Introduction The Global system for Mobile Communications (GSM) is the most widely used system for cellular mobile communication. The GSM accounts for over 100 million mobile subscribers scattered across the globe. The system was developed to overcome weaknesses inherent in preceding analog system that was used for mobile communication. Analog...
Topic: Encryption
Words: 3686
Pages: 13
Google Search is a universal information search tool used by millions of people. Many scholars agree that Google Search is also a useful research tool (Miller and Record, 2017). But this tool has drawbacks and limitations, which should be considered when searching through Google Search. Moreover, awareness when using search...
Topic: Google
Words: 1487
Pages: 5
Introduction With the advent of the internet, there are so many websites online, some have authentic information while others do not. It is important to have the know-how of collecting authentic information from a website. This paper analyzes the website www.webmd.com with website evaluation tools provided by Prof. Robert Harris....
Topic: Web Technology
Words: 1376
Pages: 5
Introduction RFID is fast taking shape as manifested by the recent media blitz and newspaper articles about the technology. Not many people are able to distinguish the different categories and benefits that the technology brings. It is the purpose of this paper to highlight on the history, uses and benefits...
Topic: Radio
Words: 2947
Pages: 10
Introduction Organizations cannot function effectively without data. In the 21st century, most organizations such as educational institutions, businesses and government agencies depend on modern information systems in undertaking their transactions (Whitman & Mattord, 2011, p. 40). As a result, protecting the data, either held by the firms or data that...
Topic: Tech & Engineering
Words: 917
Pages: 3
The current level of technology development allows the creation of many technological solutions aimed at ensuring human safety. One of the directions in this area is replacing humans with autonomous robots controlled by an operator. Thus, a person can be protected from working in a hazardous environment, and the likelihood...
Topic: Airport
Words: 386
Pages: 1
Modern Computers and Their Functions in Human Lives The use of computers changes human life considerably in different ways. People discover more ways on how to improve their work, communication, and calculations. Within a short period of time, a computer becomes an integral part of this life, and there is...
Topic: Computers
Words: 518
Pages: 2
Introduction Titanium Diboride is a hard compound that consists of Titanium and Boron. Titanium Diboride is useful in designing various products (Huber, 3000). One such product is a capacitor. Apart from capacitors, Titanium Diboride is used in the making of extremely hard materials such as army wares and ceramic cutting...
Topic: Tech & Engineering
Words: 3637
Pages: 14
Summary description of its structure and purpose The site PCMAG.COM has rather interesting and clear structure with the help of which it is possible to identify the purpose set by the site developers. Looking at the main page of the site, the visitor is free to choose any interesting for...
Topic: Tech & Engineering
Words: 610
Pages: 2
Introduction Computer security and data safety have become the stepping stone for most organizations and individuals. In general data protection and informational safety require increased attention and awareness of the users. Forensic software may be used for various aims, however, the key functionality range is closely linked with data safety,...
Topic: Forensic Science
Words: 1108
Pages: 4
The Balanced Scorecard or BSC is performance management and IT governance tool, which is used to evaluate the companys efficiency and identify those aspects which need modification or improvement (Kaplan & Norton, 1996). It helps to develop the policies of the enterprise according to the vision and the initial goals....
Topic: Tech & Engineering
Words: 849
Pages: 3
The companies, which specialize in the development of software solutions, have to attach great importance to business continuity planning because they are exposed to many internal and external threats, for example, the failure of hardware, virus attacks, power cuts, mistakes of the personnel and so forth. Each of these threats...
Topic: Tech & Engineering
Words: 1126
Pages: 4
The term “Anthropocene” was coined to refer to the era in which human beings became the main driver of environmental change. While scientists argue about whether a new geological era should be officially distinguished in the history of the Earth, the atmosphere is rapidly changing. An increase in the level...
Topic: Environment
Words: 1141
Pages: 4
Abstract Navigation has evolved over the years from rudimentary forms that included the use of celestial bodies to the satellite-assisted systems used today. Over the years with each new system solving the preceding systems errors aircraft navigation has improved at a constant pace. These improvements have made air travel safer...
Topic: Airlines
Words: 3248
Pages: 12
Introduction There are several barrier related to technology integration into studies. This literature review explores different aspects related to factors that affect technology integration into studies as well as the appropriate measures that need to be considered to address these underlying issues. This section has been put into four sections....
Topic: Technology
Words: 2444
Pages: 10
Quoting the words of Jakub Mochon, CT product manager at Siemens Medical Solutions, let us state that “the U.S. health system is very dependent on CT”, it is absolutely evident (Dargan, 2009/2010, p.30). According to the data provided by McCollough et. al., the usage of CT scans has increased dramatically....
Topic: Tech & Engineering
Words: 564
Pages: 2
Introduction In the 21st century, there has been advancement within the technological environment as a result of development in information technology. Most organizations have integrated the use of computers within their workforce in order to increase efficiency. The learning institutions have also incorporated the use of computers as one of...
Topic: Computers
Words: 1475
Pages: 6
Introduction Science is the marvel of the present world and modern technologies are an application of science to fulfill man’s long-cherished dreams to control and manipulate the forces of nature for his relevance. But at the same time, it is also very true that the blessings of science depend upon...
Topic: Technology
Words: 557
Pages: 2
Tech companies around the world try to outdo one another in coming up with new technologies. For that reason, these companies set aside a large share of their revenue for research and development (R&D). Startups and established organizations also get financial support from governments and NGOs, which helps in advancing...
