Quality Technology Essay Examples for Your Learning

Itpm best practices

Implementing ITPM as a part of a large IT governance program improves the value of IT investments in an organization. The ITPM process is the same but the approach may differ depending on the type of business and the priorities set for the overall goals within the organization. It also means that a process or β†’

Jerry montgomery and trusty carpets

In sum, the objective of the business is to improve the use of technology for his current store, and to include the same capabilities for his new location, support a mobile sales force. Support for mobile sales force Jerry intends to have a salesforce on the field to improve his profit margin and justify the β†’

Job stress among help desk technicians

The simple rules to be followed by the help desk workers who are mostly it experts include; Help users help themselves One common complaint many IT support employees have is that they spend a lot of time helping clueless users fix obvious problems. Ask support staff what issues they run into most often, and β†’

Key challenges and pitfall to virtual team performance

Key Challenges and Pitfall to Virtual Team Performance Key Challenges and Pitfall to Virtual Team Performance Apparently, creating and maintain virtual team performance due to inconsistent communication demean virtual team performance. The inconsistent communication used by the virtual teams generates the challenge of misinterpretations that limit virtual team performance.

Assignment 1: installing the microsoft office suite

The concern that I have with the preinstalled software is whether the software is up-to-date, whether it is a full version of the software and whether it is an original or a pirated version. It will even be easy to learn this component as there is a help option along this component and by following β†’

Secure video transmission using open mpi information technology essay

As the two client speak to one another, their voices are carried over the network and delivered to the other's speakers, and whatever images appear in front of the video camera appear in a window on the other participant's monitor. Open MPI and Open MP for parallel and distributed approach, by considering video conferencing as β†’

Predictive vs. adaptive sdlc

Basically, agile software development approach is known as adaptive SDLC and the majority of software developers now adopts agile for a variety of reasons. However, the predictive SDLC approach does not provide any support for handling these changes and if it does, these changes are costly to accommodate. Some of the benefits of agile include β†’

Computers that simulate and reflect human behaviors

Computers That Simulate And Reflect Human Behaviors Summary In his article titled " Authenticity in the Age of Digital Companions", Turkle examined the nature of interactions between users and computers. Consequently, the emergent interaction with computers has established new domains of meaning to the concepts of authenticity and liveliness within β†’

Steve jobs

In his interview with Morrow , Jobs revealed that his experience with experimenting on electronic items began when he was about 5 years with his father's support and guidance; this experience rooted curiosity, passion and experimentation attitude in Jobs. Steve Jobs was known to have an incredibly curious nature; was a quick learner and β†’

Ethics and information technology

It is very unique of information technology like mobile device, computer, and so on because it is variety of used to the people directly make the people life more comfortable. But refer to the ethics of information technology professional, it can be seen that on how they used the technology, implement the β†’

Appendix :a pestel evaluation for intel

School/College PESTEL EVALUATION OF INTEL By Your's PESTEL EVALUATION OF INTEL Political, economical, social and technological analysis shows that how Intel Company has been affected by the external factors to manage its development. Political Factor: Major considerations in the semiconductor industry are the individual and corporate taxes. Intel is an international working company and keeps β†’

Research outline and references

YouTube in the modern times of digital interaction and interface is not just the of a website, rather a medium and a platform. The incorporation of cloud computing and advertisement is another domain which will progress in times ahead.

Dw – components of data warehouses

Kimball and Ross further added that data warehouse provides security to data, monitor updates from different sources, and even checks the quality of data. Reporting This component mainly ensures that data is available for all the users from the central data warehouse. Metadata According to Kimball and Ross , metadata β†’

Design structure of a workout website

The details of the sections are outlined and explained below: Navigation The site contains links strategically placed within the web system to facilitate the interconnection of the different web pages that offer diverse services. The selective and optional navigation to various links that represent the pages of the website is symbolized by the template β†’

China and the censorship of information technology

It is the best instrument to educate and enlighten one's mind due to the many views and theories it has compiled in its infinite database. Yet, this is not the reason why the Chinese Government is advocating the internet. Second, the Chinese government does not have the right to ban sites and β†’

Cis 375 week 8: 2: usability of ipads and websites

Usability of Websites and IPad al Affiliation Usability of IPad and Websites Introduction The following is an analysis on theusability of iPad and websites from the perspective of the users experience in using the iPad. Use of Gestures in IPad Gestures enable for the easy use of the iPad instead of routinely going to β†’

Reuse of software

Reuse of software is the utilization of existing assets in some kind within the process of software product development. However, currently, reuse of software involves the redeployment of components across the complete lifecycle of development beginning with domain modeling and specifications, design of software, coding, testing, to operation and maintenance, (Nazareth and Rothenberger, 2004).

