The biometric software application can uniquely identify or verify an individual using a comparison and analysis of features based on the contours of a person’s face and behavior. This software can compare it with information in the database for subsequent identification. The author’s thesis aims to identify the benefits of...
Topic: Airport
Words: 952
Pages: 3
Abstraction In this method, the process of defining and analyzing data requirements to support the business process of an organization is known as data modeling. All data is stored in a model called concept model which has data definitions. It is implemented using logical models. There are different data models...
Topic: Tech & Engineering
Words: 2712
Pages: 10
Introduction The field of information technology has been faced with many challenges in its development. However, the security of data is arguably the main challenge in the whole industry. Every new product has to include an aspect of security to attract customers. This paper looks at the security of data...
Topic: Information Technology
Words: 2073
Pages: 8
Introduction VoIP (Voice over Internet Protocol) refers to the technology that enables the transmission of voices through data networks. As the name suggests, VoIP transmissions are carried out using IP (Internet Protocol). The increasing ubiquity of IP voice services in the United States has raised concerns due to unequal regulatory...
Topic: Tech & Engineering
Words: 580
Pages: 2
Introduction Developments in technology have come with both advantages and disadvantages. The close association of technology and crime is neither new nor young. Over time, the potential to create harm through the supposed advantage of technologies has grown exponentially especially on the lines that exploit chains of trust of people...
Topic: Crime
Words: 2745
Pages: 10
Google Search is a universal information search tool used by millions of people. Many scholars agree that Google Search is also a useful research tool (Miller and Record, 2017). But this tool has drawbacks and limitations, which should be considered when searching through Google Search. Moreover, awareness when using search...
Topic: Google
Words: 1487
Pages: 5
Introduction With the advent of the internet, there are so many websites online, some have authentic information while others do not. It is important to have the know-how of collecting authentic information from a website. This paper analyzes the website www.webmd.com with website evaluation tools provided by Prof. Robert Harris....
Topic: Web Technology
Words: 1376
Pages: 5
Introduction RFID is fast taking shape as manifested by the recent media blitz and newspaper articles about the technology. Not many people are able to distinguish the different categories and benefits that the technology brings. It is the purpose of this paper to highlight on the history, uses and benefits...
Topic: Radio
Words: 2947
Pages: 10
Introduction Organizations cannot function effectively without data. In the 21st century, most organizations such as educational institutions, businesses and government agencies depend on modern information systems in undertaking their transactions (Whitman & Mattord, 2011, p. 40). As a result, protecting the data, either held by the firms or data that...
Topic: Tech & Engineering
Words: 917
Pages: 3
Introduction This proposal covers upgrading from Windows 7 to Windows 8.1. Currently, HACKM, LLC has around 5000 desktops/laptops that run Windows 7. In addition, many employees will also be connected to tablet computers. Apart from migration to Windows 8.1, the company also strives for efficient and optimal use of Windows...
Topic: Tech & Engineering
Words: 1820
Pages: 7
The current level of technology development allows the creation of many technological solutions aimed at ensuring human safety. One of the directions in this area is replacing humans with autonomous robots controlled by an operator. Thus, a person can be protected from working in a hazardous environment, and the likelihood...
Topic: Airport
Words: 386
Pages: 1
Introduction Business needs and accounting operations have a great effect on the profitability of a business. Many organizations have integrated computer systems in their businesses to help them in accounting operations and meeting the business needs. However, integration of computer systems in a business is not enough. The most important...
Topic: Computers
Words: 918
Pages: 3
Modern Computers and Their Functions in Human Lives The use of computers changes human life considerably in different ways. People discover more ways on how to improve their work, communication, and calculations. Within a short period of time, a computer becomes an integral part of this life, and there is...
Topic: Computers
Words: 518
Pages: 2
Introduction Titanium Diboride is a hard compound that consists of Titanium and Boron. Titanium Diboride is useful in designing various products (Huber, 3000). One such product is a capacitor. Apart from capacitors, Titanium Diboride is used in the making of extremely hard materials such as army wares and ceramic cutting...
Topic: Tech & Engineering
Words: 3637
Pages: 14
Summary description of its structure and purpose The site PCMAG.COM has rather interesting and clear structure with the help of which it is possible to identify the purpose set by the site developers. Looking at the main page of the site, the visitor is free to choose any interesting for...
Topic: Tech & Engineering
Words: 610
Pages: 2
Introduction Computer security and data safety have become the stepping stone for most organizations and individuals. In general data protection and informational safety require increased attention and awareness of the users. Forensic software may be used for various aims, however, the key functionality range is closely linked with data safety,...
Topic: Forensic Science
Words: 1108
Pages: 4
The Balanced Scorecard or BSC is performance management and IT governance tool, which is used to evaluate the companys efficiency and identify those aspects which need modification or improvement (Kaplan & Norton, 1996). It helps to develop the policies of the enterprise according to the vision and the initial goals....
Topic: Tech & Engineering
Words: 849
Pages: 3
The companies, which specialize in the development of software solutions, have to attach great importance to business continuity planning because they are exposed to many internal and external threats, for example, the failure of hardware, virus attacks, power cuts, mistakes of the personnel and so forth. Each of these threats...
Topic: Tech & Engineering
Words: 1126
Pages: 4
The term “Anthropocene” was coined to refer to the era in which human beings became the main driver of environmental change. While scientists argue about whether a new geological era should be officially distinguished in the history of the Earth, the atmosphere is rapidly changing. An increase in the level...