Topic: Google
Words: 3027
Pages: 10
Introduction: Facts of the case On February 06, 2014, Ioan Leusca and Dezso Gyapias were charged in a U.S. Federal Court for stealing customer data from automated teller machines (ATMs). The two men had used data acquired from the ATMs to steal from bank customers in Connecticut, New Jersey and...
Topic: Computers
Words: 1682
Pages: 6
The issue touches on the ethics and legality of OSHA to change the levels allowed for benzene exposure in the workplace after the publication of a new report that reveals the number of deaths caused in places where the level of benzene was above 10ppm yet the required amount was...
Topic: Ethics
Words: 875
Pages: 3
All the research journals included in this study, claim that integrated management of information is used across most organizations. Such organizations engage in manufacturing and other services related to management of customer relations. A number of journals indicate that when the process is automated, it uses ERP systems that are...
Topic: Tech & Engineering
Words: 596
Pages: 2
Introduction In the context of public construction projects in Abuja Nigeria, project success can only be realized when stakeholder performance is evaluated against a performance evaluation framework. A performance evaluation framework provides well established and evaluated standard measures against which the performance of project stakeholders can be measured to evaluate...
Topic: Construction
Words: 7116
Pages: 27
Introduction In the 21st century, the technological environment is under influence of high degree of robustness (Barry, Atul & Arun 1). This has had a great impact on various sectors of the economy. Amongst the technological sectors that have undergone revolution with a high magnitude, is the information communication technology...
Topic: Evolution
Words: 1515
Pages: 5
Introduction The past few decades have witnessed a dramatic increase in the number of internet users. This upward trend has been accompanied by an almost parallel increase in the process of streaming, which is a data transferring technique which enables users to process data continuously without interruptions in the form...
Topic: Internet
Words: 2218
Pages: 8
Due to globalization, there is greater demand for electricity, as most of the productive activities require energy power. Globalization has brought people, institutions, and governments of various nations together. Through globalization, international trade and capital investments have been conducted internationally through the help of information technology (Ehrfeld 210). The interaction...
Topic: Energy
Words: 1434
Pages: 5
What is Finite element analysis via (FLAC)? And how is it done? Finite element analysis (FEA) could run in 2D or 3D and is used for geotechnical applications in the determination of tunnels, deep foundations, slope stability, seepage analysis, soil structural analysis, and capacity for earth retaining structures (Lee, Y.S....
Topic: Tech & Engineering
Words: 7500
Pages: 27
Introduction The Xyz Company is a business organization offering its clients textile products and services within the major category of textile industries. In XYZ organization, communication is a very crucial activity for the growth and development of the company. Since the inception of xyz, communication has been a matter of...
Topic: Tech & Engineering
Words: 1556
Pages: 5
The prevalence of digital technologies impacts the ways in which people think. Numerous digital devices, such as cell phones, provide easy distractions that adversely affect the capacity for meaningful contemplation. Overall, technologies have a negative effect on attention span and the ability for prolonged reflection. There is a growing concern...
Topic: Tech & Engineering
Words: 571
Pages: 2
Introduction Contemporary computing and Information Technology has seen the surge of various forms networking projects to provide especially the cyber landscape with highly advanced features that its infrastructure have not been naturally supporting. Critical challenges in the aspects of naming, addressing as well as mobility and security among other aspects...
Topic: Tech & Engineering
Words: 2664
Pages: 10
Energy harvesting can be described as a process of deriving energy from external sources, such as the sun, thermal power, and the wind. This method of capturing and storing energy is considered safe for the environment, and therefore, is a promising innovation. The energy harvesting systems are the technology used...
Topic: Energy
Words: 594
Pages: 2
Introduction Verizon is a telecommunication company in America providing services for wired and wireless communications beads on third-generation technology (Verizon, 2011a). The organization is innovative in the telecommunication sector and it provides video and broadband communications and other modes of entertainment through an advanced fiber-optic network. The organization is committed...
Topic: Tech & Engineering
Words: 1566
Pages: 6
Bogdane, R., Gorbacovs, O., Sestakovs, V., & Arandas, I. (2019). Development of a model for assessing the level of flight safety in an airline using concept of risk. Procedia Computer Science, 149, 365-374. The authors consider the current state of the SMS in aviation, suggesting general approaches such as a...
Topic: Aviation
Words: 1515
Pages: 6
Introduction Light-emitting diode, usually called LED, is used in a variety of electrical devices They send out signals from remote controls, figure out the numbers on digital clocks, signal you when your electrical devices are turned on, and lights up watches. When put together, they can form large pictures on...
Topic: Tech & Engineering
Words: 765
Pages: 3
Introduction The Association of Computer Machinery (ACM) code consists of 24 imperatives that are formulated as statements of personal responsibility. It comprises most of the issues that professionals are likely to encounter. The ACM code outlines how software engineers should conduct themselves ethically in their profession, and while relating to...
Topic: Computers
Words: 688
Pages: 2
The foremost thesis presented by these authors can be formulated as follows: the way in which codes of ethics help to advance the cause of an organization is not as much concerned with promoting the freedom of innovation, as it is concerned with controlling the actions of the employees. According...
Topic: Ethics
Words: 1109
Pages: 4
Encryption The security of data and information of the B manufacturing is paramount. The computer network represents one area that is vulnerable to security compromise, which might be detrimental to the prosperity of the company. Therefore, it is would be useful to encrypt data or information Schneier, 2001) that is...
Topic: Manufacturing
Words: 1288
Pages: 6
Introduction A microprocessor, commonly referred to as the Central Processing Unit (CPU), a central place where all data processing is done, is a gadget that distinguishes only binary code as numbers and ascertains basing on the orders by employing assemblage languages. This piece of writing is a detailed explanation of...