Smartphones use as a mobile computing technology

This paper argues that although smartphones have a number of negative consequences, their benefits in people's social and professional lives are numerous. The paper begins by defining smartphones, it then discusses their present and potential applications, highlights other technologies that compete with smartphones, discusses their benefits in social and professional lives, and possible improvements in β†’

Data warehouses

Additionally, a data warehouse contains past data which is retreived from processing transaction data, however it combine data coming from a variety of sources. Another most important function of data warehouse is that it establishes a boundary between analysis workload from transaction capacity and allows a firm to combine data from different sources.

Week 1 cyb

It is through such means that the Tiger Team is able to establish that a skylight on the roof is one of the organisation's security weaknesses as it will provide them with discrete access into the car dealer's premises. They challenged the assumption that every potential buyer who walks in the showroom is genuinely interested β†’

Smart cars on sensible roads information technology essay

Part one gives the introduction, part two describes the various zones around a car, its detection and imaging.part3 puts all these layers and imaging in real time traffic , part four imbibes these real time zones and imaging in the car, part five explains about smart highway in short, part six describes the hardware requirement β†’

Input output devices of a computer

It has three buttons the left button helps in selecting the file or the folder or the icon on the desktop, a right button which when clicked displays the properties related to the file, while the middle is to scroll the page. The most prevalent output device is the monitor, it is like a TV β†’

Article questions

The main argument of the thesis is contained at the end of the first paragraph of the article, that is, " Government should devise regulations that can be applied across law-enforcement jurisdictions and national boundaries, in order to make the Internet more secure". 2. Do the authors, in this article, reach all the destinations for β†’

Troubleshooting electric circuits

TROUBLESHOOTING ELECTRIC CIRCUITS 1 In troubleshooting, it is imperative for the technician to take into consideration several important aspects of the troubleshooting processes. In the scope of troubleshooting an electrical circuit, it is likewise of utmost importance to identify the controls and loads, clearly understand the sequence of the operation in a system, and β†’

Analyzing the business models of different services

In addition, not using GPS and cell networks decreases the cost to the end user. They present the benefit of this technology with a hypothetical example of a bicycle being stolen. This is not very helpful in the case of a bicycle, as for most people the only " protected area" might be where they β†’

Cybersecuirty

Cyber Security Cyber Security Topic 3 In my opinion, the response to the question represents a degree of truth in the ment. In disputing the SIMTRAY's justification of hacking on the basis of intent, it shows you do not consider both sides of the hacking issue.

Media supporting information technology

I hope the report will be self explanatory, if not or you have any ambiguity, please contact us[email protected]om Sincerely Hozefa Rasool Ather Khan INTRODUCTION TO INFORMATION TECHNOLOGY Information technology , as defined by the Information Technology Association of America , is " the study, design, development, implementation, support or management of computer-based β†’

Instagram as a social networking application

This purported attempt to convert users' property as public to generate revenue threatened Instagram and resulted in the withdrawal of its users. The privacy policy was one of the major issues that caused the company to face several threats. The policy that Instagram announced limits users' understanding related to the use of its services and β†’

Lab management software

In particular, this paper will look at the benefits of lab management software, its benefits and detriments, in addition to the effectiveness of implementing such system in the handling of the day to day activities in the lab. Introduction Lab management software is a set of software technologies meant to replace manual systems in β†’

Microsoft word :

Those issues included the risks and negative aspects associated with the mechanisms of authentication, access types, and authorization. Network Security Network security is the mechanism for the protection of computer networks from different sorts of threats. Software-Defined networking is one of the main mechanisms that can be used in the future to improve the β†’

The effect of the esd information technology essay

A device, circuit or a system that is susceptible to ESD will respond to the discharge in different ways depending on a number of factors, which include the location of discharge, voltage level of discharge and environment in which an ESD event occurs. It is important that ESD robustness be given the same level of β†’

Microsoft kinect project

Information Technology is the use of computers and telecommunication systems to transmit, store, process and interpret data. Information Technology is made up of hardware and software components.