Topic: Environment
Words: 1141
Pages: 4
Introduction There are several barrier related to technology integration into studies. This literature review explores different aspects related to factors that affect technology integration into studies as well as the appropriate measures that need to be considered to address these underlying issues. This section has been put into four sections....
Topic: Technology
Words: 2444
Pages: 10
Quoting the words of Jakub Mochon, CT product manager at Siemens Medical Solutions, let us state that “the U.S. health system is very dependent on CT”, it is absolutely evident (Dargan, 2009/2010, p.30). According to the data provided by McCollough et. al., the usage of CT scans has increased dramatically....
Topic: Tech & Engineering
Words: 564
Pages: 2
Introduction Science is the marvel of the present world and modern technologies are an application of science to fulfill man’s long-cherished dreams to control and manipulate the forces of nature for his relevance. But at the same time, it is also very true that the blessings of science depend upon...
Topic: Technology
Words: 557
Pages: 2
Introduction: Facts of the case On February 06, 2014, Ioan Leusca and Dezso Gyapias were charged in a U.S. Federal Court for stealing customer data from automated teller machines (ATMs). The two men had used data acquired from the ATMs to steal from bank customers in Connecticut, New Jersey and...
Topic: Computers
Words: 1682
Pages: 6
The issue touches on the ethics and legality of OSHA to change the levels allowed for benzene exposure in the workplace after the publication of a new report that reveals the number of deaths caused in places where the level of benzene was above 10ppm yet the required amount was...
Topic: Ethics
Words: 875
Pages: 3
PayPal, an online money transfer service established in 1998, has since become the primary form of money transfers, overtaking the traditional system of money orders and checks. With a total income of $7.9 billion, the service allows users to deposit, withdraw, and transfer funds with 26 different currencies globally. Peter...
Topic: Tech & Engineering
Words: 558
Pages: 3
The Internet has never been popular than now. With a rapidly growing user base, the internet has become a household thing that is used by almost everyone in the house for activities such as entertainment, shopping, education, and socializing. While the Internet itself is a blessing for anybody who uses...
Topic: Freedom
Words: 1413
Pages: 5
Introduction In the context of public construction projects in Abuja Nigeria, project success can only be realized when stakeholder performance is evaluated against a performance evaluation framework. A performance evaluation framework provides well established and evaluated standard measures against which the performance of project stakeholders can be measured to evaluate...
Topic: Construction
Words: 7116
Pages: 27
Introduction In the 21st century, the technological environment is under influence of high degree of robustness (Barry, Atul & Arun 1). This has had a great impact on various sectors of the economy. Amongst the technological sectors that have undergone revolution with a high magnitude, is the information communication technology...
Topic: Evolution
Words: 1515
Pages: 5
Introduction The past few decades have witnessed a dramatic increase in the number of internet users. This upward trend has been accompanied by an almost parallel increase in the process of streaming, which is a data transferring technique which enables users to process data continuously without interruptions in the form...
Topic: Internet
Words: 2218
Pages: 8
Due to globalization, there is greater demand for electricity, as most of the productive activities require energy power. Globalization has brought people, institutions, and governments of various nations together. Through globalization, international trade and capital investments have been conducted internationally through the help of information technology (Ehrfeld 210). The interaction...
Topic: Energy
Words: 1434
Pages: 5
What is Finite element analysis via (FLAC)? And how is it done? Finite element analysis (FEA) could run in 2D or 3D and is used for geotechnical applications in the determination of tunnels, deep foundations, slope stability, seepage analysis, soil structural analysis, and capacity for earth retaining structures (Lee, Y.S....
Topic: Tech & Engineering
Words: 7500
Pages: 27
Garmin defines the Global Positioning System or GPS as a satellite based navigation system that is made up of a group of 24 satellites that have been placed into orbit by the United States Department of Defense (Garmin 1). Originally, the Global Positioning System was referred to as Navstar Global...
Topic: Tech & Engineering
Words: 1451
Pages: 5
Introduction The Xyz Company is a business organization offering its clients textile products and services within the major category of textile industries. In XYZ organization, communication is a very crucial activity for the growth and development of the company. Since the inception of xyz, communication has been a matter of...
Topic: Tech & Engineering
Words: 1556
Pages: 5
Introduction Contemporary computing and Information Technology has seen the surge of various forms networking projects to provide especially the cyber landscape with highly advanced features that its infrastructure have not been naturally supporting. Critical challenges in the aspects of naming, addressing as well as mobility and security among other aspects...
Topic: Tech & Engineering
Words: 2664
Pages: 10
Energy harvesting can be described as a process of deriving energy from external sources, such as the sun, thermal power, and the wind. This method of capturing and storing energy is considered safe for the environment, and therefore, is a promising innovation. The energy harvesting systems are the technology used...
Topic: Energy
Words: 594
Pages: 2
Introduction Verizon is a telecommunication company in America providing services for wired and wireless communications beads on third-generation technology (Verizon, 2011a). The organization is innovative in the telecommunication sector and it provides video and broadband communications and other modes of entertainment through an advanced fiber-optic network. The organization is committed...
Topic: Tech & Engineering
Words: 1566
Pages: 6
Bogdane, R., Gorbacovs, O., Sestakovs, V., & Arandas, I. (2019). Development of a model for assessing the level of flight safety in an airline using concept of risk. Procedia Computer Science, 149, 365-374. The authors consider the current state of the SMS in aviation, suggesting general approaches such as a...
