Introduction This is the age of computers and computer based technologies. The increasing use of computers has made it essential to have the knowhow of computer related terminologies. This paper deals with the comparison of two operating systems which are Windows and Macintosh. Understanding a better operating system is quite...
Topic: Tech & Engineering
Words: 2943
Pages: 11
Introduction After many inventions or technology development, threats are also involved in many ways. New technologies give us latest types of crime which directly or indirectly harm us. Computer is the main source of the online data library. It not only gives us our required information, but when we download...
Topic: Cybercrime
Words: 9208
Pages: 40
Introduction The thought of fully unmanned ground vehicles fascinates everyone with an interest in robotics and automation technologies. Governments, corporations, and individuals have been pursuing various technologies that could see the dream of self-driven robots taking over critical roles, such as warfare in rough terrains and dangerous environments. Emerging technologies...
Topic: Robots
Words: 615
Pages: 2
Conficker, which is also referred to as Downup, Downadup and Kido, is a worm that affects Microsoft Windows operating system which was discovered at first in November 2008. It checks for defects in the Windows software to designate computers and connect them into a virtual machine which can be dominated...
Topic: Microsoft
Words: 930
Pages: 3
Introduction Strategic planning is not a concept that is uniquely applied to the field of information technology. In modern times, every segment of life and every undertaking that is successful must utilize the advantages availed by strategic planning. To state simply, strategic planning is about the careful organization of the...
Topic: Strategic Planning
Words: 1984
Pages: 6
Introduction Information systems can bridge what was once an unbridgeable gap between service and a customer by making information available to previously unreachable populations. Current information technology can greatly assist service industries like hotel chains or airlines in making information readily available to previously unreachable populations. In most countries the...
Topic: Tech & Engineering
Words: 2389
Pages: 8
Abstract The world is going digital each day, hence Scientists and researchers are busy improving the old technology while subjecting business and technology into a new era of fourth generation digital technology. It all started from first generation, and then evolved to the second and third generation. At the start...
Topic: Tech & Engineering
Words: 2650
Pages: 10
Introduction Not so long ago, the concept of artificial intelligence (AI) was in the earliest stages of its conception and was only pondered over in science fiction. In fact, the alarmist trends in some parts of contemporary global society owe their existence to the early sci-fi novels addressing the ostensibly...
Topic: Artificial Intelligence
Words: 1653
Pages: 6
Since I began working, I have interacted with various types of system software. I have found it very interesting working on different types of BIOS and device firmware, operating systems, utility systems, and operating software. Over time, I have been able to set up several websites using different server operating...
Topic: Software
Words: 1230
Pages: 3
Introduction The software development industry is fast growing as user requirements change-requiring applications that can address these requirements. As the costs of development rises in developed countries, a new source of labour market is emerging to provide labour for development of such applications at reduced costs. This is achieved through...
Topic: Software
Words: 1100
Pages: 4
Cloud computing technology has become one of the fastest-growing areas of the IT market in recent years. Businesses choose cloud services to reduce costs, improve internal interaction, streamline operations, help with faster decision-making, and ensure more flexibility. When choosing appropriate cloud technology, companies need to consider cloud deployment models and...
Topic: Tech & Engineering
Words: 339
Pages: 1
Technology has been evolving at a very fast rate in the 21st century. Previously, it took several days or weeks for the news or messages to reach people in remote places. However, technology has brought a revolution in the way people communicate and transact businesses. The medical profession has benefited...
Topic: Communication
Words: 567
Pages: 2
A fire that occurred on June 18, 2007, in Charleston, South Carolina, was one of the most tragic events that lead to mass deaths of firefighters in the United States. Nine people died that day; they were all experienced firefighters between the ages of 27 and 56. Even though several...
Topic: Tech & Engineering
Words: 547
Pages: 2
Execution of business processes in the 21st century has been faced with a lot of challenges like insecurity and conviviality. Due to this a lot of organizations have employed information technology mechanisms to protect their information infrastructure from being accessed by unauthorized persons and also to check authentication (Neumann, 5)....
Topic: Tech & Engineering
Words: 1209
Pages: 4
Introduction We have two different types of ethics. This is the professional ethics and the human ethics. Professional ethics include ethics of a professional person like a doctor, a software engineer etc. Human ethics are the ethics which enable one to live well with the society. Ethics is very important...
Topic: Ethics
Words: 1962
Pages: 7
In Java, statements can be executed conditionally through IF…ELSE and SWITCH structures. The IF statement evaluates a Boolean expression; if true, an associated block of code is executed; otherwise, the following ELSE block is executed (Farrell, 2014). Common mistakes when writing an IF…ELSE statements include errors in syntax, such as...
Topic: Tech & Engineering
Words: 294
Pages: 1
Description Hacktivism is the use of technology or computer system for social or political motivations or to promote a certain agenda. One prominent example of hacktivism was Aaron Swartz who broke into the MITs computer system in 2013 and downloaded thousands of academic journals and articles, later published online as...
Topic: Terrorism
Words: 415
Pages: 1
Quotation: In order to show the magnitude of changes, McCloskey (2016) writes that “People moved from tents and mud huts to split-levels and city condominiums, from waterborne diseases to 80-year life spans, from ignorance to literacy” (p. 499). The technique that appealed to me: After giving the statistics numbers regarding...
Topic: Tech & Engineering
Words: 282
Pages: 1
Abstract Data breaches pose the most significant threat to many companies, especially those doing business in the digital space. In this regard, Intrusion Detection Systems draw special attention from scholars, IT experts, and business leaders since their functions are directly related to monitoring network traffic and identifying malicious activity or...