Describe dod dir 8570.1

The policy requires all those involved in the military service to maintain a certified status with a particular number of hours of every year's continuing professional education. DoD Directive 8570. The policy eliminates consistent problems in the future that can be as a result of lack of regulated global recognized qualifications by providing a metric β†’

Balance between wireless security and performance – thesis proposal example

The amount of security that should be incorporated in the system normally depends on the size and the nature of information being handled by the organization as well as on the devices being used. The first and foremost way is to maintain a full understanding of that particular networks topology. This is important especially where β†’

Team lab 5: snort rules

079555 0: 50: 56: 9E: 4: BF 0: 50: 56: 9E: 6F: 1C type: 0x800 len: 0x4A The line above is the first line of the output and displays the date and time the output was produced or when the packet was being sent from the attacker to the victim. Type: 0x800 indicates that β†’

The integration of information technology

The most required software for the PC's is the operating system. The advantage of this is that the software will be tailored to the specific needs of the house.

Douglas crockford

Douglas Crockford Douglas Crock ford, talks about the head and gut, he tries to explain how the head and gut coordinate in order the body to function. He concludes by saying that gut messes us up when it comes to the matters of the style.

Software development

At the end of this paper, both questions should be answered in full. Keywords: software development, strategies, IT, governance Software Development Question 1: Software development can be a considerable part of a company's software budget. Secondly, IT governance is " defined as the structures, processes, and relational mechanisms for the IT decision making β†’

Module 7 dq 1 and 2

According to the US Department of Labor, the position now known as HIT Manager is also referred to as the administrator of the health care facility. Among other things, the person 1) manages the efficiency of the organization, 2) supervises the financial aspect of the facility, 3) facilitates with state and federal governments in respect β†’

Old dominion trail bikes

All these information will propel Ted's business further to the ladder of success. Question three Ted's business is involved leasing of bikes, ordering of new bikes from the supplier, keeping sales records and many other business activities. It also streamlines the way activities are taking place within the business. Question nine Before the β†’

Agile methodology in the realm of e-commerce

One of the best elements of Agile is the fact that one can prototype. It is clear to understand that Agile enhances the churn by reducing defects and defining the product resourcefully.

How robots can effect on children’s development

Although this kind of technology has become of help, care should be taken in its adoption to avoid future challenges on the child being tendered by the robots. The likely detrimental challenge that is bound to result from the use of robots to babysit and education a child is; the poor development of a child β†’

How can we safeguard against the cybercrime

These crimes are committed through the use of computers as weapons, accessories, or sources of the crime, and are thus a creation of the 21st century. People engaging in activities over the internet have to engage in legal activities, which are for the benefit of the individual and the economy of a nation.

Terry cannon, mba

Considering his role in this organization, Terry Cannon needs to have knowledge regarding Management Information System, Transaction Processing Systems, Decision Support Systems and Knowledge Management Systems. Knowledgeable Participant Terry Cannon can prove to be a knowledgeable participant in each of the mentioned three jobs by possessing knowledge regarding information systems that would be relevant β†’

Computer sciences and technology

By connecting people thousands of leagues apart, it altered the way the world interact and helped the culture of each nation evolve towards a more globally centred one. Internet and Socialization If one will ask any high school student about the essence of the internet, the answer he will probably get is, " to β†’

Geographical information systems (gis)

In raster data model, attributes are limited to the numeric values of the cells themselves, and while it is possible to link additional attributes to the groups of cells having same values, which is rarely done in practice because of the low utilizing value and cumbersome data management.| In vector data model, an object's shape β†’

Computer sciences and information technology

The management of the organization is not pleased with the ongoing support levels it is receiving from the Microsoft Dynamics GP ERP system usage and its IT operations across its branches as they have all proved to be cost ineffective. Overall Risk of Investment Failure The company fears that the system may not be in β†’

About information technology

Information Technology Information Technology Introduction Information technology is the computers and other telecommunication application tools for storage, transmission, retrieval and manipulation of data. The major processes that take place in information technology include, Data collection and storage Data to be used in any project is collected from the field and entered into the computer β†’

Explain why information systems project management requires careful attention to quality management

Second reason is that lack of focus on quality management within information systems project management can result in rework and high number of project changes. This is the reason why experts suggest adhering to the standards of quality while managing any information system project." It certainly is a better and safer practice to plan quality β†’

Database dangers in the cloud

Database Dangers in the Cloud How does a company apply their security to the data they store in the Cloud or what is the standard to protect your data? One of the recommended ways to secure data stored in the Cloud is through encrypting [Lem12]. According to Goodenough , migrating the data to β†’

Monitoring software: slow internet surfing

When we get connected, the spyware automatically begins sending personal information without the knowledge of the computer user. Mostly spyware gathers this type of information and sends it to third-party networks without the knowledge and permission of the user.

