CREADY software

Cready” is cloud based business process management solution designed for automating loan approve processes of banks or companies offer cash or non-cash loans to customers. Solution offers risk analyses of customers with its scoring value based on sophisticated risk scoring model.


Kredit proqramı - CREADY


Kredit proqramı - CREADY








Kredit proqramı - CREADY



Kredit proqramı - CREADY






Kredit proqramı - CREADY
Kredit proqramı - CREADY




Distance learning via the Internet

Education has a great role on lives of people. A proper education method is as important as giving education on a subject. Usually people have education in schools. From past to now, schools have been very important in the area of education. By improvement of information technologies, computers and internet became crucial elements of education. As a result, internet organizations built virtual schools in order to give courses on the internet. Getting education at virtual schools is called “distance learning”. Şen (2003, p. 1) claims that distance learning is a kind of learning method, that is performed by teacher and student, who are separated by means of time and location. Many people refuse to get education via the internet. They think that unlike schools, distance learning does not provide social activities to students. A better alternative, for everyone, is distance learning for three reasons.
Firstly, distance learning via the internet is more economical than schools education. In school education, buildings, desks, blackboards and other needs of classrooms are necessary. Unlike school education, distance learning provides same education without these necessities. As a result, distance learning organizations do not pay for these necessities. As preparing a virtual school is economical, distance learning organizations provide courses with lower tuition fees. On the other hand, distance learning is also economical from the view of necessities of people who get distance learning courses. For example, they don’t need to buy books, school uniform and pay money for transformation, food and accommodation.

Secondly, distance learning satisfies us flexibility in setting our timetable and doing our job, other tasks and so on. As courses are performed by special software in distance learning, we can attend to courses whenever we want. Moreover, distance learning via the internet enables us doing our job and other tasks parallel to our education. For example, a doctor can attend to courses via the internet without hindering his/her job. And also a mother can go on her education with caring her children and doing housework.

Finally, distance learning is accessible from any where by connecting to the internet. According to McGuire, “The course is available at virtually any time or location and thus is accessible to a far broader range of students”(online, 1996). Accessibility of distance learning enable us attending to courses from home by connecting to the internet. For example, disabled people can easily get education from their home. In addition, people who perform their job in their offices, can attend to virtual courses from their office.

People who oppose to distance learning say that students became asocial by not having classmates. This idea can be seen reasonable at first glance but people who get education by internet, react with his/her virtual classmates by internet as sending e-mail, chatting, writing on forums and also do social activities with them in spare times as in schools. As distance learners save their times by not going to school, they prepare social activities with their friends in their leisure times.

In conclusion, there are many advantages of distance learning via the internet. Researches on distance learning show that it is more efficient than school education. Because of these advantages, distance learning via the internet will take place of school education in a few years.


References:
* Şen, N. (2003). An activity planning and progress following tool for self-directed distance learning. Ankara: Middle East Technical University.
* McGuire, P. (1996). Advantages and disadvantages of DL over traditional instruction. Retrieved May 3, 2004, from
http://www.lcc.gatech.edu/~mcguire/advantages_disadvantages.htm


Zeynal Zeynalov
10. 05. 2004

Computer Crimes

Knowledge, accumulation of past experiences, is one of the crucial elements of human life. As knowledge has been valuable from ancient ages to our century, humans have done researches on the methods of transforming, developing, saving and using knowledge quickly and securely. In last two centuries there have been lots of considerable improvements on the area of information technologies. Computer is one of the significant inventions on the field of information technologies. In spite of advantages of computers, such as being fast, reliable, able to hold a great amount of data, they are usually insecure. Because of insecurity of computer systems, some malevolent persons use computers on their bad purposes. Usually, misuses of computers are called computer crimes. There are two main categories of computer crimes: sabotage and data theft.
Firstly, one of the main and well-known types of computer crimes is sabotage. Usually, sabotages are performed against computer systems of popular companies and organizations of government. Almost whole of criminals who perform sabotage intend to damage computer system of organizations they attack. Criminals generally use two main methods during their attacks: hardware attacks and software attacks. Hardware attacks are performed by using hardware faults of a computer system. Moreover, criminals harm computer systems by using brute force. According to Bequai, “It [sabotage] may involve the use of explosives, fire, or even destruction by water” (1978, p.13). Unlike hardware attacks, software attacks are carried out by using software defects of computers. Most common and dangerous way of software attacks is attacking by viruses. Virus is a special kind of computer program, which starts itself automatically and damage computer’s operating system.

Another important type of computer crime is data theft. Data theft is one of the popular crimes of last five decades. Data theft can be considered as stealing other’s documents by using special techniques on computers. Generally there are two kinds of datas those are stolen: secret datas and datas those are sold. In the first case secret datas are projects of companies, account passwords of banks, military informations, etc. Usually criminals steal these datas to misuse them according to their aims. In addition, a country may perform a computer fraud by stealing military informations of its enemy country. Another kind of data theft is stealing datas those are sold. In this case criminals enter transmission lines or databases without paying money (Davies, online, 2002). Using internet without paying cost, downloading audio and video datas from webpages without subscribing, etc. can be given as examples to theft of datas those are sold.

Finally, computer crimes can be categorized as attacking computer systems to damage them and misusing computers to steal other’s datas. As numbers of computer crimes increases day by day, responsible organizations should consider reasons of these illegal and unethical actions, and give importance to the education of computer usage. It is reasonable to expect that misuses of computers can be prevented with a proper education on computer usage.


References:
* Bequai, A. (1978). Computer Crime. Toronto: D. C. Heath and Company.
* Davies, J. (2002, September 18). Computer Crime. Retrieved April 8, 2004, from
http://www.scit.wlv.ac.uk/~in7504/computer_crime.htm


Zeynal Zeynalov
19. 04. 2004

World of Worms

World of Worms is a Massively Multiplayer Online Game with 3D Graphics. It had started as a senior project at Computer Engineering Department of Middle East Technical University. Idea of game scenario is from Worms World Party from Team 17. Our aim is to make an online game with an RPG-style scenario.

Project members:
Name Position
Mehmet Emre Sahin 1395516
Semsi Cihan Yucel 1348176
Zeynal Zeynalov 1272087
Cem Aytar 1347160