Net neutrality regulations are critical to the openness and innovation of the Internet. It is a concept that has been built into the creation of the Internet since its foundations almost 30 years ago. Without net neutrality, major internet service providers (ISP) the likes of Verizon and Comcast would be...
Topic: Internet
Words: 567
Pages: 2
Introduction In the twenty-first century, technological progress is concentrated in the field of semi-automatic and automatic innovations. It can be seen everywhere in both the private and military sectors. This is why it is essential to know the latest advances in this scientific area. This paper aims to review academic...
Topic: Tech & Engineering
Words: 553
Pages: 2
Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services and to meet cost, quality, and schedule requirements....
Topic: Tech & Engineering
Words: 2478
Pages: 9
Abstract VHF systems are the most reliable alternative for avionic communication systems. This is generally explained by the high reliability and selectivity of VHF radio transmission. The principles and rules of VHF transmission are helpful for creating safe navigation, operation, control and other systems. VHF Communication The purposes of VHF...
Topic: Tech & Engineering
Words: 690
Pages: 3
Executive Summary In the engineering of software, the software methodology applied plays a significant role in the final product of the process. For example, in a traditional linear model software is created following a set of steps and changes are often difficult and costly to implement. The pressure created by...
Topic: Programming
Words: 6259
Pages: 23
First, Safety Management System (SMS) is directly related to the provision of safety to the staff that is largely founded on the adherence to and advocating of the established standards by the personnel themselves. Hence, the human factor will be integrated by the related activities of your workers who –...
Topic: Aviation
Words: 283
Pages: 1
Java offers three basic types of loops: FOR, WHILE, and DO…WHILE. Their fundamental function is executing a block of code repeatedly, based on a Boolean condition (Farrell, 2014). However, they differ in how they evaluate their conditional expression (Farrell, 2014). A WHILE loop evaluates its conditional expression before executing, therefore,...
Topic: Programming
Words: 283
Pages: 1
Audience The genre selected for the present analysis is a knowledge base article. The chosen source is a support page for Google’s Analytics application (“How can we help you?” n.d.). The intended audience is represented by the users of the Google Analytics app, which means the people who want to...
Topic: Google
Words: 1515
Pages: 6
The contemporary world is characterized by an increased use of wireless communication. Such communication entails the use of smart phones and iPods in our daily communications. The use of wireless communication has become very essential which has greatly enhanced sharing of information greatly. Security of the information transmitted over wireless...
Topic: Radio
Words: 2276
Pages: 8
The Boeing Company, similar to other large aircraft manufacturers, is experiencing an economic decline due to the combination of recent events. Examining the company’s financial performance from 2015 to 2019, one can see a gradual increase in revenue from 2015 to 2018, followed by a steep decrease between 2018 and...
Topic: Boeing
Words: 640
Pages: 2
Cyber security and information assurance refer to steps taken to protect networks and computer systems from being disrupted as well as preventing unauthorized access (Sara, 2008). Cyber security and information assurance aim at providing three things: integrity, confidentiality and availability (Knapp, 2009). Integrity is enhanced through ensuring that users are...
Topic: Tech & Engineering
Words: 259
Pages: 2
Introduction There has been an increase in the use of the Unified Modeling Language in many contexts; it is used in application domain, methodology, and platform. For this reason, there has been more concern for customized consistency. There has been little support for customizations that are specific safe for the...
Topic: Management
Words: 4257
Pages: 15
Introduction In many engineering applications, there is a need for efficiency. Power management is an elemental strategy for improving efficiency. The idea is to reduce power consumption to the least possible value while ensuring performance is okay. In the design of digital logic, power scaling is a major way to...
Topic: Energy
Words: 934
Pages: 2
Introduction Unmanned vehicles have grown in popularity, especially because of their versatility in use. These autonomous vehicles are used in multiple areas such as monitoring disaster areas, an inspection of projects and infrastructure, military operations, and spraying of agricultural chemicals, among others. The unmanned vehicles are also equipped with cameras,...
Topic: Tech & Engineering
Words: 1399
Pages: 5
The growing concerns about the emerging threats to security mean that intuitions have to upgrade their security system to include intelligence gathering system based on information technology. In this hospital security as well as information technology officers concerned with security issues do want to upgrade and include intelligent building IT...
Topic: Intelligence
Words: 840
Pages: 3
Introduction Globalization is a process beneficial in numerous ways as it supports economic growth and assists in accessing and creating opportunities – the Internet is possibly both one of its most visible facets and a driving force. Web security is one of the issues on which the effects of globalization...
Topic: Globalization
Words: 1999
Pages: 7
Introduction A planned change is a change executed systematically in tandem with organization’s future goals and expectations. It ensures an organization moves steadily in its processes of implementing a given solution. In IT project management, change refers to project management process, where the perceived change facets to a project are...
Topic: Success
Words: 1740
Pages: 5
Abstract This paper investigates the number of Clusters in K-Means Clustering and analyzes the methods used in numbering. The purpose is to obtain the correct number of clusters in a given document with the least number of errors and achieve an accurate number of clusters. A comparison of the different...
Topic: Tech & Engineering
Words: 2475
Pages: 9
Introduction Framers Company is in the process of launching a new product. One of the objectives is to provide customers with low prices within a limited time. The company also aims at producing a product that is unique in the market and one that will fulfill the needs of the...
Topic: Information Technology
Words: 862
Pages: 3
Internet Privacy has become one of the most commonplace issues in contemporary society. Even though internet connectivity enables many people to interact and share information, privacy issues have remained a big problem for Internet users. Internet-related crimes, such as fraud and cyberstalking, have been on the verge of increasing, hence...
