Introduction Over the last decade, countries all over the world have noticed an increase in small and medium sized enterprises. Rahman, Yaacob and Radzi (2016) explain that this is due to better policies and technological advancements that continue to influence the digital economy. The influx of these small and medium...
Topic: Tech & Engineering
Words: 3070
Pages: 11
Introduction Fluid flow visualization entails the creation of a means of making fluid flow patterns perceivable. This is important because the flow patterns can be used a basis for analysis in experimentation and in model simulations. A few methods of fluid visualization are: surface flow visualization, particle tracer and optical...
Topic: Tech & Engineering
Words: 800
Pages: 3
Background The need to cut carbon emissions has become a global priority to mitigate climate change effects. Unstable global oil prices, unreliable supply due to political instability in oil-exporting countries, and more importantly, the growing fossil fuel-related carbon dioxide (CO2) footprint are the factors driving the shift to renewable energy...
Topic: Energy
Words: 2505
Pages: 9
Having provided a correct and wise addressing of the mentioned non-functional requirements is a guarantee of the adequate and uninterrupted work of the whole calling center of the CD insurance company. Security and privacy considerations, legal considerations, IT compliance, environmental sustainability requirements, and other special requirements are the non-functional issues...
Topic: Management
Words: 1326
Pages: 5
The first critical mistake businesses make in employing Business intelligence (BI) programs is to ignore data quality. Organizations frequently assume that data used in BI programs is free of errors irrespective of the numerous processes they undergo, which may lead to errors at one given stage. A solution to this...
Topic: Business Intelligence
Words: 484
Pages: 3
Introduction Cultural industries refer to the segments of society that are dedicated to the production and distribution of cultural goods or services. At the time of their production, such products are considered important embodiments of cultural expressions, regardless of their commercial value. These industries are varied. They include music, cinema,...
Topic: Culture
Words: 1986
Pages: 7
Introduction I am writing this proposal to inform you of the need to change the IT department into a CIO organisation. The proposed modification will improve the efficiency of the department. Besides, it will be easy to track data and other information from a central location. Leadership philosophy The leadership...
Topic: Information Technology
Words: 617
Pages: 2
In the era of new technology, authorities and regulatory bodies are concerned with the development and implementation of regulations and reporting practices that would maximize the safety of autonomous systems. Safety4Sea (2020), one of the leading sources of maritime operations news, reports a general regulatory concern related to the future...
Topic: Tech & Engineering
Words: 280
Pages: 1
Introduction Nuclear energy generates over 11 percent of the global total electricity currently (Nilsson par. 1). It produces clean energy without greenhouse gases. That is, nuclear power does not contribute to global warming and related negative consequences. Nuclear energy can produce much energy to meet household and industrial needs. It...
Topic: Technology
Words: 3304
Pages: 12
Due to their inherent hazards and lethal potential, aviation accidents constitute critical events requiring thorough investigations. Their major purpose is the identification of the primary causes and the development of possible ways to eliminate future occurrences. However, experience has demonstrated that a single factor, which may be evident at first...
Topic: Management
Words: 897
Pages: 3
One of the problems preconditioning the slow pace of IT technologies rise is the existing legislation. By the current laws, the Czech state can conduct business through its participation in a joint-stock company or via a state enterprise (Ondrich & Sebestova, 2017). In such a way, state-owned enterprises (SOE) acquire...
Topic: Tech & Engineering
Words: 283
Pages: 1
Abstract The architectural framework of the proposed system draws on an interactive interplay of a variety of system technologies that make up an integral whole of a single unit of a decision support system (DSS) for the retail industry. The DSS is solely a tool for decision-making for retail managers...
Topic: Tech & Engineering
Words: 2315
Pages: 9
Abstract The garbage collection mechanism for the YAFFS file system incorporates a search strategy defined by the YAFFS garbage collection algorithm, O (K) space [1]. The total number of blocks targeted for sampling to identify the dirtiest block to be erased is algorithmically achieved based on the size of the...
Topic: Management
Words: 2908
Pages: 8
A user guide is also known as a manual. In simple terms a user guide or user’s guide is a practical communication document meant to provide help to people using a particular system. User guides are mostly linked with electronics such as telephones, computer hardware and software, radios, cameras among...
Topic: Tech & Engineering
Words: 751
Pages: 3
Goodall, J. R. & Ozok, A. A User-Centered Approach to Visualizing Network Traffic for Intrusion Detection. USA, 2005. The article is dedicated to the disclosure of the intrusion detection analysis aimed at providing integrity and safety to high-speed computer networks of the modern period. The authors managed to pay attention...