Topic: Tech & Engineering
Words: 1073
Pages: 3
Introduction Cybersecurity takes up an indispensable place in the security management of each company. Frequently the reasons for the system hacking become non-executive directors, who lack knowledge on the topic of cybersecurity, therefore possessing high risks to the enterprise. Luckily, many preventive and defensive strategies are created in order to...
Topic: Cybersecurity
Words: 1302
Pages: 4
Depending on the objective, two types of path planning and simulation of unmanned underwater device trajectories should be allocated. These are the path from one point to the other and the complete grid coverage of the space (Panda et al., 2020). The initial analysis of both scenarios gives a vivid...
Topic: Vehicles
Words: 368
Pages: 1
Safety management has become an essential topic in aviation to better assess risks and prevent accidents. Poor risk management practices contribute mainly to aviation accidents, most of which are often catastrophic. This raises concerns about profound ways of managing risks following the established standards to make informed decisions. Pilots must...
Topic: Aviation
Words: 1105
Pages: 4
Introduction Network design refers to a process that involves topological design, synthesis of network, and network realization. The main reason behind network design is to ensure that the business acquires a network that meets its business model. Many organizations are now focusing their attention towards designing information system network that...
Topic: Tech & Engineering
Words: 765
Pages: 2
Venkatesh, V. C. (2007). Precision Engineering. New York: Tata McGraw-Hill. The idea of precision engineering is outlined in the book due to the concepts of multi-dimensional approach when talking about the industrial growth in post-industrial society. In this respect, special attention is grabbed in the book to precision machinery, as...
Topic: Tech & Engineering
Words: 1807
Pages: 6
The article researched, “Emerging Technologies Being Incorporated in the Fire Service”, discuses eight new devices developed for the Fire Service. It summarizes these new devices without detailed description, providing an overview of the ways new technology is being integrated into firefighting equipment. These devices include three solutions for monitoring a...
Topic: Tech & Engineering
Words: 367
Pages: 1
Top-down parsing was introduced in the 1970s, and it remains a widespread strategy that has also become the basis for newer and more sophisticated algorithms. The top-down strategy was preferred during an extended period of time due to its comparative simplicity, usability, and an opportunity to customize. As the term...
Topic: Computers
Words: 555
Pages: 2
Introduction In general telecommunication systems are the different ways in which the information is passed from one place to another covering a certain distance. The message passed may be verbal or written. The mode of communication used depends on several factors such as the urgency of the message, the magnitude...
Topic: Telecommunications
Words: 720
Pages: 2
Classes and objects are one of the key attributes in object-oriented programming (OOP). The general relation between the two can be described as “is-a”: a class describes a template for objects, while an object is a specific instance of a class (Farrell, 2014). The primary concept of this relationship is...
Topic: Programming
Words: 357
Pages: 1
Abstract The purpose of the following research paper is to define how various psychological factors influence motorcyclists’ behavior in terms of safety. Among the concepts discussed, the issues of helmet wearing and exceeding speed limits will be outlined. With the help of peer-reviewed studies on the matter, some motorcyclists’ behavioral...
Topic: Psychology
Words: 412
Pages: 1
Introduction This is an elaborate plan on data quality evaluation for GlaxoSmithKline plc (GSK). This is a multinational pharmaceutical company with headquarters in London. There are issues in master data management as a result of two firms merging in 2000; Glaxo Wellcome merged with SmithKline Beecham Company. These two companies...
Topic: Tech & Engineering
Words: 838
Pages: 3
Abstract The Seamus company is seeking a vendor on a hire basis to develop a technology-enhanced interactive learning solution to improve one of the processes. This paper will focus on process enhancements and learning modules. The proposed solution is a comprehensive mobile application that combines grammar exercises for curriculum reinforcement,...
Topic: Tech & Engineering
Words: 1541
Pages: 6
Introduction The poaching of various high-value, and often endangered wildlife is an immense conservation challenge in the contemporary environment. Conservational efforts of many African megafaunas are further hindered by a variety of socio-economical issues, including political instability, economic strife, and a highly evolving and expanding international market for illicit wildlife...
Topic: Tech & Engineering
Words: 2831
Pages: 10
Introduction Technological progress has skyrocketed over the past few decades, allowing for the simplification and enhancement of a variety of processes within every domain. Industry and agriculture are among the areas that have experienced a vast rise in effectiveness and performance quality due to the integration of new types of...
Topic: Agriculture
Words: 851
Pages: 3
Introduction Managing a project is one of the major challenges that one needs to face when performing in the contemporary business setting. Projects implemented in the telecommunications industry are, in turn, even more, challenging than others due to the additional need to focus on communication-related concerns and the assessment of...
Topic: Auditing
Words: 1175
Pages: 4
Introduction According to the UK drink driving statistics (2010), over 3000 people are either killed or seriously injured in accidents related to drink driving. The problem with alcohol is that the more an individual consumes, the more confident he or she gets and consequently the more risks he or she...
Topic: Tech & Engineering
Words: 1752
Pages: 8
Abstract Subsystems are evidence-based models for ensuring that competent individuals complete specific functions in a timely manner. In the identified organization, the proposed command, control, and communications (C3) framework will transform operations and guide leaders to identify new or initial technologies that have the potential to deliver positive results. The...
Topic: Communication
Words: 3819
Pages: 14
Noticing and Articulating the Problem The world is confronting an increasing flow of disinformation within cyberspace. Examples incorporate the spread of cyber-rumors by social media bots during French elections within the Macron Leaks attack or the partisan messages during Brexit in the United Kingdom. Thus, the growing threat of conspiracy...