Topic: Tech & Engineering
Words: 1692
Pages: 8
Institutions of higher learning are increasingly using technology to aid in the learning process. However, this vital resource is prone to constant failures that slow down the learning process. In addressing this problem, Hitch (2002) and Wepner (2004), present similar and diverse ways of dealing with this predicament. Hitch (2002,...
Topic: Tech & Engineering
Words: 587
Pages: 2
Executive Summary Communication utilising the computer technology has been in use for several years with private individuals taking advantage of it. People who want to remain in touch with their families and friends use it in what is called social network outfits such as Facebook, MySpace, and Friendster. Other forms...
Topic: Computers
Words: 1516
Pages: 6
Introduction Social networks have been having privacy issues; in the case of Beacon and Facebook, Facebook had made it possible for people to share their private life with others using Beacon; the launch had been done in December 2007. When the program was launched, it seemed to facilitate business and...
Topic: Ethics
Words: 600
Pages: 2
Abstract This research paper’s major purpose is to discuss and research accessibility issues in relation to websites. The paper questions whether enough is being done to make websites suitable for people with disabilities and from that look at what could be done to improve the area going forward. Do individuals/...
Topic: Technology
Words: 3706
Pages: 13
Airport Operator Security Responsibilities The business of securing a commercial airport is, ideally, a shared responsibility between the airport operator and the Transportation Security Administration (TSA). Before the September 11 attack, every aspect of airport security was the responsibility of the airport operator, except for passenger screening. Since, September 11,...
Topic: Airport
Words: 596
Pages: 2
Background The process of playing video games has always been linked to the hypothesis that recurrent displays of gore and violence have a negative influence on children and their cognitive and learning development. Nevertheless, the number of reviews that support an opposite idea grows on a daily basis, with the...
Topic: Tech & Engineering
Words: 1149
Pages: 4
Literature review Mobile ad hoc networks are typified by wireless multi-hop channels that are connected to mobile nodes, which “do not rely on a pre-existing infrastructure [1]”. In the recent past, the field of mobile ad hoc networking has attracted a great deal of attention from many scholars as a...
Topic: Tech & Engineering
Words: 1379
Pages: 5
Encryption refers to a system that programs a plain readable text into a non-readable status for security purposes. The sender uses an encryption system to send the data, such that the receiver will have to use a key to retrieve the data to a readable form again. The major use...
Topic: Encryption
Words: 1162
Pages: 4
Summary Within the last two years, a series of events have happened that are characterized with internet hacking. Some of these activities include spying on google documents, Western companies, spying on Iran’s nuclear sites using Israeli created Stuxnet and spying on US secret cables by wikkiliks. Cybersecurity laws in the...
Topic: Cybersecurity
Words: 2037
Pages: 7
Introduction Online threats remain a reality for today’s businesses, especially those relying on the internet. Active and passive attack incidents are escalating every day and network administrators are having a daunting task of detecting, controlling or minimizing the effects of such attacks. Stewart, Tittel and Chapple concur in that one...
Topic: Tech & Engineering
Words: 1388
Pages: 5
Technologies have become an integral part of modern life. Digitalization could be noticed in medicine, building, and transportation, to name but a few areas affected by this process. Still, the implementation of new technological facilities and ways of schooling based on them is a highly disputable topic. In the present...
Topic: Tech & Engineering
Words: 5790
Pages: 21
Introduction Modern education experiences an influx of innovations in the manner of conveying information. The advancements of technology have allowed using the Internet for distance learning. However, to ensure the adequate efficiency of online learning, appropriate teaching strategies should be implemented. The recent pandemic has restricted many traditional venues for...
Topic: Teaching
Words: 1096
Pages: 4
Introduction Jet fuel refers to a form of aviation fuel, made up of a mixture of a great amount of various hydrocarbons, which is manufactured for use by aircrafts. It is crucial that the fuel used in a jet be of the required quality because contaminants can be detrimental not...
Topic: Aviation
Words: 866
Pages: 3
Computer trading in the stock exchange market has come to replace floor trading which is much slower. Orders are currently being processed much faster and the system is deemed to be more efficient. This system is observed to respond in milliseconds as compared to a slower rate if it were...
Topic: Computers
Words: 554
Pages: 2
Introduction Processes involving mixing have been associated with chemical-manufacture processes often and have been known to be very instrumental to successes recorded in operating combustion-driven systems. Presently, several computational-fluid-dynamics (CFDs) who are engaged with processing chemicals in industries have to be capable of adopting the usage of simulations for validating...
Topic: Vehicles
Words: 1079
Pages: 4
Introduction Boeing is currently one of the leading manufacturers of aircraft, satellites, rockets, rotorcraft and missiles in the world today. Companies in the aviation industry can also hire or lease airplanes from this organisation. This corporation’s diversification strategy and business model explain why it continues to compete directly with Airbus....
Topic: Crisis Management
Words: 2223
Pages: 8
Business Intelligence is typically a broad grouping or category of diverse applications and technologies allied to gathering, analyzing, storing as well as offering access to essential data to aid the enterprise end users makes sound business verdicts. Hence, BI aspects encompass such features as query, reporting, decision support systems, online...
Topic: Business Intelligence
Words: 606
Pages: 2
Introduction This report provides information regarding the Resource Scheduling project. The Resource Scheduling project is useful for a consultant company that provides resources of different types to various companies for a particular duration. An example of a company that would require this kind of software is an IT consultant company....