Topic: Aviation
Words: 1515
Pages: 6
Introduction Light-emitting diode, usually called LED, is used in a variety of electrical devices They send out signals from remote controls, figure out the numbers on digital clocks, signal you when your electrical devices are turned on, and lights up watches. When put together, they can form large pictures on...
Topic: Tech & Engineering
Words: 765
Pages: 3
Introduction The Association of Computer Machinery (ACM) code consists of 24 imperatives that are formulated as statements of personal responsibility. It comprises most of the issues that professionals are likely to encounter. The ACM code outlines how software engineers should conduct themselves ethically in their profession, and while relating to...
Topic: Computers
Words: 688
Pages: 2
The foremost thesis presented by these authors can be formulated as follows: the way in which codes of ethics help to advance the cause of an organization is not as much concerned with promoting the freedom of innovation, as it is concerned with controlling the actions of the employees. According...
Topic: Ethics
Words: 1109
Pages: 4
Introduction When first introduced in the second half of the 20th century, personal computers were expensive and of interest mostly for business users. However, Moore’s law has been proving itself accurate and today computing is cheap. Despite economic advancements and unprecedented increases in global GDP, only half of the worldwide...
Topic: Tech & Engineering
Words: 1101
Pages: 4
Encryption The security of data and information of the B manufacturing is paramount. The computer network represents one area that is vulnerable to security compromise, which might be detrimental to the prosperity of the company. Therefore, it is would be useful to encrypt data or information Schneier, 2001) that is...
Topic: Manufacturing
Words: 1288
Pages: 6
Introduction A microprocessor, commonly referred to as the Central Processing Unit (CPU), a central place where all data processing is done, is a gadget that distinguishes only binary code as numbers and ascertains basing on the orders by employing assemblage languages. This piece of writing is a detailed explanation of...
Topic: Tech & Engineering
Words: 1692
Pages: 8
Institutions of higher learning are increasingly using technology to aid in the learning process. However, this vital resource is prone to constant failures that slow down the learning process. In addressing this problem, Hitch (2002) and Wepner (2004), present similar and diverse ways of dealing with this predicament. Hitch (2002,...
Topic: Tech & Engineering
Words: 587
Pages: 2
Introduction Social networks have been having privacy issues; in the case of Beacon and Facebook, Facebook had made it possible for people to share their private life with others using Beacon; the launch had been done in December 2007. When the program was launched, it seemed to facilitate business and...
Topic: Ethics
Words: 600
Pages: 2
Abstract This research paper’s major purpose is to discuss and research accessibility issues in relation to websites. The paper questions whether enough is being done to make websites suitable for people with disabilities and from that look at what could be done to improve the area going forward. Do individuals/...
Topic: Technology
Words: 3706
Pages: 13
The code fragments that must be included in an interrupt system include the following: 1. Code that covers or uncovers interrupts. This can be achieved through setting the 1 and X bits in the CCR, thus executing the command: ORCC #%00010000. 2. Code that defines system vectors that handles interrupts,...
Topic: Tech & Engineering
Words: 734
Pages: 2
Airport Operator Security Responsibilities The business of securing a commercial airport is, ideally, a shared responsibility between the airport operator and the Transportation Security Administration (TSA). Before the September 11 attack, every aspect of airport security was the responsibility of the airport operator, except for passenger screening. Since, September 11,...
Topic: Airport
Words: 596
Pages: 2
Concepts Raised by the Case Study Among the paramount concepts learnt in class that are evident in this case is the issue of responsibility. For Google to convince the populace that it can effectively handle their medical records, it must take the responsibility to guarantee secrecy of medical records. The...
Topic: Tech & Engineering
Words: 1912
Pages: 7
Literature review Mobile ad hoc networks are typified by wireless multi-hop channels that are connected to mobile nodes, which “do not rely on a pre-existing infrastructure [1]”. In the recent past, the field of mobile ad hoc networking has attracted a great deal of attention from many scholars as a...
Topic: Tech & Engineering
Words: 1379
Pages: 5
Encryption refers to a system that programs a plain readable text into a non-readable status for security purposes. The sender uses an encryption system to send the data, such that the receiver will have to use a key to retrieve the data to a readable form again. The major use...
Topic: Encryption
Words: 1162
Pages: 4
Summary Within the last two years, a series of events have happened that are characterized with internet hacking. Some of these activities include spying on google documents, Western companies, spying on Iran’s nuclear sites using Israeli created Stuxnet and spying on US secret cables by wikkiliks. Cybersecurity laws in the...
Topic: Cybersecurity
Words: 2037
Pages: 7
Introduction Online threats remain a reality for today’s businesses, especially those relying on the internet. Active and passive attack incidents are escalating every day and network administrators are having a daunting task of detecting, controlling or minimizing the effects of such attacks. Stewart, Tittel and Chapple concur in that one...
Topic: Tech & Engineering
Words: 1388
Pages: 5
Technologies have become an integral part of modern life. Digitalization could be noticed in medicine, building, and transportation, to name but a few areas affected by this process. Still, the implementation of new technological facilities and ways of schooling based on them is a highly disputable topic. In the present...
Topic: Tech & Engineering
Words: 5790
Pages: 21
Introduction Modern education experiences an influx of innovations in the manner of conveying information. The advancements of technology have allowed using the Internet for distance learning. However, to ensure the adequate efficiency of online learning, appropriate teaching strategies should be implemented. The recent pandemic has restricted many traditional venues for...
Topic: Teaching
Words: 1096
Pages: 4
Introduction Jet fuel refers to a form of aviation fuel, made up of a mixture of a great amount of various hydrocarbons, which is manufactured for use by aircrafts. It is crucial that the fuel used in a jet be of the required quality because contaminants can be detrimental not...