Topic: Homeland Security
Words: 1015
Pages: 4
Introduction This paper investigates current trends in turning the brain waves into music, through surveying the literature on the methods of turning Electroencephalography (EEG) waves into Musical Instrument Digital Interface (MIDI) music. The effects of the music on the human body are well known and documented, where different types of...
Topic: Music
Words: 2181
Pages: 8
AI-powered technologies have been implemented in the retail sector for long decades, but a truly innovative robotics era is yet to come. From vending machines to a robot barista serving drinks, the use of automation devices corresponds to fast-changing market demands and aims to enhance customer experience and improve a...
Topic: Robots
Words: 363
Pages: 1
Introduction Biometrics is a security technology that is programmed in accordance of individuals’ body characteristics such as finger prints or eye retina to mention but a few. Its relevance is becoming an interesting topic in regards to computer and internet security. According to Bolle and Ratha (2004, p.6) the first...
Topic: Computers
Words: 1085
Pages: 4
Introduction The idea of human-machine communication has always been of interest to mankind. The recent technological developments prove that the use of specific low-end systems and EEG can allow recognizing unspoken speech and thus make direct communication without actually uttering words possible. In this respect, the impact of personal peculiarities...
Topic: Tech & Engineering
Words: 580
Pages: 2
Boeing faced the biggest blow in 1999 when airbus, their biggest competitor delivered more airplanes than Boeing. This was then followed by a shrank down of Boeing’s earnings and a consequent laying off of 9,300 employees out of the 126,000 employees that it had. During the gulf war, there was...
Topic: Boeing
Words: 813
Pages: 3
It seems reasonable to state that waging war has always been an expensive undertaking. What is more, with the flow of time, weapons, armory, and other military equipment – as well as expenses on army maintenance – have become pricier. It is not surprising that recent technical progress provides the...
Topic: Tech & Engineering
Words: 298
Pages: 1
Introduction The United States copyright law and the doctrine of fair use were enacted to reduce or prevent the use of someone’s copyrighted materials without their consent. Any person who needs to use or cite another person’s intellectual property must have due rights from the copyright owner. In case individual...
Topic: Tech & Engineering
Words: 1644
Pages: 6
Introduction At the beginning of the 21st century, information systems and information technology penetrated all spheres of life. Information systems make routine work fast and simple, and support complex operations and performance deficiencies. In dentistry, information systems support daily operations and simplify routine work and data storage facilities (Eaton and...
Topic: Tech & Engineering
Words: 1101
Pages: 4
The number of unmanned systems in the world is regularly increasing. Today, this diversity includes “self-managed” planes, vehicles, drones, seagoing ships, and spacecraft. Each designed device solves unique problems, hence the variety of interfaces for control and monitoring (Howard, 2013). There is no need to create machine functionality that will...
Topic: Tech & Engineering
Words: 404
Pages: 1
Introduction Communicating video content may take a variety of forms. These may include a point-to-point communication and broadcast method in addition to the multicast method. To communicate video efficiently in a fraction of the initial downloading time, streaming video is an important requirement. HTTP streaming Video HTTP streaming is an...
Topic: Tech & Engineering
Words: 553
Pages: 2
My understanding on data structures and algorithms goes mainly to the three books that I read as a beginner and continue to consult the books whenever I need guidance. Data Structures Using C by Aaron M. Tenenbaum Data Structures, Algorithms, and Program Style Using C by James F. Korsh Data...
Topic: Tech & Engineering
Words: 1096
Pages: 4
Introduction The article chosen for analysis was written by an Information Systems (IS) management professor with tremendous experience in the field. It is known as “The relations of requirements uncertainty and stakeholder perception gaps to project management performance” by James Jiang, Shelly Wu, Gary Klein and Liang, T.P for the...
Topic: Information Management
Words: 2082
Pages: 7
Introduction The VoIP problem was identified after carrying out a thorough assessment of the company’s communication systems. The analysis of the problem showed that the company’s VoIP network and infrastructure was prone to denial-of-service attacks (DoS) that affected the quality of the calls. The company’s Internet Protocol infrastructure is made...
Topic: Management
Words: 3974
Pages: 14
The Creative Process of Generating new Ideas In engineering design, engineers have to come up with new ideas because if they stick to the same old styles people will become bored with their designs. Besides that, they have to update their skills by finding ways of applying ideas from other...
Topic: Tech & Engineering
Words: 1678
Pages: 6
Introduction The principles of IP telephony are based on transferring the voice using the Internet Protocol, which is currently considered the most perspective and used protocol for data transfer over the networks. The world market for IP telephony is actively developing and currently, VoIP (Voice-over-IP) technology is supported by almost...
Topic: Internet
Words: 729
Pages: 2
Abstract Biomass energy is extracted from living or dead plant matter. This type of energy has an advantage over fossil fuel because it is a renewable energy source while fossil fuel is not. Majorly, biomass energy is used to produce electricity and heat. In this regard, plant matter even in...
Topic: Energy
Words: 3383
Pages: 12
Awazu, Y, Baloh, P, Desouza, KC, Wecht, CH, Kim, J & Jha, S 2009, ‘information-communication technologies open up innovation’, Technology Management, p. 51. The article under analysis explores the effect of information and communication technologies on innovation processes and difficulties connected with the development of these technologies. The article starts with...
Topic: Communication
Words: 673
Pages: 3
A subnet is an individually identifiable part of a particular Internet Protocol network. Subnetting is achieved by dividing the computer networks into groups of computers that manifest a distinct, selected IP address routing prefix. Subnetting is important when dealing with many connections of computers in large networks. These large connections...
Topic: Tech & Engineering
Words: 1157
Pages: 4
Introduction Radio frequency identification is a tracking technique that utilizes radio waves to identify and locate items within a specified area. The items could be living things such as human beings and animals or could also be objects in the form of products. Typically a tag also referred to a...