Topic: Software
Words: 4129
Pages: 15
Multihoming is the process of configuring multiple network interfaces or IP addresses on a single computer. In means having as many internet roots assigned to an IP network as possible. This strategy is increasingly becoming popular in many companies as a technique to increase reliability of network applications. Although maximum...
Topic: Infrastructure
Words: 947
Pages: 5
In the given magazine article, I would like to provide a simpler and plainer explanation of artificial neural networks to the general public by describing their current state of development. The target audience is comprised of individuals who are not educated and trained in the specified field, but willing to...
Topic: Tech & Engineering
Words: 859
Pages: 3
Response 1 I agree with Danielle on the topic of using visual media, such as animations and images, in the educational process. A teacher must implement this method of conducting knowledge when interacting with younger generations. Barry et al. (2015) state that students “are willing to merge their online presence...
Topic: Tech & Engineering
Words: 296
Pages: 1
Calibration is an important practice that ensures instruments meet their desired standards of operation. To make sure that this obligation is met, standardization bodies have to be set up to check conformity and compliance with the set standards. Therefore, the role of calibration goes hand in hand with the duty...
Topic: Tech & Engineering
Words: 779
Pages: 3
Introduction Liability is the responsibility that is borne by a party. It is a common term in the insurance business. Aviation product liability deals with the responsibility, mostly financial, that is borne by a party as a result of injury or damage resulting from the products that are used in...
Topic: Aviation
Words: 2563
Pages: 9
Introduction The purpose of this point paper is to explain the importance of implementing cybersecurity strategies for healthcare organizations that currently adopt information technologies based on the case of ransomware attacks. Our intention is to sell the technological tools for telemedicine services, as well as provide guidance on the ways...
Topic: Cybersecurity
Words: 665
Pages: 2
Technology is transforming many fields of study by introducing new tools and possibilities for people to communicate, collect data, and use it to test hypotheses. Business administration is not an exception, with more non-technology oriented companies adopting artificial intelligence (AI). This paper will examine how artificial AI is transforming business...
Topic: Artificial Intelligence
Words: 839
Pages: 3
Performance requirements are important to consider when developing a solution. It is unacceptable to have a web service that takes several seconds to reply to a simple request. Therefore, the developer should consider the available methods of improving the performance of their code. Chapter 12 discusses parallel programming, which is...
Topic: Programming
Words: 1106
Pages: 4
Introduction The objective of the essay is to give a brief account of the recent technologies with their respective architectures that can be used in the upgrade of an automobile computer system which enables home system management, or feature upgrades with the onboard system. The important software practices and techniques...
Topic: Management
Words: 536
Pages: 2
Introduction Security is an issue of major concern to society. Increased cases of insecurity the world over have motivated creativity in crime prevention. CCTV and Biometric technology are some of the innovative applications in crime prevention technology in use today. In spite of the popularity of these technologies, there has...
Topic: Ethics
Words: 1827
Pages: 6
In the automated world that is highly dependent on the Internet, it is becoming easier to access personal information. Hackers use sophisticated techniques to breach the systems of big industrial firms and impose threats on businesses. The estimated financial loss for companies for 2015-2016 caused by cybercrimes accounts for about...
Topic: Tech & Engineering
Words: 638
Pages: 2
Radio Frequency Identification (RFID) is a currently accessible technology that makes auto-identification of different objects possible. In other words, it is a system, also known as Auto-ID, that relies on the exchange of data without contact communication. As it comes from its name, the technology works on radio frequency, where...
Topic: Radio
Words: 393
Pages: 1
Introduction Today, the world passes through the hard times because of the pandemic of coronavirus that affects all spheres of human activity. COVID-19, its extremely virulent nature, and the absence of vaccine preconditioned the need for severe restrictive measures to avoid multiple contacts between people and stop the spread of...
Topic: Airlines
Words: 1967
Pages: 7
The process of engineering of software is one that requires a lot of knowledge and includes the process of gathering, designing, actual development, testing for functionality, use and maintenance. It is rear to find a team which constitutes of members who have all the required knowledge to meet the requirements...
Topic: Agile Project Management
Words: 884
Pages: 3
Globalization and advancement in technology has changed the corporate world as companies are pressurized to go digital. For instance, businesses transactions are being conducted over the internet alongside other digital platforms (Cross & Shinder 96). This has led to a growing outcry in the corporate world owing to the rise...
Topic: Hacking
Words: 1800
Pages: 7
Whether one should purchase or build an information system (IS) is a decision that requires specialized expertise to make. For the upper-management, the outcome of both decisions may be the same, but the cost, risk time and labor requirement may differ greatly. Furthermore, the problem for which system acquisition is...
Topic: Tech & Engineering
Words: 224
Pages: 1
Introduction Helpdesk is a company’s technical link meant to avail support to the end users. Today, most firms consider the helpdesk as one of the integral part of a management due to its responsibilities to deliver support services, whenever a client or employee makes an enquiry or an urgent call...
Topic: Tech & Engineering
Words: 863
Pages: 3
Introduction The iPhone is arguably one of the most competitive smartphone brands in the world today. The producing company, Apple, has within the past 13 years designed and delivered superior phones to different customers across the globe. Within this period, the technology giant has succeeded in releasing and marketing a...
Topic: Apple
Words: 832
Pages: 3
Introduction Artificial Intelligence has become a part of the ordinary life of a human in the 21st century. People buy smart houses, cars that drive on their own, and computers that can solve some problems faster than a person. It is claimed that AI has affected many spheres, including the...