Topic: Internet
Words: 541
Pages: 4
EMC EMC was first created in 1979 before starting as an information systems infrastructure, dealing in both software and hardware in 1981. With several partnerships, acquisitions, and a series of new research and development projects in various countries including Singapore, and tapping on cheap Chinese labor, the company grew further...
Topic: Management
Words: 1560
Pages: 5
It is common knowledge that learning and teaching can be enhanced by the use of technology. Additionally, the new generation of tech-savvy students have high demands about the use of educational technology. Thus, it is critical that school leaders promote the use of technology on all levels of education. In...
Topic: Technology
Words: 824
Pages: 3
Introduction The Business Intelligence system is integrated with analytical systems that provide the function answers to various business needs. The analytical systems that should be contained in the BI should be highly developed, performance-based, tightly integrated, and readily available for use in analytical and warehouse purposes. Examples of software that...
Topic: Business Intelligence
Words: 1103
Pages: 4
Introduction Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of the internet. These two entities have virtually transformed the world as far as information processing and communication is concerned. Organizations have extensively employed the use of computer...
Topic: Success
Words: 837
Pages: 3
Summary Industrial plants in the United States are unlikely to stop using fossil fuels because the amount of power acquired from other sources is still inadequate. The fact that wind and solar photovoltaic (PV) energy are in short supply has compelled environmentally-conscious organizations to seek different means of mitigating the...
Topic: Electricity
Words: 461
Pages: 2
Introduction The rapid advancement in the use of information technology has also resulted in increased usage of databases for the storage of Information. Newer technologies such as data mining use the stored data in such a way that not only permits quick access to deeply buried information but they also...
Topic: Tech & Engineering
Words: 788
Pages: 2
The paper represents research proposals aimed at revealing core social trends connected with digital transformation in the world and the USA in particular. Key threats for society are mentioned, including digital divide, and methodology is proposed to deepen the current knowledge and understanding of social implications of digital transformation in...
Topic: Digital Transformation
Words: 1550
Pages: 5
Project Scope The Erie Company Department of Public Works — Division of Highways seeks proposals from consultants for professional engineering services for design, construction, administration, and construction inspection services for the Dona Street extension. The extension will be located west of NYS Route 5 for a distance of approximately 1,550...
Topic: Tech & Engineering
Words: 605
Pages: 2
Introduction Database Management Systems (DBMS) is a major requirement in any organizational setup, and one of the most popular DBMS is the Relational Database Management Systems (RDBMS). It is formatively one of the most significant landmarks made towards understanding the hypothetical and technological framework of a database. Although it has...
Topic: Data Management
Words: 1358
Pages: 4
All spheres of modern life are influenced by the technical innovations, developed for the last ten years. Medical care is not the exception. Different types of medical equipment are used during curing for many years. The innovations in the educational sphere have come later. Today the software and other innovations...
Topic: Nursing
Words: 607
Pages: 2
Nowadays, autonomous vehicles no longer seem unusual, and their introduction for widespread use is not that far off. Nevertheless, cars operating at higher levels of autonomy require certain infrastructure, and their successful operation depends on a variety of factors, including climate and road traffic. A number of technologies that autonomous...
Topic: Driving
Words: 395
Pages: 1
Introduction In the book by Shneiderman and Plaisant (2010), designing Human-Computer Interaction (HCI) is the science of studying and structuring interaction between users and the devices or machines such as computers. It’s a process that requires proper planning, incorporates numerous fields of disciplines such as the study of computer science,...
Topic: Computers
Words: 3787
Pages: 14
Performance evaluation of i/o workloads Flash-based solid state disks (SSD) is a performance based data storage technology that optimizes the use of flash-based technology to implement its data storage capabilities compared with mechanically available data storage technologies (Park & Shen, 1). Technically, the promise for better performance of the SSD...
Topic: Memory
Words: 2251
Pages: 8
Introduction After many inventions or technology development, threats are also involved in many ways. New technologies give us latest types of crime which directly or indirectly harm us. Computer is the main source of the online data library. It not only gives us our required information, but when we download...
Topic: Cybercrime
Words: 9208
Pages: 40
Introduction The changes in technology force companies to reevaluate business models to remain profitable and competitive in a market. Mobile technologies use has become part of daily life for most people around the world as a way of sharing information. A study conducted by Pew Research Center (2019) revealed that...
Topic: Tech & Engineering
Words: 2203
Pages: 8
Introduction The thought of fully unmanned ground vehicles fascinates everyone with an interest in robotics and automation technologies. Governments, corporations, and individuals have been pursuing various technologies that could see the dream of self-driven robots taking over critical roles, such as warfare in rough terrains and dangerous environments. Emerging technologies...
Topic: Robots
Words: 615
Pages: 2
Conficker, which is also referred to as Downup, Downadup and Kido, is a worm that affects Microsoft Windows operating system which was discovered at first in November 2008. It checks for defects in the Windows software to designate computers and connect them into a virtual machine which can be dominated...
Topic: Microsoft
Words: 930
Pages: 3
Introduction Strategic planning is not a concept that is uniquely applied to the field of information technology. In modern times, every segment of life and every undertaking that is successful must utilize the advantages availed by strategic planning. To state simply, strategic planning is about the careful organization of the...
Topic: Strategic Planning
Words: 1984
Pages: 6
Abstract The world is going digital each day, hence Scientists and researchers are busy improving the old technology while subjecting business and technology into a new era of fourth generation digital technology. It all started from first generation, and then evolved to the second and third generation. At the start...