Topic: Radio
Words: 2254
Pages: 8
Introduction Fire hazards can pose a significant danger to the production and human lives that are essential to diminish through fire prevention control. The inspection of the amount of extinguishers and acetone in welding and molding shops in the project safeguards the space from potential danger. The welding shop faced...
Topic: Fire Safety
Words: 865
Pages: 3
In the past, dating suggested sharing intimate time with one’s partner, but the rules have changed. Today, it is possible to search for information about a potential lover online before becoming acquainted in person. The result of this search may vary from positive, such as similar taste in music, to...
Topic: Tech & Engineering
Words: 336
Pages: 1
History and applications of lead-based alloys Lead never occurs free in nature but in a compound known as lead sulphide (Galena). The ancient Egyptians used Galena in eye paintings because of its metallic look that served to attract the attention of ancient metal workers. Extraction of lead from its ore...
Topic: Tech & Engineering
Words: 2713
Pages: 9
The use of the internet for human communication and connectivity has established in society. According to Karim et al. (2020), at least 3484 people had social media account in 2019, which is an increase of 9% from 2018. Networking sites have advantages to people as they enhance interactions, entertainment, provides...
Topic: Health
Words: 1193
Pages: 4
Interview Notes This paper aims to develop a web-based emergency management system for the government of Lazarus Island. In particular, this system will be used at the response stage of disaster management, and its key purposes will be to help coordinate the relief efforts of various governmental and non-governmental organizations....
Topic: Disaster
Words: 1779
Pages: 6
The essay starts by introducing Roman and other high-school students that admit to texting and driving. The author explains that teenagers are willing to put their lives in danger because of the urgent need to connect. Turkle (2011) states that the contemporary generation is particularly used to having robot pets....
Topic: Tech & Engineering
Words: 675
Pages: 2
Introduction The topic of telecommunications system cannot be studied completely without touching on the topic of modulation, its categorization and ways of usage. Thus, modulation is the telecommunications technique used, as Gaudenzi (2007) argues, to modify the forms of television or radio waves in order to adjust the number of...
Topic: Telecommunications
Words: 2197
Pages: 8
Background WIFI’s reliance on radio frequencies for data transmission has two significant limitations. First, the amount of data that can be transferred at a time is limited; and second, radiofrequency resources are constrained, which might lower WIFI capacity to transmit data in the future. One of the solutions to this...
Topic: Tech & Engineering
Words: 1514
Pages: 5
Symbol Meaning(s): This symbol is new to society since it has been created as a result of the emergence of new digital technology. It looks like an upside-down drop with a circle in it. Its appearance resembles a hot air balloon or a pin that travelers put on the world...
Topic: Tech & Engineering
Words: 227
Pages: 1
Identifying strategic issues and options of the organization requires close analysis of its external and internal macroenvironments. The scope of this assignment covers detailed analysis of Australian Securities and Investments Commission (ASIC), its current problems, and areas for growth. Prior to deriving insights regarding ASIC’s strategic issues and options, it...
Topic: Tech & Engineering
Words: 1987
Pages: 7
Technology is an irreplaceable part of numerous life spheres, and medicine is not an exception. Electronic medical records (EMRs), electronic health records (EHRs), and others are essential parts of clinical information systems in the United States. For example, the EHR is a continuous record of patient health information that is...
Topic: Tech & Engineering
Words: 555
Pages: 2
Introduction Identification and authentication are the most important requirements of any security system. Electronic systems such as computers and communication devices have some sort of identification and authentication capabilities. Radio Frequency Identification (RIFD) technology is a form of Real Time Location System (RTLS) that uses an object known as RFID...
Topic: Radio
Words: 1568
Pages: 5
Introduction In the modern digital world, data holds significant value. Cybercrime is one of the biggest threats to businesses and companies strive to protect digital assets. Cybersecurity is a critical part of business infrastructure, aiming at protecting consumer data, proprietary information, financial data, and potential security threats, among others. Virtually...
Topic: Challenges
Words: 2344
Pages: 8
The iPhone X is one of the smartphones innovated and designed by Apple Inc. and it was released in 2017. The device delivered new features that lacked in its predecessors, such as the Face ID and OLED screen. It uses Apple A11 bionic system and delivers a slate form factor...
Topic: Apple
Words: 832
Pages: 3
Executive Summary Zero Trust Architecture is an innovative way of providing cybersecurity, which is beneficial for companies who have confidential information and, at the same time, outsource employees who do not work from the office computers. It is focused on protecting diverse resources such as databases, network accounts, and different...
Topic: Tech & Engineering
Words: 1739
Pages: 6
Procedural programming and Object-oriented programming (OOP) are two paradigms in programming. They are fundamentally different in how they approach problem-solving and organizing programs. Under procedural programming, a program is organized as a step-by-step instruction to solve a problem. The instructions are executed linearly, but they can include elements that control...
Topic: Programming
Words: 319
Pages: 1
The film industry in Indonesia has been growing during the last several decades. One of the significant factors that influence this sector is technology development. The emergence of new internet technologies has made video content accessible to mass audiences, providing entertainment and education. However, the implication of new technologies has...
Topic: Cinema
Words: 398
Pages: 1
Introduction Alone Together is a nonfiction book that was written by Sherry Turkle. The theme of the book has created many heated discussions about the influence of technology on human interaction. This essay aims to analyze the introduction of the book. Through the use of ethos, pathos, and logos, Turkle...
Topic: Tech & Engineering
Words: 1317
Pages: 4
Project Objective To upgrade the existing email system by January 15th, 2011, in such a way that it becomes: one system with a capacity of 2500 users, replacing the existing 5 systems and making it capable of both LAN and remote (Wi-Fi) access; install new standards and protocols, reconfigure the...