Topic: Computers
Words: 1027
Pages: 4
Through e-mails, communication between government agencies has been made easy and faster. Large corporations can also communicate with one another so effectively. The government can now offer its services to the citizens more efficiently and effectively. This is done by having some of its transactions being done online. Likewise, large...
Topic: Tech & Engineering
Words: 377
Pages: 1
Collaboration is critical to an organization’s information security because its lack can be exploited by an attacker as a vulnerability. There is also a tendency to use compartmentalized security measures that can be bypassed individually to gain access to an organization’s sensitive data (Secude, 2020). Furthermore, it is possible that...
Topic: Collaboration
Words: 181
Pages: 2
Introduction A small local company manufacturing specialized machined ‘valve-body’ components for the petroleum industry wants to automate one of their existing manufacturing facilities. This proposed update is required in order maximize the profit margins of this particular facility by reducing operating costs and increasing overall operating efficiency. A Zilog Z80...
Topic: Manufacturing
Words: 1874
Pages: 8
Unmanned aerial system (UAS) comprises an aircraft device, payloads, and ground-control systems (GCS). A GCS is dedicated to unmanned aerial vehicles (UAVs) and mounted aboard automobiles to enhance proximity to UAS restricted by a variety of communicating capacities (Yang, Lin, & Liu, 2016). UASs are designed with ground-control channels comprising...
Topic: Tech & Engineering
Words: 1405
Pages: 5
In this paper, I am going to show the basic procedures that ought to be undertaken while performing a digital forensic examination. These procedures are evaluated in form of answers to some pre written questions. From what equipments to pack to what to do first after arriving at the scene...
Topic: Computers
Words: 3657
Pages: 10
Introduction The current waves in the developments of electronic devices, especially in their movement towards mobility, focus on the requirement for energy efficiency abreast with productivity. The low consumption of the circuits used in mobile devices represents a large industry. The implementation of low-energy circuits can be seen at the...
Topic: Tech & Engineering
Words: 651
Pages: 2
In modern times, the importance of digitalization of the company’s functions can not be underestimated. In the competitive environment that moves towards globalization with each new technological advancement, a company that lags behind in technology implementation will be expected to fail in most cases. However, to deal with the ever-increasing...
Topic: Tech & Engineering
Words: 559
Pages: 2
It goes without saying that education is immeasurably significant for any person in the contemporary world. The development of technologies is determined not only by certain people’s inherent intelligence but the process of their acquisition of various skills, knowledge, habits, values, and beliefs. Education enhances creativity, develops reasoning and logical...
Topic: Tech & Engineering
Words: 281
Pages: 1
The coronavirus pandemic has accelerated the digital transformation in various sectors across the globe. In the news article “The Robot That’s Keeping Facilities Clean During Covid-19,” Gaskell (2020) explores how organizations in different sectors are leveraging robots to disinfect their facilities. This article focuses on one robot developed at the...
Topic: Management
Words: 319
Pages: 1
Description of the Problem Following the integration of technology such as the hybrid-cloud system, artificial intelligence, augmented reality, API platforms, blockchain, and robotic process automation into company operations, the organization’s susceptibility to cybersecurity threats, particularly cyberattacks, has increased significantly. Significant gaps exist in intelligence or knowledge related to the aforementioned...
Topic: Innovation
Words: 1756
Pages: 6
The inclusion of sprinklers as a measure to fight outbreaks in fire is not included in the countries policies. Although this is so, the many advantages that come with it lead to a need for its inclusion. The sprinkler will not act only as an alert factor in case of...
Topic: Home
Words: 2746
Pages: 10
Introduction Software engineers have been researching widely on how software development methods can be improved. The main aim of doing this has been to provide the client with the best possible application that he or she wants and to promote communication between the client and the developers of the system....
Topic: Agile Project Management
Words: 4339
Pages: 16
Introduction Over the years, computers have become an integral part of the business environment. This has been as a result of their efficiency, accuracy, and speed which has revolutionized the manner in which business is conducted. An integral part of computer systems is their ability to store and manipulate data....
Topic: Microsoft
Words: 842
Pages: 3
Intervention Natural and human-made disasters are detrimental since they cause deaths and destructions amounting to millions of dollars. The common catastrophes include floods, earthquakes, extreme heat, pandemics, and terrorism. The globe has witnessed many unexpected incidences based on the existing information. For instance, the Centre for Research on the Epidemiology...