The building blocks of experience: an early framework for interaction designers

For designers to have success, must a great understanding of the relevant components and the knowhow on whether to design or script the experience. In order to determine factors influencing the experience is to assess components of what surrounds the product and components of consumer-product interaction.

General system theory and the internet design idea

General System Theory and the Internet Design Idea General System Theory and the Internet Design Idea The idea that gave birth to internet was originally developed by a person known as Paul Baran in 1960s. This has led to the misuse of Internet as a communication network.

Microsoft zune vs apple ipod

The Apple iPod and Microsoft Zune: Playing the Same Tunes Differently People enjoy listening to music because it can relax and soothe one's nerves and at the same time, pump up one's energy. The two most popular media players in the market today are the Apple iPod and the Microsoft Zune. Apple released their first β†’

Cis206 u5 research assignment

Administering a UNIX User Environment Administering a UNIX User Environment The article, Unix Administration, by David Malone focuses on various aspects that involve the administration of the UNIX user environment. Processes are the basic units of executing programs in UNIX and can be in states such as waiting for data, ready to run, or running.

Information systems requirements

This report will identify the information requirements of RTE by advocating that the basic process of systems development involves defining the project, creating a model, deriving a model, measuring the costs and benefits of all alternatives, selecting the best option, designing the new system, completing the specific programming functions, installing and testing the new system, β†’

Advanced hunting and content development

Advanced Hunting and Content Development Synopsis of the Advanced Hunting and Content Development Evidently, in an era characterized by big data and hacking, companies require the best tools, people, organizational focus, and people to benefit from the right capacities for data mining and acquisition of insights relevant facilitating better decisions and value creation (Talabis, McPherson β†’

The meaning and definition of bpr information technology essay

The term itself is being used less, or is being altered so that these types of enterprises are non associated with the " BPR " of the yesteryear. Despite this maltreatment of the pattern and tarnished name, the pattern of redesigning concern procedures and the associated engineering and organisational construction is more popular today than β†’

Reflection essay on nosql

Nouns can be a great asset when It pertains to dealing with large amounts of data and Its ability to be able to provide a better scalability and availability than the traditional READS can make It a plus. Nouns ability to deliver faster access to data and easily is also an advantage β†’

Survey on map server information technology essay

GIS allows us to answer queries easily by observing the data in the form of a geographic map. Spatial analysis with GIS Analysis of geospatial data is an actively transforming field. Most pre-compiled Map Server distributions contain most all of its features. Anatomy of a Map Server Application:- Map server has a.map file which β†’

Biometrics – careers, technology and contribution to business competitive advantage

Biometrics - Careers, Technology and Contribution to Business Competitive Advantage Introduction Biometrics refers to the technology of analysing human physical and behavioural characteristics such as fingerprints and eye retinas mainly for identification, security and surveillance purposes. There is always a predetermined threshold based on which the score of the biometric score gets β†’

Apply design guidelines to human-computer interaction methods

The main purpose of the web design aims at meeting or solving the need in the front end the client side; thus, the main feature in this web design is the writing make up that will update the websites accessibility guidelines. User login area; the user will use the slot to access the designed web β†’

The role of ai in future technology

Artificial intelligence technology of the future is defined by John McCarthy in 1956 as the science and engineering of making intelligent machines especially computer programs. AI is currently one of the most disruptive classes of technology whose capacity is rapidly improving due to the enhancement of various factors: huge diversity of data collected from β†’

Security awareness

Threats from inside the company continue to be the main source of information security breaches, and therefore effective security awareness campaign targeting the employees of the company can help identify and prevent threats like social engineering and phishing. Organizing a security awareness campaign will ensure the employees are informed and updated on various security issues β†’