Topic: Tech & Engineering
Words: 2650
Pages: 10
Introduction Not so long ago, the concept of artificial intelligence (AI) was in the earliest stages of its conception and was only pondered over in science fiction. In fact, the alarmist trends in some parts of contemporary global society owe their existence to the early sci-fi novels addressing the ostensibly...
Topic: Artificial Intelligence
Words: 1653
Pages: 6
Since I began working, I have interacted with various types of system software. I have found it very interesting working on different types of BIOS and device firmware, operating systems, utility systems, and operating software. Over time, I have been able to set up several websites using different server operating...
Topic: Software
Words: 1230
Pages: 3
Introduction The software development industry is fast growing as user requirements change-requiring applications that can address these requirements. As the costs of development rises in developed countries, a new source of labour market is emerging to provide labour for development of such applications at reduced costs. This is achieved through...
Topic: Software
Words: 1100
Pages: 4
Cloud computing technology has become one of the fastest-growing areas of the IT market in recent years. Businesses choose cloud services to reduce costs, improve internal interaction, streamline operations, help with faster decision-making, and ensure more flexibility. When choosing appropriate cloud technology, companies need to consider cloud deployment models and...
Topic: Tech & Engineering
Words: 339
Pages: 1
Technology has been evolving at a very fast rate in the 21st century. Previously, it took several days or weeks for the news or messages to reach people in remote places. However, technology has brought a revolution in the way people communicate and transact businesses. The medical profession has benefited...
Topic: Communication
Words: 567
Pages: 2
A fire that occurred on June 18, 2007, in Charleston, South Carolina, was one of the most tragic events that lead to mass deaths of firefighters in the United States. Nine people died that day; they were all experienced firefighters between the ages of 27 and 56. Even though several...
Topic: Tech & Engineering
Words: 547
Pages: 2
Introduction The internet is an interconnection of millions of computer and other devices through wired networks and wireless networks. Several decades ago, the network had only a few number of computers connected. Today the internet is one of the largest phenomena in the world. The internet has become a core...
Topic: Internet
Words: 1938
Pages: 7
Execution of business processes in the 21st century has been faced with a lot of challenges like insecurity and conviviality. Due to this a lot of organizations have employed information technology mechanisms to protect their information infrastructure from being accessed by unauthorized persons and also to check authentication (Neumann, 5)....
Topic: Tech & Engineering
Words: 1209
Pages: 4
Introduction We have two different types of ethics. This is the professional ethics and the human ethics. Professional ethics include ethics of a professional person like a doctor, a software engineer etc. Human ethics are the ethics which enable one to live well with the society. Ethics is very important...
Topic: Ethics
Words: 1962
Pages: 7
In Java, statements can be executed conditionally through IF…ELSE and SWITCH structures. The IF statement evaluates a Boolean expression; if true, an associated block of code is executed; otherwise, the following ELSE block is executed (Farrell, 2014). Common mistakes when writing an IF…ELSE statements include errors in syntax, such as...
Topic: Tech & Engineering
Words: 294
Pages: 1
Description Hacktivism is the use of technology or computer system for social or political motivations or to promote a certain agenda. One prominent example of hacktivism was Aaron Swartz who broke into the MITs computer system in 2013 and downloaded thousands of academic journals and articles, later published online as...
Topic: Terrorism
Words: 415
Pages: 1
Quotation: In order to show the magnitude of changes, McCloskey (2016) writes that “People moved from tents and mud huts to split-levels and city condominiums, from waterborne diseases to 80-year life spans, from ignorance to literacy” (p. 499). The technique that appealed to me: After giving the statistics numbers regarding...
Topic: Tech & Engineering
Words: 282
Pages: 1
Introduction Cybersecurity takes up an indispensable place in the security management of each company. Frequently the reasons for the system hacking become non-executive directors, who lack knowledge on the topic of cybersecurity, therefore possessing high risks to the enterprise. Luckily, many preventive and defensive strategies are created in order to...
Topic: Cybersecurity
Words: 1302
Pages: 4
Depending on the objective, two types of path planning and simulation of unmanned underwater device trajectories should be allocated. These are the path from one point to the other and the complete grid coverage of the space (Panda et al., 2020). The initial analysis of both scenarios gives a vivid...
Topic: Vehicles
Words: 368
Pages: 1
Safety management has become an essential topic in aviation to better assess risks and prevent accidents. Poor risk management practices contribute mainly to aviation accidents, most of which are often catastrophic. This raises concerns about profound ways of managing risks following the established standards to make informed decisions. Pilots must...
Topic: Aviation
Words: 1105
Pages: 4
Introduction Network design refers to a process that involves topological design, synthesis of network, and network realization. The main reason behind network design is to ensure that the business acquires a network that meets its business model. Many organizations are now focusing their attention towards designing information system network that...
Topic: Tech & Engineering
Words: 765
Pages: 2
Venkatesh, V. C. (2007). Precision Engineering. New York: Tata McGraw-Hill. The idea of precision engineering is outlined in the book due to the concepts of multi-dimensional approach when talking about the industrial growth in post-industrial society. In this respect, special attention is grabbed in the book to precision machinery, as...
Topic: Tech & Engineering
Words: 1807
Pages: 6
The article researched, “Emerging Technologies Being Incorporated in the Fire Service”, discuses eight new devices developed for the Fire Service. It summarizes these new devices without detailed description, providing an overview of the ways new technology is being integrated into firefighting equipment. These devices include three solutions for monitoring a...
Topic: Tech & Engineering
Words: 367
Pages: 1
Top-down parsing was introduced in the 1970s, and it remains a widespread strategy that has also become the basis for newer and more sophisticated algorithms. The top-down strategy was preferred during an extended period of time due to its comparative simplicity, usability, and an opportunity to customize. As the term...
