Friday, February 28, 2020

Toy store field trip Essay Example | Topics and Well Written Essays - 1250 words

Toy store field trip - Essay Example established that ethnic and racial status has a deep impact on the future lives of children and it influences their thoughts, actions, beliefs and perceptions (Quintana 27; Harro 15). Toys play a significant role in shaping the child’s beliefs and attitudes related to their ethnicity and race. A visit to the local retail store that houses a large toy department was an eye opener in many ways. At first glance the toy store looked bright and colourful with various eye-catching gadgets, devices and playthings that trigger the desire to purchase. The toy store had toys for all age groups. However, a closer and more professional evaluation of the toy department at the local retail store revealed some disturbing aspects. The first and most distinguishable was the segregation of toys for boys and girls. Gender discrimination was most apparent with toys meant for boys in blue displaying action games, cars, building blocks, and aggressive games. The toys in the girls section coloured pink stocked dolls, soft toys, games and activities related to beauty (beads, fashion accessories for dolls) and domesticity. Some games are unisex and hence segregated according to age-groups. These included board games, puzzles, learning toys etc. Another distinctive aspect seen in the toy department was the ethnicity of dolls displayed on the shelves. Chinese Barbie dolls could be seen everywhere reflecting the local cultural influence on Barbie dolls. The dolls represented Chinese culture and their fashion accessories reflected the local lifestyles. The other segment of Barbie dolls had white complexion and were displayed attractively with their counterparts. The toys in the store were organized in two distinct segments – blue and pink. The blue segment represented the boys and the pink for the girls. In the boys segment, action games and heroic figures were highly visible while in the girls segment, dolls and fashion accessories were more prominent. Toy guns, video gaming sets,

Tuesday, February 11, 2020

Asymmetric or symmetric security key Case Study Example | Topics and Well Written Essays - 500 words

Asymmetric or symmetric security key - Case Study Example In this scenario, both the sender and receiver decide for the shared key before sending/receiving the data and then they can start encrypting and decrypting data between them by making use of that key. Some of the well known examples of symmetric key encryption comprise TripleDES (Data Encryption Standard) and AES (Advanced Encryption Standard) (Stretch, 2010; Ezeobika, 2010). Fig1 demonstrates the process of Symmetric key encryption: In addition, DES, 3DES, AES, and RC4 are some of the well known examples of symmetric encryption algorithm. In this scenario, 3DES and AES are widely utilized in IPsec and other types of VPNs (Stretch, 2010; KetuWare, 2004). Asymmetric encryption is also referred as public-key cryptography. As compared to the symmetric encryption method in asymmetric encryption two keys are used: one for encryption and another for decryption. Basically, this encryption technique uses two keys for the data encryption: a public key and a private key. In this scenario, the public key is made available for all so it can be used to encrypt data and information by anyone who wants to send a message to the person who has the key. However, the private key is not disclosed to anyone and is employed to decrypt received data. Most commonly seen example of asymmetric key encryption is RSA (Stretch, 2010; Ezeobika, 2010). Fig2 demonstrates the process of Symmetric key encryption: Excellent Support for Message Authentication: In view of the fact that the asymmetric encryption technique supports the digital signatures which allows the data receiver/sender to authenticate that the data is actually received from a specific sender. Integrity of data: As discussed above, the use of digital signatures also ensures the integrity of data. In addition, this technique allows the receiver to become aware of if the data was modified during transmission because a digitally signed data cannot be altered without invalidating the