Topic: Aviation
Words: 866
Pages: 3
The course concerned ‘Program Design and Implementation’ at my workplace provided me with keen ideas on the various design strategies and the methods for implementing them. The knowledge that I acquired from the lessons helped me to develop good designing and programming skills. I’ve been working in the Program Design...
Topic: Tech & Engineering
Words: 1519
Pages: 6
Computer trading in the stock exchange market has come to replace floor trading which is much slower. Orders are currently being processed much faster and the system is deemed to be more efficient. This system is observed to respond in milliseconds as compared to a slower rate if it were...
Topic: Computers
Words: 554
Pages: 2
Introduction Processes involving mixing have been associated with chemical-manufacture processes often and have been known to be very instrumental to successes recorded in operating combustion-driven systems. Presently, several computational-fluid-dynamics (CFDs) who are engaged with processing chemicals in industries have to be capable of adopting the usage of simulations for validating...
Topic: Vehicles
Words: 1079
Pages: 4
Introduction The field of ethics is a very important one which can be viewed as universal in its applications and practice. However, many individuals do not believe that ethical practices are universally applicable in all areas of operation, and therefore, some of them end up associating more of their applications...
Topic: Ethics
Words: 915
Pages: 2
Introduction Boeing is currently one of the leading manufacturers of aircraft, satellites, rockets, rotorcraft and missiles in the world today. Companies in the aviation industry can also hire or lease airplanes from this organisation. This corporation’s diversification strategy and business model explain why it continues to compete directly with Airbus....
Topic: Crisis Management
Words: 2223
Pages: 8
Business Intelligence is typically a broad grouping or category of diverse applications and technologies allied to gathering, analyzing, storing as well as offering access to essential data to aid the enterprise end users makes sound business verdicts. Hence, BI aspects encompass such features as query, reporting, decision support systems, online...
Topic: Business Intelligence
Words: 606
Pages: 2
Introduction This report provides information regarding the Resource Scheduling project. The Resource Scheduling project is useful for a consultant company that provides resources of different types to various companies for a particular duration. An example of a company that would require this kind of software is an IT consultant company....
Topic: Software
Words: 4129
Pages: 15
In the given magazine article, I would like to provide a simpler and plainer explanation of artificial neural networks to the general public by describing their current state of development. The target audience is comprised of individuals who are not educated and trained in the specified field, but willing to...
Topic: Tech & Engineering
Words: 859
Pages: 3
Response 1 I agree with Danielle on the topic of using visual media, such as animations and images, in the educational process. A teacher must implement this method of conducting knowledge when interacting with younger generations. Barry et al. (2015) state that students “are willing to merge their online presence...
Topic: Tech & Engineering
Words: 296
Pages: 1
Calibration is an important practice that ensures instruments meet their desired standards of operation. To make sure that this obligation is met, standardization bodies have to be set up to check conformity and compliance with the set standards. Therefore, the role of calibration goes hand in hand with the duty...
Topic: Tech & Engineering
Words: 779
Pages: 3
Introduction Liability is the responsibility that is borne by a party. It is a common term in the insurance business. Aviation product liability deals with the responsibility, mostly financial, that is borne by a party as a result of injury or damage resulting from the products that are used in...
Topic: Aviation
Words: 2563
Pages: 9
Introduction The purpose of this point paper is to explain the importance of implementing cybersecurity strategies for healthcare organizations that currently adopt information technologies based on the case of ransomware attacks. Our intention is to sell the technological tools for telemedicine services, as well as provide guidance on the ways...
Topic: Cybersecurity
Words: 665
Pages: 2
Technology is transforming many fields of study by introducing new tools and possibilities for people to communicate, collect data, and use it to test hypotheses. Business administration is not an exception, with more non-technology oriented companies adopting artificial intelligence (AI). This paper will examine how artificial AI is transforming business...
Topic: Artificial Intelligence
Words: 839
Pages: 3
Performance requirements are important to consider when developing a solution. It is unacceptable to have a web service that takes several seconds to reply to a simple request. Therefore, the developer should consider the available methods of improving the performance of their code. Chapter 12 discusses parallel programming, which is...
Topic: Programming
Words: 1106
Pages: 4
Introduction The objective of the essay is to give a brief account of the recent technologies with their respective architectures that can be used in the upgrade of an automobile computer system which enables home system management, or feature upgrades with the onboard system. The important software practices and techniques...
Topic: Management
Words: 536
Pages: 2
Introduction Security is an issue of major concern to society. Increased cases of insecurity the world over have motivated creativity in crime prevention. CCTV and Biometric technology are some of the innovative applications in crime prevention technology in use today. In spite of the popularity of these technologies, there has...
Topic: Ethics
Words: 1827
Pages: 6
In the automated world that is highly dependent on the Internet, it is becoming easier to access personal information. Hackers use sophisticated techniques to breach the systems of big industrial firms and impose threats on businesses. The estimated financial loss for companies for 2015-2016 caused by cybercrimes accounts for about...
Topic: Tech & Engineering
Words: 638
Pages: 2
Radio Frequency Identification (RFID) is a currently accessible technology that makes auto-identification of different objects possible. In other words, it is a system, also known as Auto-ID, that relies on the exchange of data without contact communication. As it comes from its name, the technology works on radio frequency, where...