Topic: Computers
Words: 555
Pages: 2
Introduction In general telecommunication systems are the different ways in which the information is passed from one place to another covering a certain distance. The message passed may be verbal or written. The mode of communication used depends on several factors such as the urgency of the message, the magnitude...
Topic: Telecommunications
Words: 720
Pages: 2
Abstract The purpose of the following research paper is to define how various psychological factors influence motorcyclists’ behavior in terms of safety. Among the concepts discussed, the issues of helmet wearing and exceeding speed limits will be outlined. With the help of peer-reviewed studies on the matter, some motorcyclists’ behavioral...
Topic: Psychology
Words: 412
Pages: 1
Introduction This is an elaborate plan on data quality evaluation for GlaxoSmithKline plc (GSK). This is a multinational pharmaceutical company with headquarters in London. There are issues in master data management as a result of two firms merging in 2000; Glaxo Wellcome merged with SmithKline Beecham Company. These two companies...
Topic: Tech & Engineering
Words: 838
Pages: 3
Abstract The Seamus company is seeking a vendor on a hire basis to develop a technology-enhanced interactive learning solution to improve one of the processes. This paper will focus on process enhancements and learning modules. The proposed solution is a comprehensive mobile application that combines grammar exercises for curriculum reinforcement,...
Topic: Tech & Engineering
Words: 1541
Pages: 6
Introduction The poaching of various high-value, and often endangered wildlife is an immense conservation challenge in the contemporary environment. Conservational efforts of many African megafaunas are further hindered by a variety of socio-economical issues, including political instability, economic strife, and a highly evolving and expanding international market for illicit wildlife...
Topic: Tech & Engineering
Words: 2831
Pages: 10
Introduction Technological progress has skyrocketed over the past few decades, allowing for the simplification and enhancement of a variety of processes within every domain. Industry and agriculture are among the areas that have experienced a vast rise in effectiveness and performance quality due to the integration of new types of...
Topic: Agriculture
Words: 851
Pages: 3
Introduction According to the UK drink driving statistics (2010), over 3000 people are either killed or seriously injured in accidents related to drink driving. The problem with alcohol is that the more an individual consumes, the more confident he or she gets and consequently the more risks he or she...
Topic: Tech & Engineering
Words: 1752
Pages: 8
Abstract Subsystems are evidence-based models for ensuring that competent individuals complete specific functions in a timely manner. In the identified organization, the proposed command, control, and communications (C3) framework will transform operations and guide leaders to identify new or initial technologies that have the potential to deliver positive results. The...
Topic: Communication
Words: 3819
Pages: 14
Noticing and Articulating the Problem The world is confronting an increasing flow of disinformation within cyberspace. Examples incorporate the spread of cyber-rumors by social media bots during French elections within the Macron Leaks attack or the partisan messages during Brexit in the United Kingdom. Thus, the growing threat of conspiracy...
Topic: Homeland Security
Words: 1015
Pages: 4
Introduction This paper investigates current trends in turning the brain waves into music, through surveying the literature on the methods of turning Electroencephalography (EEG) waves into Musical Instrument Digital Interface (MIDI) music. The effects of the music on the human body are well known and documented, where different types of...
Topic: Music
Words: 2181
Pages: 8
AI-powered technologies have been implemented in the retail sector for long decades, but a truly innovative robotics era is yet to come. From vending machines to a robot barista serving drinks, the use of automation devices corresponds to fast-changing market demands and aims to enhance customer experience and improve a...
Topic: Robots
Words: 363
Pages: 1
Introduction Biometrics is a security technology that is programmed in accordance of individuals’ body characteristics such as finger prints or eye retina to mention but a few. Its relevance is becoming an interesting topic in regards to computer and internet security. According to Bolle and Ratha (2004, p.6) the first...
Topic: Computers
Words: 1085
Pages: 4
Introduction Marc Prensky claims that electronic books are more useful and efficient than paper ones. The process of education would become more interesting and modern with the use of new technologies. He puts forward the idea that “colleges and universities should ban nonelectronic books” (Prensky 1). Improving the learning process...
Topic: Tech & Engineering
Words: 281
Pages: 1
Boeing faced the biggest blow in 1999 when airbus, their biggest competitor delivered more airplanes than Boeing. This was then followed by a shrank down of Boeing’s earnings and a consequent laying off of 9,300 employees out of the 126,000 employees that it had. During the gulf war, there was...
Topic: Boeing
Words: 813
Pages: 3
It seems reasonable to state that waging war has always been an expensive undertaking. What is more, with the flow of time, weapons, armory, and other military equipment – as well as expenses on army maintenance – have become pricier. It is not surprising that recent technical progress provides the...
Topic: Tech & Engineering
Words: 298
Pages: 1
Introduction The United States copyright law and the doctrine of fair use were enacted to reduce or prevent the use of someone’s copyrighted materials without their consent. Any person who needs to use or cite another person’s intellectual property must have due rights from the copyright owner. In case individual...
Topic: Tech & Engineering
Words: 1644
Pages: 6
The number of unmanned systems in the world is regularly increasing. Today, this diversity includes “self-managed” planes, vehicles, drones, seagoing ships, and spacecraft. Each designed device solves unique problems, hence the variety of interfaces for control and monitoring (Howard, 2013). There is no need to create machine functionality that will...
Topic: Tech & Engineering
Words: 404
Pages: 1
Introduction Communicating video content may take a variety of forms. These may include a point-to-point communication and broadcast method in addition to the multicast method. To communicate video efficiently in a fraction of the initial downloading time, streaming video is an important requirement. HTTP streaming Video HTTP streaming is an...