Topic: Disaster
Words: 2032
Pages: 7
Data analysis has greatly changed several industries in the last few years (Fuller 1; Innovative Enterprise par. 1; Salim par. 1). Record firms utilize analytics to capture critical information about listening to music online since several platforms allow users to consume music using modern technologies. While producers couldn’t collect information...
Topic: Music
Words: 292
Pages: 1
In the course of the development of computer technologies, data transmission acquired a new electronic status. Needless to say that paper documentation is in the past and there is a tangible tendency to download all necessary information into the computer as it is considered to be the safest and effective...
Topic: Health
Words: 559
Pages: 2
History Group ware is an extensive concept that largely goes beyond CSCW (Computer- Supported cooperative work). Some authors argue that they are the same. According to Cartensen, collaborative software or groupware is one of the components of CSCW. Cartensen that CSCW and by far groupware tackles problems of collaborative actions...
Topic: Tech & Engineering
Words: 1106
Pages: 4
Karen Cator, director of the Office of Educational Technology, mentions in the interview that “technology facilitates communication, engagement, interaction, and understanding” (Scherer, 2011, 17). With proper application, it can improve the existing classroom practices. For example, discussions on the given topic I the classroom are expected to be challenging and...
Topic: Technology
Words: 839
Pages: 3
Introduction Multiple sources, scholars, and scientists support the statement that algorithms and electronic programs tend to support racial inequity, affecting surveillance and criminal justice. The book “Race After Technology: Abolitionist Tools for the New Jim Code” explains how people face discriminative obstacles in the digital world when algorithms tag accounts...
Topic: Technology
Words: 876
Pages: 3
Information technologies are among the fastest developing field in the world. As an industry, the term information technology implies various meanings, where “information technology is an umbrella term that describes all fields relating to the organization and dissemination of information, from the worker who lays cable wires to the telephone...
Topic: Information Technology
Words: 1409
Pages: 5
In recent years, there has been tremendous growth in data volume across all organizations. Data has become the backbone of competitiveness, productivity, development, and innovation in many companies. Fleckenstein and Fellows (2018) note that a large amount of information places people in a particular context in which data management becomes...
Topic: Data Management
Words: 316
Pages: 1
Abstract CRISPR (clustered regularly interspaced short palindromic repeats) has emerged as an exciting tool for biological research over centuries. It is used in cell alteration and has gained an advantage over the previously used techniques. Due to its high speed and ease of use, it has been endorsed in agriculture...
Topic: Innovation
Words: 2374
Pages: 8
Implications of Climate change and the environment As population centers continue to grow both in technological sophistication and population density so to do the energy demands they place on a center’s energy infrastructure. Based on current estimates of the electrical use per household it has been shown that on average...
Topic: Tech & Engineering
Words: 3483
Pages: 7
Introduction Project management is a process of scheduling, organizing, inspiring and conniving resources to realize explicit goals. It also refers to submission of acquaintance, skills and techniques to an extensive array of actions with an aim to meet project particulars (Kanda, 2011). Projects are temporary, unique and undertaken to meet...
Topic: Management
Words: 615
Pages: 2
Executive summary This report gives a comprehensive analysis of several issues associated with computer security. The findings of the report reveal several limitations of software licensing as a measure of ensuring computer security. One of the major limitations that the report has focused on relates to the fact that licensing...
Topic: Computers
Words: 1637
Pages: 6
Identification and Operation of Other Works Defining the Variables/Constructs Similar to Desktop Virtualization Other people’s works have defined the constructs or variables that are similar to a functional desktop virtualization system (Johnson, 2011). Their identification and operation refer to a combination of attributes that can be measured and analyzed statistically...
Topic: Tech & Engineering
Words: 551
Pages: 2
In most engineering designs, fracture toughness, a property describing how cracked objects resist fractures, is a chief property in most applications. Stress intensity factor (K), examines the linear-elastic fracture toughness of the sample under observation when its crack begins to grow. KIc denotes the fracture toughness, with SI units of...
Topic: Tech & Engineering
Words: 862
Pages: 3
The Problem The diversification of Sears, Roebuck and Company’s clientele to specialty and mass merchandisers stores posed a big problem to its survival in the 80s. There was a mass exodus of its loyal customers as they went searching for discounts on bulk and specialized services in stores that dealt...
Topic: Marketing
Words: 1110
Pages: 3
The term methodology refers to a complete description of a system that considers the process, people, modeling language, project management, social structures and products. We however note that not all the systems developed to bear the meaning of this word. They are rather Object-Oriented than being Agent-Oriented. It is with...