Topic: Radio
Words: 393
Pages: 1
Introduction Today, the world passes through the hard times because of the pandemic of coronavirus that affects all spheres of human activity. COVID-19, its extremely virulent nature, and the absence of vaccine preconditioned the need for severe restrictive measures to avoid multiple contacts between people and stop the spread of...
Topic: Airlines
Words: 1967
Pages: 7
The process of engineering of software is one that requires a lot of knowledge and includes the process of gathering, designing, actual development, testing for functionality, use and maintenance. It is rear to find a team which constitutes of members who have all the required knowledge to meet the requirements...
Topic: Agile Project Management
Words: 884
Pages: 3
Globalization and advancement in technology has changed the corporate world as companies are pressurized to go digital. For instance, businesses transactions are being conducted over the internet alongside other digital platforms (Cross & Shinder 96). This has led to a growing outcry in the corporate world owing to the rise...
Topic: Hacking
Words: 1800
Pages: 7
Whether one should purchase or build an information system (IS) is a decision that requires specialized expertise to make. For the upper-management, the outcome of both decisions may be the same, but the cost, risk time and labor requirement may differ greatly. Furthermore, the problem for which system acquisition is...
Topic: Tech & Engineering
Words: 224
Pages: 1
Introduction Helpdesk is a company’s technical link meant to avail support to the end users. Today, most firms consider the helpdesk as one of the integral part of a management due to its responsibilities to deliver support services, whenever a client or employee makes an enquiry or an urgent call...
Topic: Tech & Engineering
Words: 863
Pages: 3
Introduction The iPhone is arguably one of the most competitive smartphone brands in the world today. The producing company, Apple, has within the past 13 years designed and delivered superior phones to different customers across the globe. Within this period, the technology giant has succeeded in releasing and marketing a...
Topic: Apple
Words: 832
Pages: 3
Introduction Artificial Intelligence has become a part of the ordinary life of a human in the 21st century. People buy smart houses, cars that drive on their own, and computers that can solve some problems faster than a person. It is claimed that AI has affected many spheres, including the...
Topic: Artificial Intelligence
Words: 376
Pages: 1
Introduction Modern human civilization is built on and continues to be principally dependent on large quantities of energy to sustain it. While fossil fuels and hydroelectric plants have been the primary source of energy for men since the 19th century, these traditional sources have been stretched to the limit and...
Topic: Tech & Engineering
Words: 1667
Pages: 6
Introduction One of the epic inventions related to computers is the internet which has led to a transformation of the world in as far as communication is concerned. The internet via websites presents a crucial front for the achievement of the objectives of most organizations and individuals. As such, it...
Topic: Twitter
Words: 986
Pages: 3
Operating system is a master program that controls the functioning of the computer hardware. It is an interface linking the user and the hardware. The main functions of an operating system include coordinating input and output devices, controlling the use of the backing storage, integrating the user and computer communication,...
Topic: Tech & Engineering
Words: 625
Pages: 2
The Rationale Industrial-scale desalination plants cannot be scaled down for use in remote areas due to the complexity of the technology. Therefore, the need for scaled-down desalination plants to meet specific consumer needs for clean water particularly in remote desert and semi-desert areas cannot be overemphasized. That reinforces the need...
Topic: Alternative Energy
Words: 2841
Pages: 10
Introduction Software engineering is the activity aimed at developing software programmes and applications appropriate for those programmes with regard to compatibility and usability of programmes by different audience including software developers and ordinary customers/users that purchase and upload these applications for personal use only. Every time a specific programme should...
Topic: Agile Project Management
Words: 1655
Pages: 6
Introduction The growth of human knowledge in the field of Artificial Intelligence (AI) has led to advancement in the development and deployment of unmanned autonomous systems. There are multiple examples of unmanned autonomous systems and perform a wide range of activities depending on the medium of operation. Some examples include...
Topic: Artificial Intelligence
Words: 1374
Pages: 5
The initiative regarding the production of an unmanned drone for collecting data seems to be a profitable endeavor. However, there are specific issues that should be considered in this direction in order to ensure the correspondence of the project to the international regulations regarding information processing and storage (Lin et...
Topic: Tech & Engineering
Words: 1173
Pages: 4
Introduction Information technology and systems is the study of the designing, developing, supporting or the taking control (management) of the information that relates to computer systems. It revolves around and includes computer hardware and software applications. This encompasses the ability to control all activities electronically in an organisation. The system...
Topic: Information Technology
Words: 1623
Pages: 5
What is a database? According to the video series, “SQL Server 2005 Express Edition for Beginners,” a database is defined as a computer file that is optimized to store up data in a structured manner. The way in which data is stored in a database is well organized and ensures...
Topic: Tech & Engineering
Words: 1122
Pages: 3
The article conveys the idea that the employee’s time spent on the Internet should be appropriately controlled for the company’s informational security (IS). Personal Internet use takes up 60-80 % of the time staff spends on websites not related to work. Time waste on personal activities is qualified as a...
Topic: Internet
Words: 347
Pages: 1
In order to successfully conduct a project, every involved side must know what to do, when to do, and what is the expected outcome. By expanding on the idea by giving it a rigorous structure for its realization, the success of such a design will be guaranteed. This paper aims...
Topic: Budget
Words: 449
Pages: 3
Introduction International Federation of Consulting Engineers or Federation Internationale Des Ingenieurs Conseils (FIDIC) according to French is a global professional body of engineers, which started in 1913. Belgium, Switzerland, and France are the three countries that came together and started FIDIC as an independent body of consulting engineers. The FIDIC...