Topic: Artificial Intelligence
Words: 376
Pages: 1
Introduction Modern human civilization is built on and continues to be principally dependent on large quantities of energy to sustain it. While fossil fuels and hydroelectric plants have been the primary source of energy for men since the 19th century, these traditional sources have been stretched to the limit and...
Topic: Tech & Engineering
Words: 1667
Pages: 6
Introduction One of the epic inventions related to computers is the internet which has led to a transformation of the world in as far as communication is concerned. The internet via websites presents a crucial front for the achievement of the objectives of most organizations and individuals. As such, it...
Topic: Twitter
Words: 986
Pages: 3
The Rationale Industrial-scale desalination plants cannot be scaled down for use in remote areas due to the complexity of the technology. Therefore, the need for scaled-down desalination plants to meet specific consumer needs for clean water particularly in remote desert and semi-desert areas cannot be overemphasized. That reinforces the need...
Topic: Alternative Energy
Words: 2841
Pages: 10
Introduction Software engineering is the activity aimed at developing software programmes and applications appropriate for those programmes with regard to compatibility and usability of programmes by different audience including software developers and ordinary customers/users that purchase and upload these applications for personal use only. Every time a specific programme should...
Topic: Agile Project Management
Words: 1655
Pages: 6
Introduction The growth of human knowledge in the field of Artificial Intelligence (AI) has led to advancement in the development and deployment of unmanned autonomous systems. There are multiple examples of unmanned autonomous systems and perform a wide range of activities depending on the medium of operation. Some examples include...
Topic: Artificial Intelligence
Words: 1374
Pages: 5
The initiative regarding the production of an unmanned drone for collecting data seems to be a profitable endeavor. However, there are specific issues that should be considered in this direction in order to ensure the correspondence of the project to the international regulations regarding information processing and storage (Lin et...
Topic: Tech & Engineering
Words: 1173
Pages: 4
John von Neumann was a great mathematician, known by his really significant contributions to the fields of economics, numerical analysis, and computer science. This person played a very important role in developing the study of computation and understanding of how effective and practical computers had to be and how the...
Topic: Architecture
Words: 2408
Pages: 8
Introduction Information technology and systems is the study of the designing, developing, supporting or the taking control (management) of the information that relates to computer systems. It revolves around and includes computer hardware and software applications. This encompasses the ability to control all activities electronically in an organisation. The system...
Topic: Information Technology
Words: 1623
Pages: 5
The article conveys the idea that the employee’s time spent on the Internet should be appropriately controlled for the company’s informational security (IS). Personal Internet use takes up 60-80 % of the time staff spends on websites not related to work. Time waste on personal activities is qualified as a...
Topic: Internet
Words: 347
Pages: 1
In order to successfully conduct a project, every involved side must know what to do, when to do, and what is the expected outcome. By expanding on the idea by giving it a rigorous structure for its realization, the success of such a design will be guaranteed. This paper aims...
Topic: Budget
Words: 449
Pages: 3
Introduction International Federation of Consulting Engineers or Federation Internationale Des Ingenieurs Conseils (FIDIC) according to French is a global professional body of engineers, which started in 1913. Belgium, Switzerland, and France are the three countries that came together and started FIDIC as an independent body of consulting engineers. The FIDIC...
Topic: Tech & Engineering
Words: 2646
Pages: 9
Introduction Technological innovations and social media have significantly influenced modern people’s social lives and many areas of human activity. These novelties have created the preconditions for new opportunities and conveniences, as well as habits and addictions. Excessive use of cell phones has become a significant concern among researchers and health...
Topic: Addiction
Words: 1706
Pages: 6
Making protocols at layer 2 or otherwise Spanning Tree Protocol represents a great percent of attacks originating within the organisation. Using Ethernet PAUSE frames alongside STP makes networks more vulnerable to attacks. Most STP security threat issues include; becoming root, changing STP timers, modifying STP active topology, generating persistent and...
Topic: Tech & Engineering
Words: 1022
Pages: 5
Executive Summary This report highlights the underlying reasons for the 2013 UPS flight 1354 crash at Birmingham-Shuttlesworth International Airport, Alabama. The accident happened when the flight crew failed to manage the aircraft during descent. It fell short of the runway during a non-precision landing approach and crashed at the end...
Topic: Aviation Accident
Words: 1654
Pages: 6
The best ideal module for the design effort for independent control is writing an intricate algorithm with the capacity to effectively direct the Unmanned Aerial Vehicle (UAV) past barriers. The component will autonomously guide the UAV through a pre-planned track according to the mission. The current project uses a limited...
Topic: Tech & Engineering
Words: 554
Pages: 2
Introduction It has always been a problem determining the number of speakers required for a quality sound system especially in cases where speech separation of an individual speaker from a multispeaker signal is required. In this regard, various theoretical approaches such as the subjective threshold hypothesis for the detection of...
Topic: Tech & Engineering
Words: 5145
Pages: 19
Introduction Information and Communication Technology (ICT) is a field that uses developing technologies to allow users to participate in a world that is changing rapidly. Through ICT, individuals, businesses, and corporations store, retrieve, manipulate, transmit and receive digital information. This is made possible by the wide range of digital communication...
Topic: Technology
Words: 2543
Pages: 9
Net neutrality regulations are critical to the openness and innovation of the Internet. It is a concept that has been built into the creation of the Internet since its foundations almost 30 years ago. Without net neutrality, major internet service providers (ISP) the likes of Verizon and Comcast would be...