Article question

The testing and debugging of a object oriented program is very easy because each module can be tested and debugged separately. One of the major disadvantages of structured programming is redundancy of code. Since the program code is divided into modules therefore, there is a high possibility that the same code can be repeated in β†’

Security policy document for the abc electronics company

Security Policy Document for the ABC Electronics Company A security policy is a compilation of documents that develops a company's understanding of its property, as well as, its worth, the threats or risks to which these properties along with its worth might be bare. Some of the prescribed policies to the ABC are as follows: β†’

Security

It is important for healthcare providers to consider and serve in terms of a holistic data security program that integrates security around patient information to hinder its access by unauthorized parties. For a healthcare organization to enjoy automatic logging of application to database accesses by doctors, nurses, lab technicians, and administrators, it has to employ β†’

Impact of communication and ethics on professional life

Therefore, when professional adopt accountability ethics he or she will be able to practices confidentiality that helps a lot in maintaining the privacy of customers and holding confidentiality of information that might be obtained during the professional service. Professional competence has also been seen as ability of being committed in providing the quality service expected β†’

Isp/craiglist

Thus the employees of ISP were operating within the parameters of the company and as the responded in the case they are obliged to defend themselves on limited tort liability. Under the law if an employee is involved in a criminal act, the plaintiff can sue responded for neglect hiring and β†’

Impact of big data on data management functions

Running Head: Impact of Big Data on Data Management Impact of Big Data on Data Management Date of Submission Impact of Big Data on Data Management Introduction Big data is a very important development in the realm of information technology. It often becomes highly difficult to detect privacy violations or flaws in β†’

The urbanization of the internet

This is similar to the racial fear of the previous half-century that saw the white population fleeing the decaying inner cities for the exclusivity of suburbia. This same phenomenon was echoed in the creation of Facebook. Myspace continued to be a haven for deviance and what Danah Boyd calls the " subaltern teens", while Facebook β†’

Software lability

Software developers also attach a disclaimer warrant on their products as proof of their liability and protection of the user according to Harris. Liability also ensures that software companies improve on their products to avoid incidences of damages which cost a lot to the company.

The use of technology in business

His plans also failed due to the fact that despite him being the senior most manager of the company, he had no enough knowledge of IT issues as manifested during his discussion with the senior members of the staff. 4. This is the reason why Barton felt that it was necessary for him to go β†’

Reflection paper on group cases

The VTB case clearly illustrates this phenomenon and the company was in a terrible rush to make sure that it has its house in order just before peak seasons such as Christmas, Valentine's Day as well as Mother's Day. Secondly, I have learnt that it is good to always have a single centralised command from β†’

Module 6 dq1 and 2

However, as described above, the laws as written attempt to help keep providers and patients alike comfortable in the knowledge that necessary personal information (such as social security numbers) is not released to the public, as was the case with the VA employee who lost thousands of SSN's. DQ2 The Health Insurance Portability β†’

Looking for a position in it field in a dynamic working environment – resume/cv example

nExtract of sample " Looking for a Position in IT Field in a Dynamic Working Environment" n nCOMPUTER & OTHER SKILLS n nGood at generic, common Office software applications (Word, Excel, PowerPoint, Access) n nGood at basic computer Hardware and software skills.n nEnglish and Arabic Keyboarding: Typing speed in both: β†’

Why is it beneficial to have both it & management skills together

Information Technology & Management Skills in Business Introduction According to Dinsmore & Brewin, , Information Technology refers to the application of telecommunication equipment and computer in the storage, retrieval, transmission and manipulation of data in the business enterprise. Management tasks include marketing and improvement. It is therefore important for an organization to train β†’

Unit 1 lab 2 using command line help

Use the man command to find out what the UNIX command clear does.What does it do? The man clear command clears the terminal screen of the tasks previous shown on the display of the terminal. Step 6. Use the man command to find out what the UNIX command pwd does.What does it do? The command β†’

Advantages of the internet towards society

The aim of this thesis is to identify the advantages of the internet to society. In the fast society life where people barely have time to see each other, the Internet has revolutionized the concept of togetherness and company.

Flight planning / maintenance dashboard

Furthermore, flight engineers will be able to plan for scheduled and unscheduled maintenance. The engineers purposed to design the application must have a holistic understanding of evolving technologies as well as the involved inherent functional characteristics. Gosnell also presents to us the procedure on the development of a dashboard application.