Topic: Tech & Engineering
Words: 553
Pages: 2
My understanding on data structures and algorithms goes mainly to the three books that I read as a beginner and continue to consult the books whenever I need guidance. Data Structures Using C by Aaron M. Tenenbaum Data Structures, Algorithms, and Program Style Using C by James F. Korsh Data...
Topic: Tech & Engineering
Words: 1096
Pages: 4
Introduction The article chosen for analysis was written by an Information Systems (IS) management professor with tremendous experience in the field. It is known as “The relations of requirements uncertainty and stakeholder perception gaps to project management performance” by James Jiang, Shelly Wu, Gary Klein and Liang, T.P for the...
Topic: Information Management
Words: 2082
Pages: 7
Introduction The VoIP problem was identified after carrying out a thorough assessment of the company’s communication systems. The analysis of the problem showed that the company’s VoIP network and infrastructure was prone to denial-of-service attacks (DoS) that affected the quality of the calls. The company’s Internet Protocol infrastructure is made...
Topic: Management
Words: 3974
Pages: 14
The Creative Process of Generating new Ideas In engineering design, engineers have to come up with new ideas because if they stick to the same old styles people will become bored with their designs. Besides that, they have to update their skills by finding ways of applying ideas from other...
Topic: Tech & Engineering
Words: 1678
Pages: 6
Introduction The principles of IP telephony are based on transferring the voice using the Internet Protocol, which is currently considered the most perspective and used protocol for data transfer over the networks. The world market for IP telephony is actively developing and currently, VoIP (Voice-over-IP) technology is supported by almost...
Topic: Internet
Words: 729
Pages: 2
Abstract Biomass energy is extracted from living or dead plant matter. This type of energy has an advantage over fossil fuel because it is a renewable energy source while fossil fuel is not. Majorly, biomass energy is used to produce electricity and heat. In this regard, plant matter even in...
Topic: Energy
Words: 3383
Pages: 12
Awazu, Y, Baloh, P, Desouza, KC, Wecht, CH, Kim, J & Jha, S 2009, ‘information-communication technologies open up innovation’, Technology Management, p. 51. The article under analysis explores the effect of information and communication technologies on innovation processes and difficulties connected with the development of these technologies. The article starts with...
Topic: Communication
Words: 673
Pages: 3
A subnet is an individually identifiable part of a particular Internet Protocol network. Subnetting is achieved by dividing the computer networks into groups of computers that manifest a distinct, selected IP address routing prefix. Subnetting is important when dealing with many connections of computers in large networks. These large connections...
Topic: Tech & Engineering
Words: 1157
Pages: 4
Introduction Fire hazards can pose a significant danger to the production and human lives that are essential to diminish through fire prevention control. The inspection of the amount of extinguishers and acetone in welding and molding shops in the project safeguards the space from potential danger. The welding shop faced...
Topic: Fire Safety
Words: 865
Pages: 3
In the past, dating suggested sharing intimate time with one’s partner, but the rules have changed. Today, it is possible to search for information about a potential lover online before becoming acquainted in person. The result of this search may vary from positive, such as similar taste in music, to...
Topic: Tech & Engineering
Words: 336
Pages: 1
History and applications of lead-based alloys Lead never occurs free in nature but in a compound known as lead sulphide (Galena). The ancient Egyptians used Galena in eye paintings because of its metallic look that served to attract the attention of ancient metal workers. Extraction of lead from its ore...
Topic: Tech & Engineering
Words: 2713
Pages: 9
Interview Notes This paper aims to develop a web-based emergency management system for the government of Lazarus Island. In particular, this system will be used at the response stage of disaster management, and its key purposes will be to help coordinate the relief efforts of various governmental and non-governmental organizations....
Topic: Disaster
Words: 1779
Pages: 6
Background WIFI’s reliance on radio frequencies for data transmission has two significant limitations. First, the amount of data that can be transferred at a time is limited; and second, radiofrequency resources are constrained, which might lower WIFI capacity to transmit data in the future. One of the solutions to this...
Topic: Tech & Engineering
Words: 1514
Pages: 5
Symbol Meaning(s): This symbol is new to society since it has been created as a result of the emergence of new digital technology. It looks like an upside-down drop with a circle in it. Its appearance resembles a hot air balloon or a pin that travelers put on the world...
Topic: Tech & Engineering
Words: 227
Pages: 1
Identifying strategic issues and options of the organization requires close analysis of its external and internal macroenvironments. The scope of this assignment covers detailed analysis of Australian Securities and Investments Commission (ASIC), its current problems, and areas for growth. Prior to deriving insights regarding ASIC’s strategic issues and options, it...
Topic: Tech & Engineering
Words: 1987
Pages: 7
Introduction Google Play Store app is pre-installed on compatible Android devices. You can download applications, games, and other digital content. You can download free and paid games for your Android phone on Google Play. Your Smartphone has a Google Play Protection feature that warns you about potentially dangerous applications and...
Topic: Google
Words: 392
Pages: 1
Technology is an irreplaceable part of numerous life spheres, and medicine is not an exception. Electronic medical records (EMRs), electronic health records (EHRs), and others are essential parts of clinical information systems in the United States. For example, the EHR is a continuous record of patient health information that is...
Topic: Tech & Engineering
Words: 555
Pages: 2
Introduction Identification and authentication are the most important requirements of any security system. Electronic systems such as computers and communication devices have some sort of identification and authentication capabilities. Radio Frequency Identification (RIFD) technology is a form of Real Time Location System (RTLS) that uses an object known as RFID...