Topic: Tech & Engineering
Words: 644
Pages: 2
Introduction With the nature of the information handled by Metropolitan Police and the number of staff authorized to access this information, there is a great need for the institution to ensure that every staff has access only to the information he or she is authorized to access. Identity and access...
Topic: Management
Words: 2474
Pages: 8
Introduction Programmable controller applications refer to digital computers that are designed for the automation of electrochemical processes. They are mainly used in different industries and machines for purposes such as packaging. PCAs differ from general-purpose computers in that they are designed to accept multiple inputs and output arrangements, temperature ranges,...
Topic: Tech & Engineering
Words: 532
Pages: 2
Being on the Internet requires a lot of critical thinking and the ability to discern fact from fiction. With the abundance of information that is thrown at Internet users from every corner of every site, the range of false data is huge, and taking this information for granted may cost...
Topic: Fiction
Words: 853
Pages: 3
Introduction “Safety of the workers and the users of a facility is one of the most essential aspects for any engineering work.” (Skibniewski, 1983) Fault or failure in a completed project can lead to huge costs in terms of repairs and accidents. The defects may also cause unnecessary delays or...
Topic: Management
Words: 920
Pages: 3
Introduction Competition in business is increasing by day. Price of goods is not just the factor that has to be overlooked while considering the overall development of business but quality of products and services to customers should also be considered. Time also plays a major role in all business activities....
Topic: Technology
Words: 1154
Pages: 4
Introduction System engineering is generally required for the proper arrangement of the managed system and for professional risk management practices. Considering the fact, that the necessity to improve the entire performance of any system is required for the smoother decision making and problem solving processes, the system engineering practices are...
Topic: Tech & Engineering
Words: 1616
Pages: 6
Introduction Social media platforms provide an immense opportunity for people to share their experiences with the world. TapBooth has numerous features that allow its users to improve their experience while taking photos and posting them on the most popular platforms (“Help,” n.d.). However, I would like to focus on the...
Topic: Tech & Engineering
Words: 555
Pages: 2
A project is a temporary establishment, intended for the creation of unique products and services. “Temporary”, implies that every project has a beginning, and inevitably an ending point, reached when the established objectives are completed. “Unique”, on the other hand, means that the created products or services sufficiently differ from...
Topic: Management
Words: 2472
Pages: 9
Situational awareness is crucial in carrying out unmanned missions, which is why any opportunity to improve it deserves careful consideration. The majority of opportunities to enhance situational awareness belong to its first stage, which is the perception of the needed data. Research indicates that it is the most error-prone component...
Topic: Tech & Engineering
Words: 296
Pages: 1
It is quite easy to provide a basic technical definition of Virtual Reality. It is a three-dimensional environment generated by a computer with which an individual can interact. What is more, a person using special tools like VR headsets and controllers can manipulate objects stimulated by computers and perform some...
Topic: Virtual Reality
Words: 280
Pages: 1
Information technology (IT) has been useful in transforming different sectors of modern economies. Business entities have integrated innovation in management and operational roles for effectiveness. Similarly, academic institutions have adopted online information systems for enhancing students’ performance. Many communities practiced farming and cattle rearing as a traditional way of life....
Topic: Agriculture
Words: 888
Pages: 3
Introduction Information Technology Infrastructure Library is the collection of practices that should be adopted for better and improved information technology services, information technology operations, and concepts. In literal terms, it is a collection of books that was developed by the British Government. The figure that is shown is a collection...
Topic: Information Technology
Words: 866
Pages: 4
Surface Vessels Wave Glider is an unmanned marine system (UMS) unmanned surface vehicle with full autonomous capability. It is produced by Liquid Robotics, a wholly-owned subsidiary of The Boeing Company (“Wave glider,” 2019). Ten feet long, it employs wave energy to propel itself forward with complimentary use of stored solar...
Topic: Vehicles
Words: 582
Pages: 2
Introduction Labor relations and human resource management are the fields of study that deal with different aspects of relationships between organizations and employees. The presence of strategies to guarantee employee satisfaction and staff retention is specifically important in the airline sector of the aviation industry. However, the ongoing COVID-19 pandemic...
Topic: Airlines
Words: 2774
Pages: 10
ompiler optimization is important in computing, as it enhances the performance and operation of executable computer programs. The process of optimization may involve either the minimization or maximization of certain attributes or aspects of the execution process. The essence of compiler optimization is to hasten the execution process by minimizing...
Topic: Tech & Engineering
Words: 1161
Pages: 4
Though theoretical knowledge is essential, there is a growing belief that while teaching applied sciences, particularly engineering, a great emphasis should be put on the development of students practical skills. Therefore, some courses and curriculums need to be revised to improve the current state of education in this sphere. Many...
Topic: Students
Words: 909
Pages: 3
Safety management systems (SMSs) are an essential component of the aviation industry. Throughout the history of aviation, safety measures evolved from crew resource management aimed at improving communication between the crew members to the contemporary SMSs (Petitt, 2017). In order to continuously develop and improve the existing SMSs, sufficient information...
Topic: Aviation
Words: 582
Pages: 2
The search formulated as Stress site: Nature.com provides links to numerous publications about stress on the website of the scholarly journal Nature. These publications mainly focus on either high levels of stress found in contemporary society or the neural mechanisms involved (“Stress,” 2020). The search reveals that stress occupies a...
Topic: Google
Words: 326
Pages: 1
Fault Monitoring and Condition monitoring In the field of control engineering, fault detection and isolation and condition monitoring have happened to be among the most important topics. As a result, this paper intends to identify these two phenomena and how they are incorporated in the field of automotive engineering. To...