Topic: Tech & Engineering
Words: 2646
Pages: 9
Executive Summary This report highlights the underlying reasons for the 2013 UPS flight 1354 crash at Birmingham-Shuttlesworth International Airport, Alabama. The accident happened when the flight crew failed to manage the aircraft during descent. It fell short of the runway during a non-precision landing approach and crashed at the end...
Topic: Aviation Accident
Words: 1654
Pages: 6
The best ideal module for the design effort for independent control is writing an intricate algorithm with the capacity to effectively direct the Unmanned Aerial Vehicle (UAV) past barriers. The component will autonomously guide the UAV through a pre-planned track according to the mission. The current project uses a limited...
Topic: Tech & Engineering
Words: 554
Pages: 2
Net neutrality regulations are critical to the openness and innovation of the Internet. It is a concept that has been built into the creation of the Internet since its foundations almost 30 years ago. Without net neutrality, major internet service providers (ISP) the likes of Verizon and Comcast would be...
Topic: Internet
Words: 567
Pages: 2
Introduction In the twenty-first century, technological progress is concentrated in the field of semi-automatic and automatic innovations. It can be seen everywhere in both the private and military sectors. This is why it is essential to know the latest advances in this scientific area. This paper aims to review academic...
Topic: Tech & Engineering
Words: 553
Pages: 2
Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services and to meet cost, quality, and schedule requirements....
Topic: Tech & Engineering
Words: 2478
Pages: 9
Executive Summary In the engineering of software, the software methodology applied plays a significant role in the final product of the process. For example, in a traditional linear model software is created following a set of steps and changes are often difficult and costly to implement. The pressure created by...
Topic: Programming
Words: 6259
Pages: 23
First, Safety Management System (SMS) is directly related to the provision of safety to the staff that is largely founded on the adherence to and advocating of the established standards by the personnel themselves. Hence, the human factor will be integrated by the related activities of your workers who –...
Topic: Aviation
Words: 283
Pages: 1
Introduction Artificial Intelligence is a broad-based division of computer science specializing in the development of intelligent machines with the ability to perform tasks requiring human intellect. It is a science with many disciplines, approaches, and programmable functions and a capability to learn, reason, solve problems, and make decisions. This paper...
Topic: Intelligence
Words: 1120
Pages: 4
Introduction The world of computing has been the most dynamic revolution in the recent times; it has attracted a number of microchip manufactures to come up with the most sophisticated Integrated Circuitry ever witnessed in the world. With increase in the number of computer users, there has been a great...
Topic: Intel
Words: 1415
Pages: 5
Introduction In the current world of technology, the internet and computing are increasingly finding use in daily activities. Together with the need to access and share information, networking has come to be a very important instrument to achieve this purpose. Networking can be described as the practice of connecting computing...
Topic: Tech & Engineering
Words: 3387
Pages: 12
A database is computerized system of information with the ability to search and process data (Vermaat et al. 556). Data is the collection of texts, images, audio, video, and other items presented in the form of records in the database. Data along with a database management system and applications are...
Topic: Data Management
Words: 566
Pages: 2
Java offers three basic types of loops: FOR, WHILE, and DO…WHILE. Their fundamental function is executing a block of code repeatedly, based on a Boolean condition (Farrell, 2014). However, they differ in how they evaluate their conditional expression (Farrell, 2014). A WHILE loop evaluates its conditional expression before executing, therefore,...
Topic: Programming
Words: 283
Pages: 1
Audience The genre selected for the present analysis is a knowledge base article. The chosen source is a support page for Google’s Analytics application (“How can we help you?” n.d.). The intended audience is represented by the users of the Google Analytics app, which means the people who want to...
Topic: Google
Words: 1515
Pages: 6
The contemporary world is characterized by an increased use of wireless communication. Such communication entails the use of smart phones and iPods in our daily communications. The use of wireless communication has become very essential which has greatly enhanced sharing of information greatly. Security of the information transmitted over wireless...
Topic: Radio
Words: 2276
Pages: 8
The Boeing Company, similar to other large aircraft manufacturers, is experiencing an economic decline due to the combination of recent events. Examining the company’s financial performance from 2015 to 2019, one can see a gradual increase in revenue from 2015 to 2018, followed by a steep decrease between 2018 and...
Topic: Boeing
Words: 640
Pages: 2
Cyber security and information assurance refer to steps taken to protect networks and computer systems from being disrupted as well as preventing unauthorized access (Sara, 2008). Cyber security and information assurance aim at providing three things: integrity, confidentiality and availability (Knapp, 2009). Integrity is enhanced through ensuring that users are...
Topic: Tech & Engineering
Words: 259
Pages: 2
Introduction There has been an increase in the use of the Unified Modeling Language in many contexts; it is used in application domain, methodology, and platform. For this reason, there has been more concern for customized consistency. There has been little support for customizations that are specific safe for the...
Topic: Management
Words: 4257
Pages: 15
Introduction In many engineering applications, there is a need for efficiency. Power management is an elemental strategy for improving efficiency. The idea is to reduce power consumption to the least possible value while ensuring performance is okay. In the design of digital logic, power scaling is a major way to...
Topic: Energy
Words: 934
Pages: 2
Introduction Unmanned vehicles have grown in popularity, especially because of their versatility in use. These autonomous vehicles are used in multiple areas such as monitoring disaster areas, an inspection of projects and infrastructure, military operations, and spraying of agricultural chemicals, among others. The unmanned vehicles are also equipped with cameras,...