Topic: Radio
Words: 1568
Pages: 5
The iPhone X is one of the smartphones innovated and designed by Apple Inc. and it was released in 2017. The device delivered new features that lacked in its predecessors, such as the Face ID and OLED screen. It uses Apple A11 bionic system and delivers a slate form factor...
Topic: Apple
Words: 832
Pages: 3
Executive Summary Zero Trust Architecture is an innovative way of providing cybersecurity, which is beneficial for companies who have confidential information and, at the same time, outsource employees who do not work from the office computers. It is focused on protecting diverse resources such as databases, network accounts, and different...
Topic: Tech & Engineering
Words: 1739
Pages: 6
Procedural programming and Object-oriented programming (OOP) are two paradigms in programming. They are fundamentally different in how they approach problem-solving and organizing programs. Under procedural programming, a program is organized as a step-by-step instruction to solve a problem. The instructions are executed linearly, but they can include elements that control...
Topic: Programming
Words: 319
Pages: 1
The film industry in Indonesia has been growing during the last several decades. One of the significant factors that influence this sector is technology development. The emergence of new internet technologies has made video content accessible to mass audiences, providing entertainment and education. However, the implication of new technologies has...
Topic: Cinema
Words: 398
Pages: 1
Project Objective To upgrade the existing email system by January 15th, 2011, in such a way that it becomes: one system with a capacity of 2500 users, replacing the existing 5 systems and making it capable of both LAN and remote (Wi-Fi) access; install new standards and protocols, reconfigure the...
Topic: Tech & Engineering
Words: 644
Pages: 2
Introduction With the nature of the information handled by Metropolitan Police and the number of staff authorized to access this information, there is a great need for the institution to ensure that every staff has access only to the information he or she is authorized to access. Identity and access...
Topic: Management
Words: 2474
Pages: 8
Introduction Programmable controller applications refer to digital computers that are designed for the automation of electrochemical processes. They are mainly used in different industries and machines for purposes such as packaging. PCAs differ from general-purpose computers in that they are designed to accept multiple inputs and output arrangements, temperature ranges,...
Topic: Tech & Engineering
Words: 532
Pages: 2
Being on the Internet requires a lot of critical thinking and the ability to discern fact from fiction. With the abundance of information that is thrown at Internet users from every corner of every site, the range of false data is huge, and taking this information for granted may cost...
Topic: Fiction
Words: 853
Pages: 3
Introduction “Safety of the workers and the users of a facility is one of the most essential aspects for any engineering work.” (Skibniewski, 1983) Fault or failure in a completed project can lead to huge costs in terms of repairs and accidents. The defects may also cause unnecessary delays or...
Topic: Management
Words: 920
Pages: 3
Introduction Competition in business is increasing by day. Price of goods is not just the factor that has to be overlooked while considering the overall development of business but quality of products and services to customers should also be considered. Time also plays a major role in all business activities....
Topic: Technology
Words: 1154
Pages: 4
Introduction System engineering is generally required for the proper arrangement of the managed system and for professional risk management practices. Considering the fact, that the necessity to improve the entire performance of any system is required for the smoother decision making and problem solving processes, the system engineering practices are...
Topic: Tech & Engineering
Words: 1616
Pages: 6
Introduction Social media platforms provide an immense opportunity for people to share their experiences with the world. TapBooth has numerous features that allow its users to improve their experience while taking photos and posting them on the most popular platforms (“Help,” n.d.). However, I would like to focus on the...
Topic: Tech & Engineering
Words: 555
Pages: 2
A project is a temporary establishment, intended for the creation of unique products and services. “Temporary”, implies that every project has a beginning, and inevitably an ending point, reached when the established objectives are completed. “Unique”, on the other hand, means that the created products or services sufficiently differ from...
Topic: Management
Words: 2472
Pages: 9
Situational awareness is crucial in carrying out unmanned missions, which is why any opportunity to improve it deserves careful consideration. The majority of opportunities to enhance situational awareness belong to its first stage, which is the perception of the needed data. Research indicates that it is the most error-prone component...
Topic: Tech & Engineering
Words: 296
Pages: 1
It is quite easy to provide a basic technical definition of Virtual Reality. It is a three-dimensional environment generated by a computer with which an individual can interact. What is more, a person using special tools like VR headsets and controllers can manipulate objects stimulated by computers and perform some...
Topic: Virtual Reality
Words: 280
Pages: 1
Information technology (IT) has been useful in transforming different sectors of modern economies. Business entities have integrated innovation in management and operational roles for effectiveness. Similarly, academic institutions have adopted online information systems for enhancing students’ performance. Many communities practiced farming and cattle rearing as a traditional way of life....
Topic: Agriculture
Words: 888
Pages: 3
Surface Vessels Wave Glider is an unmanned marine system (UMS) unmanned surface vehicle with full autonomous capability. It is produced by Liquid Robotics, a wholly-owned subsidiary of The Boeing Company (“Wave glider,” 2019). Ten feet long, it employs wave energy to propel itself forward with complimentary use of stored solar...
Topic: Vehicles
Words: 582
Pages: 2
ompiler optimization is important in computing, as it enhances the performance and operation of executable computer programs. The process of optimization may involve either the minimization or maximization of certain attributes or aspects of the execution process. The essence of compiler optimization is to hasten the execution process by minimizing...
Topic: Tech & Engineering
Words: 1161
Pages: 4
Though theoretical knowledge is essential, there is a growing belief that while teaching applied sciences, particularly engineering, a great emphasis should be put on the development of students practical skills. Therefore, some courses and curriculums need to be revised to improve the current state of education in this sphere. Many...
