CONTENTS,INTRODUCTION,KNOWLEDGE MANAGEMENT AND KNOWLEDGE REPRESENTATION,LOGIC AS A KNOWLEDGE REPRESENTATION METHOD,CLASSIFICATION OF LOGIC,PROPERTIES OF KNOWLEDGE,EVALUATION OF KNOWLEDGE REPRESENTATION METHODS,CONCLUSION,REFERNCES
CONTENTS,WHAT IS PROBLEM SOLVING?,WHAT IS META-COGNITION?,INSIGHT PROBLEM SOLVING,NON-INSIGHT PROBLEM SOLVING,EXPERIMENTS CONDUCTED,THE RESULTS OF THE EXPERIMENTS,CONCLUSION,REFERNCES
CONTENTS,DEFINITIONS OF LOGIC,PROPERTIES OF THE PAPER,LANGUAGE AND KNOWLEDGE,LANGUAGE AND ONTOLOGY,LANGUAGE AND COMMON SENSE KNOWLEDGE,CONCLUSION,REFERENCES
INTRODUCTION Jumai.com is a Nigerian electronic commerce form that provides services in a wide range around the country and across the country (Latchem, 2017). It is a licensed recognized online platform by the federal government which has impacted the general society and the business arena. Piloted research on the application and practice of information technology system in the organization in assisting strategies of the business shows that Jumia Nigeria associates its business proficiencies...
INTRODUCTION At the beginning of the project, five students formed a team with the purpose of investigation on the use of an information system to support the e-commerce business strategy. According to Belbin (2012), when a team is performing at its best, there is usually a clear task assigned to each member of the team. Belbin (2014) reports that despite clear roles and responsibilities, teams often fall short of its full potential because most times team members are not flexible enough whic...
ABSTRACT Government agencies have moved to cloud-based services to evade the dangers of legacy systems, reduce their overall investment in IT technology and manage resources.As well as shining a spotlight on the various benefits of cloud computing.However, as with any other technology investment, there are still questions about the possible risks of cloud-based technology implementation. These issues and the lack of academic literature focusing on cloud computing in the government context rei...
INTRODUCTION The advancements in information system technologies into today’s society have given rise to several concerns regarding data security and privacy. However, these concerns relate to protective measures taken with respect to digital privacy and the protection of unauthorised access to databases of information. Regarding information system technologies, computer games have been designed in such manner to collect, process and store personal data of the gamers. This raises several co...