Topic: Tech & Engineering
Words: 1399
Pages: 5
The growing concerns about the emerging threats to security mean that intuitions have to upgrade their security system to include intelligence gathering system based on information technology. In this hospital security as well as information technology officers concerned with security issues do want to upgrade and include intelligent building IT...
Topic: Intelligence
Words: 840
Pages: 3
Introduction Globalization is a process beneficial in numerous ways as it supports economic growth and assists in accessing and creating opportunities – the Internet is possibly both one of its most visible facets and a driving force. Web security is one of the issues on which the effects of globalization...
Topic: Globalization
Words: 1999
Pages: 7
Introduction A planned change is a change executed systematically in tandem with organization’s future goals and expectations. It ensures an organization moves steadily in its processes of implementing a given solution. In IT project management, change refers to project management process, where the perceived change facets to a project are...
Topic: Success
Words: 1740
Pages: 5
Abstract This paper investigates the number of Clusters in K-Means Clustering and analyzes the methods used in numbering. The purpose is to obtain the correct number of clusters in a given document with the least number of errors and achieve an accurate number of clusters. A comparison of the different...
Topic: Tech & Engineering
Words: 2475
Pages: 9
Introduction Framers Company is in the process of launching a new product. One of the objectives is to provide customers with low prices within a limited time. The company also aims at producing a product that is unique in the market and one that will fulfill the needs of the...
Topic: Information Technology
Words: 862
Pages: 3
Introduction For a computer to operate, it requires an operating system. Windows XP constitutes one of the many operating systems whose manufacturer is Microsoft Corporation. Windows XP is applicable in a variety of computers ranging from laptops, personal computers and desktops. The emergence of windows XP in the market from...
Topic: Tech & Engineering
Words: 1470
Pages: 5
Internet Privacy has become one of the most commonplace issues in contemporary society. Even though internet connectivity enables many people to interact and share information, privacy issues have remained a big problem for Internet users. Internet-related crimes, such as fraud and cyberstalking, have been on the verge of increasing, hence...
Topic: Internet
Words: 541
Pages: 4
Virtual machines are often called virtual computers because that is what they are. A virtual machine emulates a computer and can run an operating system and a collection of applications, just like any physical computer would. However, while it provides the exact same functionality, it is not based directly on...
Topic: Tech & Engineering
Words: 279
Pages: 1
EMC EMC was first created in 1979 before starting as an information systems infrastructure, dealing in both software and hardware in 1981. With several partnerships, acquisitions, and a series of new research and development projects in various countries including Singapore, and tapping on cheap Chinese labor, the company grew further...
Topic: Management
Words: 1560
Pages: 5
It is common knowledge that learning and teaching can be enhanced by the use of technology. Additionally, the new generation of tech-savvy students have high demands about the use of educational technology. Thus, it is critical that school leaders promote the use of technology on all levels of education. In...
Topic: Technology
Words: 824
Pages: 3
Introduction The Business Intelligence system is integrated with analytical systems that provide the function answers to various business needs. The analytical systems that should be contained in the BI should be highly developed, performance-based, tightly integrated, and readily available for use in analytical and warehouse purposes. Examples of software that...
Topic: Business Intelligence
Words: 1103
Pages: 4
Summary Industrial plants in the United States are unlikely to stop using fossil fuels because the amount of power acquired from other sources is still inadequate. The fact that wind and solar photovoltaic (PV) energy are in short supply has compelled environmentally-conscious organizations to seek different means of mitigating the...
Topic: Electricity
Words: 461
Pages: 2
Introduction The rapid advancement in the use of information technology has also resulted in increased usage of databases for the storage of Information. Newer technologies such as data mining use the stored data in such a way that not only permits quick access to deeply buried information but they also...
Topic: Tech & Engineering
Words: 788
Pages: 2
The paper represents research proposals aimed at revealing core social trends connected with digital transformation in the world and the USA in particular. Key threats for society are mentioned, including digital divide, and methodology is proposed to deepen the current knowledge and understanding of social implications of digital transformation in...
Topic: Digital Transformation
Words: 1550
Pages: 5
Project Scope The Erie Company Department of Public Works — Division of Highways seeks proposals from consultants for professional engineering services for design, construction, administration, and construction inspection services for the Dona Street extension. The extension will be located west of NYS Route 5 for a distance of approximately 1,550...
Topic: Tech & Engineering
Words: 605
Pages: 2
Introduction Database Management Systems (DBMS) is a major requirement in any organizational setup, and one of the most popular DBMS is the Relational Database Management Systems (RDBMS). It is formatively one of the most significant landmarks made towards understanding the hypothetical and technological framework of a database. Although it has...
Topic: Data Management
Words: 1358
Pages: 4
All spheres of modern life are influenced by the technical innovations, developed for the last ten years. Medical care is not the exception. Different types of medical equipment are used during curing for many years. The innovations in the educational sphere have come later. Today the software and other innovations...
Topic: Nursing
Words: 607
Pages: 2
Introduction Information system development methodologies can be defined as a set of procedures and techniques aided with the necessary documentation that is used to design and implement a new information system or update an existing information system (Blanchard & Fabrycky, 2006). The methods of development are usually based on a...
Topic: Tech & Engineering
Words: 3064
Pages: 10
Abstract The literature review is on the digital signature and the opinions of different writers who have written on this topic. There have been some articles written on the topic of digital signature, a problem on cryptography needs to be solved, there are different companies and organizations that continuously use...