Topic: Tech & Engineering
Words: 1709
Pages: 6
Introduction The history of artificial intelligence as a new scientific direction begins in the middle of the 20th century. By this time, many prerequisites had already been formed for its origin, where among philosophers, there have long been disputes about the nature of men and the process of knowing the...
Topic: Artificial Intelligence
Words: 1166
Pages: 4
Introduction Artificial intelligence (AI) refers to the development of machines that simulate human intelligence, both in action and thought. It is a revolutionary branch of computer science that applies multiple approaches. Examples of AI technologies widely used today include planning, speech recognition, learning, and problem-solving. AI is common in the...
Topic: Artificial Intelligence
Words: 573
Pages: 2
Technological progress has created numerous benefits, improving the quality of human life. What is known for a fact is that technological progress is unstoppable and inevitable as humanity has been using the results of technology for so long that it is hard to imagine the life without it. However, the...
Topic: Tech & Engineering
Words: 543
Pages: 2
Abstract Technological changes are happening at so fast a rate that organizations have to constantly remodel their strategies in order to beat competition. One of the major changes that institutions have had to undergo is the installation of reliable information systems such as office automation regimens. This paper seeks to...
Topic: Tech & Engineering
Words: 604
Pages: 2
Introduction The invention of computers basically as a vital communication tool has revolutionized man’s lifestyle in a big way. It has made the world today to become too small and be referred to as a “global village”. This new development has led to emergence of a new wave of crime...
Topic: Computers
Words: 1584
Pages: 6
The unmanned ground vehicle (UGV) is a means of transportation on the ground, which can work without a person on board. This type of transport offers a profitable solution for many previously problematic areas of human activity. In places where it is hard or threatening for a person to work...
Topic: Technology
Words: 303
Pages: 1
Unmanned Aircraft Systems (UAS) operators stand for remote pilots of autonomous observation aircraft, such as drones, for example, that collect intelligence information. Space Systems operators functions include support of the space-related missions via air traffic controller. The current paper provides a comparison of situational awareness experienced by these two operators,...
Topic: Tech & Engineering
Words: 1111
Pages: 4
Electromagnetic waves of different lengths and frequencies are used for different purposes based on their characteristics and capabilities. The contemporary world technology utilizes the whole spectrum of electromagnetic waves from the longest radio waves to the shortest Gamma rays. Due to these waves’ capabilities to spread over long distances and...
Topic: Cinema
Words: 274
Pages: 1
Robosub is incredible international competition for mainly student teams seeking to demonstrate their technical success in developing fully autonomous submersibles that showcase the skills of modern devices. It should be recognized that the unique feature of the competition entirely affects the final design, which should have an unmanned device: according...
Topic: Competition
Words: 598
Pages: 2
The Flower Fairy Tale focuses on supplying custom and designer bouquets, which means that there is additional stress on the importance of the product being assembled by hand. This eliminates the option which would imply using robots or any other form of mechanical assistance in the production process. However, business...
Topic: Tech & Engineering
Words: 583
Pages: 2
Introduction In the globalized world of rapidly evolving information technologies, designing and maintaining websites gained several forms, combining machinery and creativity. As a matter of fact, the website’s effectiveness depends on multiple undebatable factors, such as convenience, organization, and appealing design. Comparing and contrasting the websites of two prominent American...
Topic: Web Technology
Words: 983
Pages: 5
Introduction Nanoparticles, also identified as ultrafine particles, refer to matter particles with a diameter of between 1 and 100 nm (nanometers). They have specific characteristics such as their inner structure, shape, surface characteristics, and size, which render them different from other materials, including spatial confinement, high surface energy, and various...
Topic: Tech & Engineering
Words: 747
Pages: 2
Introduction Team performance measurement plays an integral role in establishing a connection between planning, decision-making, actions, and results of a project. By analyzing team performance, determining its strengths and weaknesses, and assessing results, team members get the necessary information to avoid failures, monitor the progress, ensure continuous improvement, and achieve...
Topic: Performance
Words: 2658
Pages: 10
Abstract Efficient communication has been identified as a potential tool to enhance organisation agility. Many businesses have benefited from efficient communication systems in order to enhance their competitive advantages. Meanwhile, organisation depends on the real time communication to enhance organisational decision-making. Thus, this proposal discusses modelling of a network deployment...
Topic: Tech & Engineering
Words: 2459
Pages: 10
Since the invention of the internet protocol, communication has astronomically advanced creating new possibilities that did not exist before. Computer Supported Cooperative Work (C.S.C.W) is a technology that seeks to use computer systems to allow, coordinate and monitor collaborative group work. Developed recently, Google Wave is a web service technology...
Topic: Computers
Words: 2587
Pages: 9
The 2020 public hearing held by the CRTC (Canadian Radio-television and Telecommunications Commission) makes part of a comprehensive review of mobile wireless services. In his opening remarks, Ian Scott, the CEO and chairperson of the CRTC, stated that between 2016 and 2018, providers had made a lot of progress. They...
Topic: Radio
Words: 303
Pages: 1
One of the important aspects that Information technology has brought forward is telecommunications. Communication networks play an increasing important role in an ever shrinking business world. Organizations, big or small, used these networks to exchange information even beyond geographical boundaries. Through research, new communication standards are developed on regular basis...
Topic: Technology
Words: 874
Pages: 3
Study Design The study will employ a cross-sectional research design in examining regulations and technologies employed in the aviation industry to provide a high level of performance in safety management systems (SMS). This research design is appropriate because it is easy to implement, promotes data collection from a representative sample,...