Networking 208

The main aspects in troubleshooting the network involves understanding the in depth architecture and set up of the network. I will take care of the set up within the buildings and James will get the approval and the connections between two places. Once the connections are setup, the LAN within the organization has to be β†’

Describe and explanation of ecommerce information technology essay

The main vehicles of E-commerce remain the Internet and the World Wide Web, but use of email, fax, and telephone orders are also customary. Objective The objective of the E-commerce: Develop an awareness of Internet-enabling technologies in E-commerce of Internet applications. Introduce student to the current and latest technical issues in E-commerce of the β†’

The decryption rsa algorithm information technology essay

Choose the secret key for the encryption and decryptionInput the plain text and secret key into algorithm which is encryption algorithm and generate a cipher textPerson X will send the cipher text to person YPut in a secret key and plain text into a decryption algorithm which will generate the plain textNow in the case β†’

Change management – itil

ITIL would considerably contribute to meeting the challenges of customers' changing requirements. The IT system is intrinsic part of organizational operations that not only integrates various units but also enhances it operational and administrative productivity and outcome. With ITIL, ABC would be constantly updated and will be able to apply innovative input to its product β†’

Examine the internet and social media use in a foreign country (report)

The internet and social media use in UAE will be discussed in below. Internet is quite popular in United Arab Emirates and many residents like to use the internet in their free time. All these restrictions of internet use come under internet censorship. Use of social media is also very popular in the country and β†’

Evaluating the problem

To start with, the user is to follow up a set of potential sponsors, tracking and updating the follow ups based on its outcome and notifying the user about next follow up until the sponsor for the project is decided. The system so devised should be able to notify the user and keep track of β†’

Wireless network technology

This is the new version of AMPS. The advent of mobile devices or phones chronicles the development of technology of the radio telephones. But one of the most widely known adverse effects of using this technology is the radiation that it emits.

Aquarius advertising agency case analysis

How would you describe the environment, goals, culture, size, and technology for Aquarius? The business environment of Aquarius is composed of both internal and external factors. A further disadvantage of the structure is that it would worsen the internal conflict in communication that Aquarius has experienced and attempting to resolve.

Earned value management

To start with, the planned value is referred to as the budgeted cost of the project's work scheduled. The earned value is referred to as the budget cost of work performed.

Operating systems

The Linux I/O service mainly offers the tools used for program profiling and monitoring the performance of the computer CPU. This is because during an I/O operation, such as disk read information, the operating system kernel checks for data in the page cache to facilitate fast reading of the data. The advancements in the Linux β†’

Week 2 hand-in -2

The ATM is a classic example of the textbook definition of Chapter 4.1. Is it correct? (Depending upon the policies of the bank, the customer is given a number of chances [usually three] to enter the correct number). 5.

John doe: 2d artist – resume/cv example

John Doe: 2D Artist 2D Graphic Artist American Systems Orlando, FL Oct 2017 - Dec 2019 Developed line drawings, digital images, flow charts, slide presentations, animations, video stills/clips, and simulations images Created illustrations, interactions, and animations from existing line art, photo reference, or from a blank slate Modified graphics β†’

Storge device of computer

There two classes of computer storage devices; one is the primary storage devices, and the other one is the secondary storage devices. Primary computer storage devices are smaller in size, are internal to the computer and are developed to hold data temporarily.

Four approaches to information technology infrastructure investment

APPROACHES TO INFORMATION TECHNOLOGY INFRASTRUCTURE INVESTMENT 1. Fundamental Approach: The basic tenets of the fundamental approach, which is perhaps most commonly advocated by investment professionals, are as follows: There is an intrinsic value of a security and this depends upon underlying economic factors. Psychological Approach: The psychological approach is based β†’

Macs and windows: compatibility issues

That is, the information and comparison given in favor of Macs will aid Mac buyers to go for it. Thesis While it is true that Windows has been ' virally' popular, the time has come for certain misconceptions about the Mac to be cleared up and how it will be a very good choice. β†’

Virtual estates lead to real-world headaches

When the husband avatar died and the wife avatar cannot comply with the maintenance fees, all that they have put up were totally gone. The terms of usage in the virtual reality set it apart from the real world since the mediator or platform creator and owner of the virtual environment remains to have control β†’