Topic: Internet
Words: 567
Pages: 2
Introduction In the twenty-first century, technological progress is concentrated in the field of semi-automatic and automatic innovations. It can be seen everywhere in both the private and military sectors. This is why it is essential to know the latest advances in this scientific area. This paper aims to review academic...
Topic: Tech & Engineering
Words: 553
Pages: 2
Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services and to meet cost, quality, and schedule requirements....
Topic: Tech & Engineering
Words: 2478
Pages: 9
Abstract VHF systems are the most reliable alternative for avionic communication systems. This is generally explained by the high reliability and selectivity of VHF radio transmission. The principles and rules of VHF transmission are helpful for creating safe navigation, operation, control and other systems. VHF Communication The purposes of VHF...
Topic: Tech & Engineering
Words: 690
Pages: 3
Executive Summary In the engineering of software, the software methodology applied plays a significant role in the final product of the process. For example, in a traditional linear model software is created following a set of steps and changes are often difficult and costly to implement. The pressure created by...
Topic: Programming
Words: 6259
Pages: 23
Introduction Artificial Intelligence is a broad-based division of computer science specializing in the development of intelligent machines with the ability to perform tasks requiring human intellect. It is a science with many disciplines, approaches, and programmable functions and a capability to learn, reason, solve problems, and make decisions. This paper...
Topic: Intelligence
Words: 1120
Pages: 4
Introduction A disaster is a sudden catastrophic event that occurs and hinders the normal operation of a business or organization such as efficient processing of information technology systems that support business functions. Many organizations and businesses invest a lot of resources towards various infrastructures to ensure they remain afloat in...
Topic: Disaster
Words: 1151
Pages: 4
Introduction In the current world of technology, the internet and computing are increasingly finding use in daily activities. Together with the need to access and share information, networking has come to be a very important instrument to achieve this purpose. Networking can be described as the practice of connecting computing...
Topic: Tech & Engineering
Words: 3387
Pages: 12
A database is computerized system of information with the ability to search and process data (Vermaat et al. 556). Data is the collection of texts, images, audio, video, and other items presented in the form of records in the database. Data along with a database management system and applications are...
Topic: Data Management
Words: 566
Pages: 2
Java offers three basic types of loops: FOR, WHILE, and DO…WHILE. Their fundamental function is executing a block of code repeatedly, based on a Boolean condition (Farrell, 2014). However, they differ in how they evaluate their conditional expression (Farrell, 2014). A WHILE loop evaluates its conditional expression before executing, therefore,...
Topic: Programming
Words: 283
Pages: 1
Audience The genre selected for the present analysis is a knowledge base article. The chosen source is a support page for Google’s Analytics application (“How can we help you?” n.d.). The intended audience is represented by the users of the Google Analytics app, which means the people who want to...
Topic: Google
Words: 1515
Pages: 6
The contemporary world is characterized by an increased use of wireless communication. Such communication entails the use of smart phones and iPods in our daily communications. The use of wireless communication has become very essential which has greatly enhanced sharing of information greatly. Security of the information transmitted over wireless...
Topic: Radio
Words: 2276
Pages: 8
The Boeing Company, similar to other large aircraft manufacturers, is experiencing an economic decline due to the combination of recent events. Examining the company’s financial performance from 2015 to 2019, one can see a gradual increase in revenue from 2015 to 2018, followed by a steep decrease between 2018 and...
Topic: Boeing
Words: 640
Pages: 2
Cyber security and information assurance refer to steps taken to protect networks and computer systems from being disrupted as well as preventing unauthorized access (Sara, 2008). Cyber security and information assurance aim at providing three things: integrity, confidentiality and availability (Knapp, 2009). Integrity is enhanced through ensuring that users are...
Topic: Tech & Engineering
Words: 259
Pages: 2
Introduction There has been an increase in the use of the Unified Modeling Language in many contexts; it is used in application domain, methodology, and platform. For this reason, there has been more concern for customized consistency. There has been little support for customizations that are specific safe for the...
Topic: Management
Words: 4257
Pages: 15
Introduction In many engineering applications, there is a need for efficiency. Power management is an elemental strategy for improving efficiency. The idea is to reduce power consumption to the least possible value while ensuring performance is okay. In the design of digital logic, power scaling is a major way to...
Topic: Energy
Words: 934
Pages: 2
Introduction Unmanned vehicles have grown in popularity, especially because of their versatility in use. These autonomous vehicles are used in multiple areas such as monitoring disaster areas, an inspection of projects and infrastructure, military operations, and spraying of agricultural chemicals, among others. The unmanned vehicles are also equipped with cameras,...
Topic: Tech & Engineering
Words: 1399
Pages: 5
The growing concerns about the emerging threats to security mean that intuitions have to upgrade their security system to include intelligence gathering system based on information technology. In this hospital security as well as information technology officers concerned with security issues do want to upgrade and include intelligent building IT...
Topic: Intelligence
Words: 840
Pages: 3
Introduction Globalization is a process beneficial in numerous ways as it supports economic growth and assists in accessing and creating opportunities – the Internet is possibly both one of its most visible facets and a driving force. Web security is one of the issues on which the effects of globalization...
Topic: Globalization
Words: 1999
Pages: 7
Introduction A planned change is a change executed systematically in tandem with organization’s future goals and expectations. It ensures an organization moves steadily in its processes of implementing a given solution. In IT project management, change refers to project management process, where the perceived change facets to a project are...
Topic: Success
Words: 1740
Pages: 5
Abstract This paper investigates the number of Clusters in K-Means Clustering and analyzes the methods used in numbering. The purpose is to obtain the correct number of clusters in a given document with the least number of errors and achieve an accurate number of clusters. A comparison of the different...