Topic: Management
Words: 568
Pages: 2
With the rapid development of new technologies, the safety of personal data is expected to increase. However, no matter how secure a wireless network is, there are some special tools and methods that allow certain people to crack it. Despite the fact that there is a great number of solutions...
Topic: Cybercrime
Words: 573
Pages: 2
Cryptographic Basis of Encryption Encryption is the process of converting data into a coded format for security and confidentiality purposes. This process is achieved by passing data through a predetermined set of mathematical formulae known as encryption algorithms. The most commonly used techniques of data encryption include symmetric and asymmetric...
Topic: Encryption
Words: 689
Pages: 2
In the contemporary world, interpersonal communication, overall, and dating, in particular, are changing concepts. Contrary to the traditional vision of a regular date filled with meaningful conversations, it is common to see a couple in a restaurant looking down on their phones without saying a word to each other. While...
Topic: Technology
Words: 1653
Pages: 6
Introduction The development of digital technologies and innovations that brought humankind to the era of the Internet has introduced multiple changes of various character in every part of life. One of them is the appearance and constant transformation of a new category of crime associated with computers and communication technologies...
Topic: Challenges
Words: 881
Pages: 3
Search engine crawlers, commonly identified as robots, spiders, or bots, are programs or scripts that methodically and spontaneously browse webpages. Crawling relates to the discovery procedure whereby search engines dispatch a group of robots – spiders or crawlers to locate updated and new content (Amudha & Phil, 2017). Bots, for...
Topic: Tech & Engineering
Words: 654
Pages: 2
Nowadays, people surf the web for pictures of cats much more often than for sketches of atomic bombs. The Internet became a vast database, and it was created to make fast access to this data open to everyone (Cukier, 2014). However, the web is becoming more and more commercialized: people...
Topic: Relationship
Words: 343
Pages: 1
Over this course, I have learned much about Java and programming in general, particularly the object-oriented programming (OOP) paradigm. As it draws to a close, I understand that the concepts of inheritance and polymorphism are complex and challenging to master. Although I understand their application and utility, I still have...
Topic: Personality Development
Words: 305
Pages: 1
The development of technologies allowed humanity to communicate with each other over long distances. Today, when connecting is no longer a problem, the focus has shifted to the quality and security of networking. The Voice over Internet Protocol (VoIP) was created that allows for faster and cheaper communication. Although VoIP...
Topic: Internet
Words: 287
Pages: 1
Most of these networks are genetic, worldwide web-based with a complex topology. A scale-free network is a connected network with the property that the number of links originating from a given mode exhibits a powerful law of distribution. This is network is constructed by adding nodes to the existing network...
Topic: Tech & Engineering
Words: 1244
Pages: 4
Data loss is the center of focus of business continuity and disaster recovery (BC/DR), as this is the lifeblood of business operations today. Any business threatening IT-related disaster resulting in significant loss of data is risky for companies of any size. As a result, backing up information is essential to...
Topic: Disaster
Words: 297
Pages: 1
The topic of this paper is Steve Job’s use of the tools of fiction in his product launches. His success, to a great extent, was a result of his artistic approach to presentations. Bill Gates stated once, describing Job’s public speaking skills: “He’s even a bit nervous because it’s a...
Topic: Apple
Words: 763
Pages: 2
A JIT inventory is a management strategy that ensures the production schedules go hand in hand with the suppliers’ raw material orders. Also called lean manufacturing, JIT inventory aims to eliminate any form of waste and maximize efficiency (Voss & Robinson, 2019). Through a JIT system, a company reduces the...
Topic: Tech & Engineering
Words: 275
Pages: 1
Constant access to the Internet and the need to always be connected create optimum conditions for technostress. People, on the one hand, get tired of continuous messages, e-mails, and notifications monitoring. On the other hand, they are afraid to lose sight of something interesting or important, which is called the...
Topic: Psychology
Words: 576
Pages: 3
Online security has continually caused a significant challenge to individuals and organizations due to fraudulent activities such as phishing. Phishing refers to deceitful cybercrime where individuals attempt to obtain secure information such as passwords, usernames, and PIN numbers by disguising themselves as legitimate institutions or persons (Aleroud & Zhou, 2017)....
Topic: Tech & Engineering
Words: 1104
Pages: 4
Preliminary The suitable memory available in the MC68HC12B32 system is 32 kbs of read-only memory (ROM). The ROM array is arranged in a 16-bit configuration and may read as bytes, aligned words or uneven words. A bus cycle represents access time for byte and aligned word access whereas, for uneven...
Topic: Tech & Engineering
Words: 757
Pages: 2
Introduction USA-240 is the third spaceflight of the U.S. Air Force’s X-37 experiment program to ascertain the technological reliability and reusability of unmanned spacecraft in orbital missions. The secretive flight, which logged 675 days orbiting the earth, marked the first re-flight of the agile space shuttle specially designed to withstand...
Topic: Space
Words: 354
Pages: 1
Cybersecurity, or the protection of computer systems and networks from malicious actions, is an essential concern for any modern organization. Data theft and other disruptive activities can cause extensive financial and reputational damage, sometimes forcing businesses to shut down completely. Employers can implement a variety of countermeasures to stop such...
Topic: Cybersecurity
Words: 631
Pages: 2
Before a computer program can be executed, it must be created and compiled. Any text editor or IDE is used to edit the Java source code. The extension of the file should be.java, while the file name should reflect the term used in the public class line. The next step...
Topic: Programming
Words: 400
Pages: 1
Introduction The pace of the development of modern technology opens up many unique possibilities for ordinary people. Some electronic tools, previously only visible on the screens of science fiction films, are now found in the devices of the vast majority of users around the world. Many such systems have come...
