduates use the internet as compared with 40 percent of high school completers and 13 percent of high school dropouts. Seventy-two percent of household with two parents have internet access; 40 percent of female, single parent households do. Differences are also found among households and families from different racial and ethnic groups. Fifty-five percent of white households, 31 percent of black households, 32 percent of Latino households, 68 percent of Asian or Pacific Islander households, and 39 percent of American Indian, Eskimos, or Aleut households have access to the internet. The number of internet users who are children under nine years old and persons over fifty has more than triple since 1997. Households in inner cities are less likely to have computers and internet access than those in urban and rural areas, but the differences are no more than 6 percent.
(4) Another problem that exacerbates these disparities is that African-American, Latinos, and Native Americans hold few of the jobs in information technology. Women about 20 percent of these jobs and receiving fewer than 30 percent of the Bachelors degrees in computer and information science. The result is that women and members of the most oppressed ethnic group are not eligible for the jobs with the highest salaries at graduation. Baccalaureate candidates with degree in computer science were offered the highest salaries of all new college graduates.
(5) Do similar disparities exist in schools? Ninety-eight percent of schools in the country are wired with at least one internet connection. The number of classrooms with internet connection differs by the income level of students. Using the percentage of students who are eligible for free lunches at a school to determine income level, we see that the higher percentage of the schools with more affluent students have wired classrooms than those with high concentrations of low-income students.
(6) Access to computers and the internet will be important in reducing disparities between groups. It will require higher equality across diverse groups whose members develop knowledge and skills in computer and information technologies. The field today is overrepresented by white males. If computers and the internet are to be used to promote equality, they have to become accessible to schools cannot currently afford the equipment which needs to be updated regularly every three years or so. However, access alone is not enough; Students will have to be interacting with the technology in authentic settings. As technology has become a tool for learning in almost all courses taken by students, it will be seen as a means to an end rather than an end in itself. If it is used in culturally relevant ways, all students can benefit from its power.
View More
2.
For a reducing balance loan what happens when you pay a extra repayments aggressively at the start. How does it
...
rt. How does it make u pay less interest and have less interest:
Vn+1 = 1.00405Vn - 1817.35, Vo= 34400
The term of the loan is 30 years with monthly payment of 1817.35 at an interest rate of 4.86 p.a
Pls tell me the answer regarding this particular equation
Q2) How much of the principal has been repaid? Fv - Vo is this the correct formula
Q3) Superannuation
Something like if u add money without tax why does it benefit your super account
I’m sorry to disturb you but I was hoping you could help as tmrw is my last writing lesson for my sac
View More
3.You will implement a version of the cuckoo hash table. Your cuckoo hash will operate as follows
You will use
...
You will use a single backing array(instead of two) and two hash functions (both MultiplicativeHashFunction objects), h1 and h2.
The z values for your hash functions (and all subsequent hash functions needed when resizing or rehashing) will be taken from an array of integers passed to the CuckooHashTable constructor. The first value in the array will be used for the first incarnation of h1, the second value for the first incarnation of h2, the next two values will be used for the next incarnations of h1 and h2, etc.
Note: be careful to follow this. We will be checking your array (via toString()) and correctness will depend on using the same values of z as we do when generating the test code. The MultiplicativeHashFunction objects you will use also have a getParams() method to show the value of z,w,d when that hash function is used.
When adding an item, x, that is not in the hash table already, always add it to t[h1(x)] (even if t[h1(x)] is already taken and t[h2(x)] is available).
The load factor must always satisfy α=n/t.length≤1/2. If adding an item will violate this then resize the table (doubling its size) and rehash everything (before doing the add).
After removing an item, if the load factor satisfies α=n/t.length<1/8 AND the dimension satisfies d≥5 then resize by reducing the size of the bucket table by a factor 2 and rehash everything.
Each time you resize you will create two new hash functions using the next two z values (that were initially passed to the constructor).
Your constructor should initialize an empty bucket array of size 16 (i.e., d=4). This is the minimum size your bucket array should ever be. Never let the dimension be smaller then 4.
View More