Topic: Students
Words: 909
Pages: 3
Safety management systems (SMSs) are an essential component of the aviation industry. Throughout the history of aviation, safety measures evolved from crew resource management aimed at improving communication between the crew members to the contemporary SMSs (Petitt, 2017). In order to continuously develop and improve the existing SMSs, sufficient information...
Topic: Aviation
Words: 582
Pages: 2
The search formulated as Stress site: Nature.com provides links to numerous publications about stress on the website of the scholarly journal Nature. These publications mainly focus on either high levels of stress found in contemporary society or the neural mechanisms involved (“Stress,” 2020). The search reveals that stress occupies a...
Topic: Google
Words: 326
Pages: 1
Introduction The history of artificial intelligence as a new scientific direction begins in the middle of the 20th century. By this time, many prerequisites had already been formed for its origin, where among philosophers, there have long been disputes about the nature of men and the process of knowing the...
Topic: Artificial Intelligence
Words: 1166
Pages: 4
Introduction Artificial intelligence (AI) refers to the development of machines that simulate human intelligence, both in action and thought. It is a revolutionary branch of computer science that applies multiple approaches. Examples of AI technologies widely used today include planning, speech recognition, learning, and problem-solving. AI is common in the...
Topic: Artificial Intelligence
Words: 573
Pages: 2
Technological progress has created numerous benefits, improving the quality of human life. What is known for a fact is that technological progress is unstoppable and inevitable as humanity has been using the results of technology for so long that it is hard to imagine the life without it. However, the...
Topic: Tech & Engineering
Words: 543
Pages: 2
iPhone is superior to Android because of its design, innovative technology used to build these phones, Apple’s operating system, and the company’s excellent service. Opponents may suggest that Android phones released recently are comparable in design to those by Apple. Moreover, Apple’s devices are recognized for their uniqueness and the...
Topic: IPhone
Words: 126
Pages: 1
Abstract Technological changes are happening at so fast a rate that organizations have to constantly remodel their strategies in order to beat competition. One of the major changes that institutions have had to undergo is the installation of reliable information systems such as office automation regimens. This paper seeks to...
Topic: Tech & Engineering
Words: 604
Pages: 2
The Internet was created for education, free transfer of information, the unification of communication, and a healthy society’s development. However, it has become a place to support anger and hatred, where people reflect their anti-social views. Numerous terrorist attacks were planned on the Internet, with the preparation and planning stages...
Topic: Internet
Words: 314
Pages: 1
Introduction The invention of computers basically as a vital communication tool has revolutionized man’s lifestyle in a big way. It has made the world today to become too small and be referred to as a “global village”. This new development has led to emergence of a new wave of crime...
Topic: Computers
Words: 1584
Pages: 6
Social engineering refers to a wide range of psychological maneuvering of misleading people to reveal confidential information and imperil its security. There are numerous forms of manipulations, which hackers use to make their victims disclose personal details. Moreover, cybercriminals follow a set of specific social norms within their subculture. This...
Topic: Tech & Engineering
Words: 621
Pages: 2
The unmanned ground vehicle (UGV) is a means of transportation on the ground, which can work without a person on board. This type of transport offers a profitable solution for many previously problematic areas of human activity. In places where it is hard or threatening for a person to work...
Topic: Technology
Words: 303
Pages: 1
Unmanned Aircraft Systems (UAS) operators stand for remote pilots of autonomous observation aircraft, such as drones, for example, that collect intelligence information. Space Systems operators functions include support of the space-related missions via air traffic controller. The current paper provides a comparison of situational awareness experienced by these two operators,...
Topic: Tech & Engineering
Words: 1111
Pages: 4
Electromagnetic waves of different lengths and frequencies are used for different purposes based on their characteristics and capabilities. The contemporary world technology utilizes the whole spectrum of electromagnetic waves from the longest radio waves to the shortest Gamma rays. Due to these waves’ capabilities to spread over long distances and...
Topic: Cinema
Words: 274
Pages: 1
Robosub is incredible international competition for mainly student teams seeking to demonstrate their technical success in developing fully autonomous submersibles that showcase the skills of modern devices. It should be recognized that the unique feature of the competition entirely affects the final design, which should have an unmanned device: according...
Topic: Competition
Words: 598
Pages: 2
The Flower Fairy Tale focuses on supplying custom and designer bouquets, which means that there is additional stress on the importance of the product being assembled by hand. This eliminates the option which would imply using robots or any other form of mechanical assistance in the production process. However, business...
Topic: Tech & Engineering
Words: 583
Pages: 2
Introduction In the globalized world of rapidly evolving information technologies, designing and maintaining websites gained several forms, combining machinery and creativity. As a matter of fact, the website’s effectiveness depends on multiple undebatable factors, such as convenience, organization, and appealing design. Comparing and contrasting the websites of two prominent American...
Topic: Web Technology
Words: 983
Pages: 5
Introduction Nanoparticles, also identified as ultrafine particles, refer to matter particles with a diameter of between 1 and 100 nm (nanometers). They have specific characteristics such as their inner structure, shape, surface characteristics, and size, which render them different from other materials, including spatial confinement, high surface energy, and various...
Topic: Tech & Engineering
Words: 747
Pages: 2
Introduction Team performance measurement plays an integral role in establishing a connection between planning, decision-making, actions, and results of a project. By analyzing team performance, determining its strengths and weaknesses, and assessing results, team members get the necessary information to avoid failures, monitor the progress, ensure continuous improvement, and achieve...
Topic: Performance
Words: 2658
Pages: 10
Abstract Efficient communication has been identified as a potential tool to enhance organisation agility. Many businesses have benefited from efficient communication systems in order to enhance their competitive advantages. Meanwhile, organisation depends on the real time communication to enhance organisational decision-making. Thus, this proposal discusses modelling of a network deployment...