Topic: Ethics
Words: 1667
Pages: 6
Introduction The incredible speed of technological development makes the unmanned industry one of the most fast developing. Unmanned aircraft systems (UAS) are now used in traffic management, cargo transportations, and even mining, to name but a few spheres of application of pilotless technologies. The most critical issue in sensing, perception,...
Topic: Tech & Engineering
Words: 402
Pages: 2
With the rapid growth of modern society and the wide range of technological advancements, people have more opportunities to access challenging procedures, especially in the field of medicine. Technological progress in robotics and artificial intelligence provides countless future prospects for addressing current healthcare issues. Some of these challenges include population...
Topic: Health
Words: 1204
Pages: 4
Introduction The issue of data market regulation has now become a controversial topic. On the one hand, some companies use data to make intelligent decisions that led to a revolution in the internet economy. On the other hand, sellers that provide data to organizations create an unsecured market situation in...
Topic: Tech & Engineering
Words: 373
Pages: 1
Introduction It is widely known that with the development in information technologies came great opportunities for improving company management. However, due to the lack of knowledge and the immense diversity of software solutions that are excellent at some things but so good at others, potential clients usually feel perplexed and...
Topic: Management
Words: 598
Pages: 2
Agile software development involves an iterative process of creating software where different developers and designers work with the client to ensure that business goals and vision are met. It provides an early and continuous development of software, allowing teams to gather feedback and make changes to suit the dynamic requirements....
Topic: Agile Project Management
Words: 598
Pages: 2
Introduction Numerous studies have revealed that business transformation is an essential tool for business organizations to enhance competitive measures, business capability, and modern business techniques. Organizations need transformation irrespective of business sectors and geographical location, business transformation not only enhance the quality of business, but it also improves overall business...
Topic: Technology
Words: 2630
Pages: 10
Microsoft Excel is an essential software to all organizations regardless of the industry under which they operate. They can be embedded in various functions performed by each department ranging from assigning tasks to accounting. As a finance officer, Microsoft Excel is vital in conducting basic financial accounting. Spreadsheets are giant...
Topic: Microsoft
Words: 284
Pages: 1
Summary The provision of the lab and medical equipment plays an important role in the development of a new research project, the improvement of medical services, and the enhancement of academic facilities. Even if researchers and administrators establish clear goals and milestones in their work, there is a need for...
Topic: Tech & Engineering
Words: 1999
Pages: 7
Unmanned Maritime Systems (UMS), when used for search and rescue, require specialized applications and approaches to be used as people’s safety is the crucial point to consider while operating. The chosen system includes the integrated components for assisted rescue and crewless search operations and is called the ICARUS project. Its...
Topic: Tech & Engineering
Words: 351
Pages: 1
After having researched the Privacy Rights Clearinghouse database, I selected three different cases. The first incident of an insider breach type happened on May 25, 2017, at White Blossom Care Center, San Jose, California. One of the former employees improperly accessed residents’ data at the time of the employment. Inappropriately...
Topic: Health
Words: 582
Pages: 2
How Technology has changed the Balance between Customization and Standardization The ever-changing technological landscape has significantly affected the balance between customization and standardization in various aspects. At the outset, organizations have not only been forced to change their patterns of work but also the structure of workgroups, authority, and managerial...
Topic: Tech & Engineering
Words: 642
Pages: 2
The two websites selected for review are the National Library of Medicine and WebMD . Although both websites cover health-related topics, the first website is aimed primarily at healthcare practitioners, such as doctors and nurses. Members of this audience are typically aged 26 to 60 and have a degree in...
Topic: Web Technology
Words: 593
Pages: 2
Introduction The research will mainly deal with finding out a convenient network security technology that will suit corporation business operations. One of the network security concepts includes authentication, once a user is authenticated (allowed access to a computer) a stateful firewall puts in place administrative policies. Firewall security is the...
Topic: Tech & Engineering
Words: 3198
Pages: 12
Research on mobile medical apps for diabetes mellitus (DM) patients Intent to analyze commercially available apps available for DM patients Apps have outcomes published in the literature, received FDA or CE Mark approval Apps intend to support blood glucose (BG) and DM self-management 14 mobile medical apps identified: smartphone-based and...
Topic: Diabetes
Words: 587
Pages: 2
Critical path analysis (CPA) is used to determine the critical and non-critical activities related to the business processes or plans and the amount of float involved in each activity. As such, the result of this method identifies the critical path, which includes the sequence of essential steps that incorporate a...
Topic: Management
Words: 335
Pages: 1
Modern unmanned ground-controlled stations (GCSs) are valuable equipment used to remotely control aircraft. One of such systems is the Desert Rotor station, a high-precision GCS that makes it possible to control flights of drones and other unmanned aerial vehicles (“Portable ground control stations,” 2019). The station is equipped with a...
Topic: Challenges
Words: 312
Pages: 1
Smartphones have become our obsession instead of being our helpers. They attract people to use all of the apps and social networks as much as possible. Every person on the planet is dependent on his smartphone, and I am no exception to the rule. With the increase of opportunities these...
Topic: Smartphone
Words: 292
Pages: 1
Technology is spreading fast and integrates numerous spheres of everyday life for people of different ages, starting from kids. The contemporary world’s reality offers multiple opportunities through technological advancements, but simultaneously, hinders challenges and controversial points. The rapid emergence of various robots, including those with whom people can have intimate...
Topic: Tech & Engineering
Words: 1116
Pages: 4
Introduction This paper discusses the issues presented in the article called “The robots are coming – for as many as 800 million jobs”. As the technology of machine learning and artificial intelligence swiftly develops, many business owners and corporations are eagerly pondering the possible ways of automation in their operations....
Topic: Robots
Words: 2207
Pages: 8