Topic: Tech & Engineering
Words: 3070
Pages: 10
Nowadays, autonomous vehicles no longer seem unusual, and their introduction for widespread use is not that far off. Nevertheless, cars operating at higher levels of autonomy require certain infrastructure, and their successful operation depends on a variety of factors, including climate and road traffic. A number of technologies that autonomous...
Topic: Driving
Words: 395
Pages: 1
Introduction In the book by Shneiderman and Plaisant (2010), designing Human-Computer Interaction (HCI) is the science of studying and structuring interaction between users and the devices or machines such as computers. It’s a process that requires proper planning, incorporates numerous fields of disciplines such as the study of computer science,...
Topic: Computers
Words: 3787
Pages: 14
Performance evaluation of i/o workloads Flash-based solid state disks (SSD) is a performance based data storage technology that optimizes the use of flash-based technology to implement its data storage capabilities compared with mechanically available data storage technologies (Park & Shen, 1). Technically, the promise for better performance of the SSD...
Topic: Memory
Words: 2251
Pages: 8
Introduction After many inventions or technology development, threats are also involved in many ways. New technologies give us latest types of crime which directly or indirectly harm us. Computer is the main source of the online data library. It not only gives us our required information, but when we download...
Topic: Cybercrime
Words: 9208
Pages: 40
Introduction The changes in technology force companies to reevaluate business models to remain profitable and competitive in a market. Mobile technologies use has become part of daily life for most people around the world as a way of sharing information. A study conducted by Pew Research Center (2019) revealed that...
Topic: Tech & Engineering
Words: 2203
Pages: 8
Introduction The thought of fully unmanned ground vehicles fascinates everyone with an interest in robotics and automation technologies. Governments, corporations, and individuals have been pursuing various technologies that could see the dream of self-driven robots taking over critical roles, such as warfare in rough terrains and dangerous environments. Emerging technologies...
Topic: Robots
Words: 615
Pages: 2
The success of any business organization depends on its leaders’ willingness to apply appropriate models and theories, empower their followers, and make strategic decisions depending on the forces experienced in the sector. Managers need to utilize their competencies to support all core functions and ensure that every partner is involved...
Topic: Airlines
Words: 2471
Pages: 9
Conficker, which is also referred to as Downup, Downadup and Kido, is a worm that affects Microsoft Windows operating system which was discovered at first in November 2008. It checks for defects in the Windows software to designate computers and connect them into a virtual machine which can be dominated...
Topic: Microsoft
Words: 930
Pages: 3
Introduction Strategic planning is not a concept that is uniquely applied to the field of information technology. In modern times, every segment of life and every undertaking that is successful must utilize the advantages availed by strategic planning. To state simply, strategic planning is about the careful organization of the...
Topic: Strategic Planning
Words: 1984
Pages: 6
Introduction Information systems can bridge what was once an unbridgeable gap between service and a customer by making information available to previously unreachable populations. Current information technology can greatly assist service industries like hotel chains or airlines in making information readily available to previously unreachable populations. In most countries the...
Topic: Tech & Engineering
Words: 2389
Pages: 8
Introduction Not so long ago, the concept of artificial intelligence (AI) was in the earliest stages of its conception and was only pondered over in science fiction. In fact, the alarmist trends in some parts of contemporary global society owe their existence to the early sci-fi novels addressing the ostensibly...
Topic: Artificial Intelligence
Words: 1653
Pages: 6
Since I began working, I have interacted with various types of system software. I have found it very interesting working on different types of BIOS and device firmware, operating systems, utility systems, and operating software. Over time, I have been able to set up several websites using different server operating...
Topic: Software
Words: 1230
Pages: 3
Introduction The software development industry is fast growing as user requirements change-requiring applications that can address these requirements. As the costs of development rises in developed countries, a new source of labour market is emerging to provide labour for development of such applications at reduced costs. This is achieved through...
Topic: Software
Words: 1100
Pages: 4
Cloud computing technology has become one of the fastest-growing areas of the IT market in recent years. Businesses choose cloud services to reduce costs, improve internal interaction, streamline operations, help with faster decision-making, and ensure more flexibility. When choosing appropriate cloud technology, companies need to consider cloud deployment models and...
Topic: Tech & Engineering
Words: 339
Pages: 1
Introduction This topic involves studying the effects of the continued use of digital media on the human brain. The issue presented is becoming more urgent every year since the usage of digital technologies and social networks has an increasing impact on human life. Almost half of the world’s population uses...
Topic: Brain
Words: 1725
Pages: 6
Technology has been evolving at a very fast rate in the 21st century. Previously, it took several days or weeks for the news or messages to reach people in remote places. However, technology has brought a revolution in the way people communicate and transact businesses. The medical profession has benefited...
Topic: Communication
Words: 567
Pages: 2
A fire that occurred on June 18, 2007, in Charleston, South Carolina, was one of the most tragic events that lead to mass deaths of firefighters in the United States. Nine people died that day; they were all experienced firefighters between the ages of 27 and 56. Even though several...
Topic: Tech & Engineering
Words: 547
Pages: 2
Execution of business processes in the 21st century has been faced with a lot of challenges like insecurity and conviviality. Due to this a lot of organizations have employed information technology mechanisms to protect their information infrastructure from being accessed by unauthorized persons and also to check authentication (Neumann, 5)....
Topic: Tech & Engineering
Words: 1209
Pages: 4
Introduction We have two different types of ethics. This is the professional ethics and the human ethics. Professional ethics include ethics of a professional person like a doctor, a software engineer etc. Human ethics are the ethics which enable one to live well with the society. Ethics is very important...
Topic: Ethics
Words: 1962
Pages: 7