Topic: Tech & Engineering
Words: 2459
Pages: 10
Since the invention of the internet protocol, communication has astronomically advanced creating new possibilities that did not exist before. Computer Supported Cooperative Work (C.S.C.W) is a technology that seeks to use computer systems to allow, coordinate and monitor collaborative group work. Developed recently, Google Wave is a web service technology...
Topic: Computers
Words: 2587
Pages: 9
The 2020 public hearing held by the CRTC (Canadian Radio-television and Telecommunications Commission) makes part of a comprehensive review of mobile wireless services. In his opening remarks, Ian Scott, the CEO and chairperson of the CRTC, stated that between 2016 and 2018, providers had made a lot of progress. They...
Topic: Radio
Words: 303
Pages: 1
One of the important aspects that Information technology has brought forward is telecommunications. Communication networks play an increasing important role in an ever shrinking business world. Organizations, big or small, used these networks to exchange information even beyond geographical boundaries. Through research, new communication standards are developed on regular basis...
Topic: Technology
Words: 874
Pages: 3
Study Design The study will employ a cross-sectional research design in examining regulations and technologies employed in the aviation industry to provide a high level of performance in safety management systems (SMS). This research design is appropriate because it is easy to implement, promotes data collection from a representative sample,...
Topic: Management
Words: 568
Pages: 2
Introduction Chrome OS refers to a Google-designed, open-source operating system based on Gentoo Linux. The aforementioned technology is derived from the Chromium OS–free software. It also utilizes the Google Chrome browser as its primary or main user interface (Hachman, 2019). Chrome OS stores user data/information and applications in the cloud,...
Topic: Google
Words: 938
Pages: 3
With the rapid development of new technologies, the safety of personal data is expected to increase. However, no matter how secure a wireless network is, there are some special tools and methods that allow certain people to crack it. Despite the fact that there is a great number of solutions...
Topic: Cybercrime
Words: 573
Pages: 2
Cryptographic Basis of Encryption Encryption is the process of converting data into a coded format for security and confidentiality purposes. This process is achieved by passing data through a predetermined set of mathematical formulae known as encryption algorithms. The most commonly used techniques of data encryption include symmetric and asymmetric...
Topic: Encryption
Words: 689
Pages: 2
In the contemporary world, interpersonal communication, overall, and dating, in particular, are changing concepts. Contrary to the traditional vision of a regular date filled with meaningful conversations, it is common to see a couple in a restaurant looking down on their phones without saying a word to each other. While...
Topic: Technology
Words: 1653
Pages: 6
Introduction The development of digital technologies and innovations that brought humankind to the era of the Internet has introduced multiple changes of various character in every part of life. One of them is the appearance and constant transformation of a new category of crime associated with computers and communication technologies...
Topic: Challenges
Words: 881
Pages: 3
Search engine crawlers, commonly identified as robots, spiders, or bots, are programs or scripts that methodically and spontaneously browse webpages. Crawling relates to the discovery procedure whereby search engines dispatch a group of robots – spiders or crawlers to locate updated and new content (Amudha & Phil, 2017). Bots, for...
Topic: Tech & Engineering
Words: 654
Pages: 2
Nowadays, people surf the web for pictures of cats much more often than for sketches of atomic bombs. The Internet became a vast database, and it was created to make fast access to this data open to everyone (Cukier, 2014). However, the web is becoming more and more commercialized: people...
Topic: Relationship
Words: 343
Pages: 1
Introduction Transport hubs and routes are in principle associated with particular safety concerns, as transport accidents are frequent causes of injury and death of passengers. At the same time, the airport administration is especially diligent in ensuring passenger safety. Numerous checks and security measures can cause anxiety among people, as...
Topic: Airport
Words: 999
Pages: 4
Over this course, I have learned much about Java and programming in general, particularly the object-oriented programming (OOP) paradigm. As it draws to a close, I understand that the concepts of inheritance and polymorphism are complex and challenging to master. Although I understand their application and utility, I still have...
Topic: Personality Development
Words: 305
Pages: 1
The development of technologies allowed humanity to communicate with each other over long distances. Today, when connecting is no longer a problem, the focus has shifted to the quality and security of networking. The Voice over Internet Protocol (VoIP) was created that allows for faster and cheaper communication. Although VoIP...
Topic: Internet
Words: 287
Pages: 1
Cloud storage is a service framework that transmits and stores information on remote storage networks. It is maintained, controlled, backed up, and accessible to consumers over a network, which is typically the internet. It is delivered with just-in-time capability and expenses on request and eliminates the information storage network (Yamato,...
Topic: Tech & Engineering
Words: 1144
Pages: 4
Most of these networks are genetic, worldwide web-based with a complex topology. A scale-free network is a connected network with the property that the number of links originating from a given mode exhibits a powerful law of distribution. This is network is constructed by adding nodes to the existing network...
Topic: Tech & Engineering
Words: 1244
Pages: 4
Data loss is the center of focus of business continuity and disaster recovery (BC/DR), as this is the lifeblood of business operations today. Any business threatening IT-related disaster resulting in significant loss of data is risky for companies of any size. As a result, backing up information is essential to...
Topic: Disaster
Words: 297
Pages: 1
The topic of this paper is Steve Job’s use of the tools of fiction in his product launches. His success, to a great extent, was a result of his artistic approach to presentations. Bill Gates stated once, describing Job’s public speaking skills: “He’s even a bit nervous because it’s a...
Topic: Apple
Words: 763
Pages: 2