Topic: Tech & Engineering
Words: 2475
Pages: 9
Introduction Framers Company is in the process of launching a new product. One of the objectives is to provide customers with low prices within a limited time. The company also aims at producing a product that is unique in the market and one that will fulfill the needs of the...
Topic: Information Technology
Words: 862
Pages: 3
Introduction For a computer to operate, it requires an operating system. Windows XP constitutes one of the many operating systems whose manufacturer is Microsoft Corporation. Windows XP is applicable in a variety of computers ranging from laptops, personal computers and desktops. The emergence of windows XP in the market from...
Topic: Tech & Engineering
Words: 1470
Pages: 5
Internet Privacy has become one of the most commonplace issues in contemporary society. Even though internet connectivity enables many people to interact and share information, privacy issues have remained a big problem for Internet users. Internet-related crimes, such as fraud and cyberstalking, have been on the verge of increasing, hence...
Topic: Internet
Words: 541
Pages: 4
EMC EMC was first created in 1979 before starting as an information systems infrastructure, dealing in both software and hardware in 1981. With several partnerships, acquisitions, and a series of new research and development projects in various countries including Singapore, and tapping on cheap Chinese labor, the company grew further...
Topic: Management
Words: 1560
Pages: 5
Introduction Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of the internet. These two entities have virtually transformed the world as far as information processing and communication is concerned. Organizations have extensively employed the use of computer...
Topic: Success
Words: 837
Pages: 3
Summary Industrial plants in the United States are unlikely to stop using fossil fuels because the amount of power acquired from other sources is still inadequate. The fact that wind and solar photovoltaic (PV) energy are in short supply has compelled environmentally-conscious organizations to seek different means of mitigating the...
Topic: Electricity
Words: 461
Pages: 2
Introduction The rapid advancement in the use of information technology has also resulted in increased usage of databases for the storage of Information. Newer technologies such as data mining use the stored data in such a way that not only permits quick access to deeply buried information but they also...
Topic: Tech & Engineering
Words: 788
Pages: 2
Project Scope The Erie Company Department of Public Works — Division of Highways seeks proposals from consultants for professional engineering services for design, construction, administration, and construction inspection services for the Dona Street extension. The extension will be located west of NYS Route 5 for a distance of approximately 1,550...
Topic: Tech & Engineering
Words: 605
Pages: 2
Introduction Database Management Systems (DBMS) is a major requirement in any organizational setup, and one of the most popular DBMS is the Relational Database Management Systems (RDBMS). It is formatively one of the most significant landmarks made towards understanding the hypothetical and technological framework of a database. Although it has...
Topic: Data Management
Words: 1358
Pages: 4
All spheres of modern life are influenced by the technical innovations, developed for the last ten years. Medical care is not the exception. Different types of medical equipment are used during curing for many years. The innovations in the educational sphere have come later. Today the software and other innovations...
Topic: Nursing
Words: 607
Pages: 2
Introduction In the book by Shneiderman and Plaisant (2010), designing Human-Computer Interaction (HCI) is the science of studying and structuring interaction between users and the devices or machines such as computers. It’s a process that requires proper planning, incorporates numerous fields of disciplines such as the study of computer science,...
Topic: Computers
Words: 3787
Pages: 14
Performance evaluation of i/o workloads Flash-based solid state disks (SSD) is a performance based data storage technology that optimizes the use of flash-based technology to implement its data storage capabilities compared with mechanically available data storage technologies (Park & Shen, 1). Technically, the promise for better performance of the SSD...
Topic: Memory
Words: 2251
Pages: 8
Introduction This is the age of computers and computer based technologies. The increasing use of computers has made it essential to have the knowhow of computer related terminologies. This paper deals with the comparison of two operating systems which are Windows and Macintosh. Understanding a better operating system is quite...
Topic: Tech & Engineering
Words: 2943
Pages: 11
Introduction After many inventions or technology development, threats are also involved in many ways. New technologies give us latest types of crime which directly or indirectly harm us. Computer is the main source of the online data library. It not only gives us our required information, but when we download...
Topic: Cybercrime
Words: 9208
Pages: 40
Introduction The thought of fully unmanned ground vehicles fascinates everyone with an interest in robotics and automation technologies. Governments, corporations, and individuals have been pursuing various technologies that could see the dream of self-driven robots taking over critical roles, such as warfare in rough terrains and dangerous environments. Emerging technologies...
Topic: Robots
Words: 615
Pages: 2
Conficker, which is also referred to as Downup, Downadup and Kido, is a worm that affects Microsoft Windows operating system which was discovered at first in November 2008. It checks for defects in the Windows software to designate computers and connect them into a virtual machine which can be dominated...
Topic: Microsoft
Words: 930
Pages: 3
Introduction Strategic planning is not a concept that is uniquely applied to the field of information technology. In modern times, every segment of life and every undertaking that is successful must utilize the advantages availed by strategic planning. To state simply, strategic planning is about the careful organization of the...
Topic: Strategic Planning
Words: 1984
Pages: 6
Introduction Information systems can bridge what was once an unbridgeable gap between service and a customer by making information available to previously unreachable populations. Current information technology can greatly assist service industries like hotel chains or airlines in making information readily available to previously unreachable populations. In most countries the...
Topic: Tech & Engineering
Words: 2389
Pages: 8
Abstract The world is going digital each day, hence Scientists and researchers are busy improving the old technology while subjecting business and technology into a new era of fourth generation digital technology. It all started from first generation, and then evolved to the second and third generation. At the start...
Topic: Tech & Engineering
Words: 2650
Pages: 10
Introduction Not so long ago, the concept of artificial intelligence (AI) was in the earliest stages of its conception and was only pondered over in science fiction. In fact, the alarmist trends in some parts of contemporary global society owe their existence to the early sci-fi novels addressing the ostensibly...
Topic: Artificial Intelligence
Words: 1653
Pages: 6
Since I began working, I have interacted with various types of system software. I have found it very interesting working on different types of BIOS and device firmware, operating systems, utility systems, and operating software. Over time, I have been able to set up several websites using different server operating...
Topic: Software
Words: 1230
Pages: 3
Introduction The software development industry is fast growing as user requirements change-requiring applications that can address these requirements. As the costs of development rises in developed countries, a new source of labour market is emerging to provide labour for development of such applications at reduced costs. This is achieved through...
Topic: Software
Words: 1100
Pages: 4
Cloud computing technology has become one of the fastest-growing areas of the IT market in recent years. Businesses choose cloud services to reduce costs, improve internal interaction, streamline operations, help with faster decision-making, and ensure more flexibility. When choosing appropriate cloud technology, companies need to consider cloud deployment models and...
Topic: Tech & Engineering
Words: 339
Pages: 1
Introduction This topic involves studying the effects of the continued use of digital media on the human brain. The issue presented is becoming more urgent every year since the usage of digital technologies and social networks has an increasing impact on human life. Almost half of the world’s population uses...
Topic: Brain
Words: 1725
Pages: 6
Technology has been evolving at a very fast rate in the 21st century. Previously, it took several days or weeks for the news or messages to reach people in remote places. However, technology has brought a revolution in the way people communicate and transact businesses. The medical profession has benefited...
Topic: Communication
Words: 567
Pages: 2
A fire that occurred on June 18, 2007, in Charleston, South Carolina, was one of the most tragic events that lead to mass deaths of firefighters in the United States. Nine people died that day; they were all experienced firefighters between the ages of 27 and 56. Even though several...
Topic: Tech & Engineering
Words: 547
Pages: 2
Execution of business processes in the 21st century has been faced with a lot of challenges like insecurity and conviviality. Due to this a lot of organizations have employed information technology mechanisms to protect their information infrastructure from being accessed by unauthorized persons and also to check authentication (Neumann, 5)....
Topic: Tech & Engineering
Words: 1209
Pages: 4
Introduction We have two different types of ethics. This is the professional ethics and the human ethics. Professional ethics include ethics of a professional person like a doctor, a software engineer etc. Human ethics are the ethics which enable one to live well with the society. Ethics is very important...
Topic: Ethics
Words: 1962
Pages: 7
Advantage of logic gates There are several advantages of logic gates on computer operations and performances. First, the logic gates are faster, consume much less power, and are much smaller in size ( Nationmaster 1). The logic gates are cascadable. This gives the advantage of enabling the circuit construction, where...
Topic: Computers
Words: 1545
Pages: 6
In Java, statements can be executed conditionally through IF…ELSE and SWITCH structures. The IF statement evaluates a Boolean expression; if true, an associated block of code is executed; otherwise, the following ELSE block is executed (Farrell, 2014). Common mistakes when writing an IF…ELSE statements include errors in syntax, such as...
Topic: Tech & Engineering
Words: 294
Pages: 1
Description Hacktivism is the use of technology or computer system for social or political motivations or to promote a certain agenda. One prominent example of hacktivism was Aaron Swartz who broke into the MITs computer system in 2013 and downloaded thousands of academic journals and articles, later published online as...
Topic: Terrorism
Words: 415
Pages: 1
Quotation: In order to show the magnitude of changes, McCloskey (2016) writes that “People moved from tents and mud huts to split-levels and city condominiums, from waterborne diseases to 80-year life spans, from ignorance to literacy” (p. 499). The technique that appealed to me: After giving the statistics numbers regarding...
Topic: Tech & Engineering
Words: 282
Pages: 1
Abstract Data breaches pose the most significant threat to many companies, especially those doing business in the digital space. In this regard, Intrusion Detection Systems draw special attention from scholars, IT experts, and business leaders since their functions are directly related to monitoring network traffic and identifying malicious activity or...
Topic: Tech & Engineering
Words: 1073
Pages: 3
Introduction Cybersecurity takes up an indispensable place in the security management of each company. Frequently the reasons for the system hacking become non-executive directors, who lack knowledge on the topic of cybersecurity, therefore possessing high risks to the enterprise. Luckily, many preventive and defensive strategies are created in order to...
Topic: Cybersecurity
Words: 1302
Pages: 4
Depending on the objective, two types of path planning and simulation of unmanned underwater device trajectories should be allocated. These are the path from one point to the other and the complete grid coverage of the space (Panda et al., 2020). The initial analysis of both scenarios gives a vivid...
Topic: Vehicles
Words: 368
Pages: 1
Abstract Various countries depending on their sizes adopt suitable information systems that help make sensible managerial frameworks. These information systems are vital in ensuring efficiency within the various organizations in respective through proper storage and access of data. As a result, gains are made both in terms of country reputation...
Topic: Cybercrime
Words: 6897
Pages: 25
Introduction Network design refers to a process that involves topological design, synthesis of network, and network realization. The main reason behind network design is to ensure that the business acquires a network that meets its business model. Many organizations are now focusing their attention towards designing information system network that...
Topic: Tech & Engineering
Words: 765
Pages: 2