Topic: Software
Words: 1057
Pages: 3
Abstract The Third Generation Partnership Project (3GPP) develops High Speed Packet Access (HSPA) to make broadband a reality everywhere (Kumar, Sengupta and Liu 366). HSPA+, also referred to as HSPA Evolution, is a natural evolution of HSPA and provides a next-generational performance as a result of cost effective additional upgrades...
Topic: Tech & Engineering
Words: 1564
Pages: 5
Abstract The increasing demand for the availability of mobile data transfer is closely linked with the development of new technologies that offer the end-users an opportunity to access web data. The process of technological development means the constant increase of the access speed, as well as the decrease of the...
Topic: Tech & Engineering
Words: 1357
Pages: 5
Introduction One of the most important merits of MRI is the capability to create high contrast images particularly for soft tissues. This ability enabled it to be the technique of choice in the field of medical imaging. The high contrast is attained as a result in variations in signal intensity...
Topic: Tech & Engineering
Words: 2476
Pages: 6
Wind energy is the latest non-solar energy source, which is widely used. In many parts of the United States, the wind’s patterns and speeds vary because of the differences in terrain, vegetation, presence and size of water bodies (Aissaoui and Tahour 31). Wind power has many purposes in daily living,...
Topic: Technology
Words: 414
Pages: 1
Flow batteries also known as Redox batteries have been in existence since 1880s and zinc/chloride the first kind of the batteries was first used by Charles Renard in 1884 to power his airship called La France (“Battery and Energy Technologies”). In flow batteries, current is produced in the process of...
Topic: Tech & Engineering
Words: 682
Pages: 2
In the modern globalized environment, information has become a major asset that can be used to improve people’s well-being and quality of their lives all over the world. Our organization contributes to the improvement in the quality of visual data management by offering the cameras and drones of the best...
Topic: Tech & Engineering
Words: 292
Pages: 1
The unprecedented technological development during the last couple of decades has entirely transformed people’s lives, introducing numerous previously unforeseeable opportunities. The enhanced computing capabilities and improvements in graphic processing have turned facial recognition into a widely-spread phenomenon, found in many useful devices. However, one area of its application remains an...
Topic: Tech & Engineering
Words: 597
Pages: 2
Introduction In our society presently, immunoassay techniques used in data analyses have assumed a place of high significance, particularly as it is applicable to pure/applied researches; where the techniques are adopted for such developments as ultrasensitive immunoassays in antigenic and antibody analyses. Ultrasensitive/rapid enzyme immunoassays, have presented more current, flexible,...
Topic: Experiment
Words: 1117
Pages: 4
The OSHA proposal for benzene was aimed at limiting the amount of exposure from 10ppm to 1ppm. This rule was due to the reports in the media about the death of workers who were exposed to benzene levels that were above 10ppm, yet the initial limit set by OSHA was...
Topic: Health
Words: 878
Pages: 3
Introduction The focal point of the paper is to summarize and compare the two studies. The first one is Shelley B. Wepner’s Technology Run Amok: The Top Ten TechnoBlunders published by International Reading Association, Inc in 2004 and the second article is Leslie P. Hitch’s Being prepared for Technology Snow...
Topic: Tech & Engineering
Words: 588
Pages: 2
Step 1: Claiming Centrality Recently there has been a spate of interest in the spread of coronavirus infection was the factor, which defined the research orientation of the global medical community in 2020. More specifically, knowledge of the methods for clinical management optimization during the pandemic has proved to be...
Topic: COVID-19
Words: 1173
Pages: 2
End-User Education Most attacks on the system occur as a result of activity by the users. While the network can be well protected from external attacks, through firewalls, this protection will be inadequate if the users are not aware of fundamental good practices. Users should be made aware of essential...
Topic: Tech & Engineering
Words: 822
Pages: 8
The creation of a communication system that employs radio frequency signal transmission presupposes consideration of the available channels, equipment that can be used to establish the network, area, and the central purposes that drive its introduction. At the same time, it is critical to ensure that the transmitter can operate...
Topic: Radio
Words: 298
Pages: 1
The title of my research proposal is Increasing security in e-government through BPM in KSA. Background BPM is a strategy used in organizations and business operations to improve business processes. For example, it can be used to identify missing items that should not be missing or assist an employee in...
Topic: Management
Words: 535
Pages: 2
Today, governments should be more receptive to changing government operations, enhancing competence, and providing modern public service. To realize these goals, many government departments and IT firms have to embrace mobile computing gadgets in general, and the iPad and iPhone in particular. Many people, government departments, and organizations are already...
Topic: Apple
Words: 568
Pages: 2
Business Problem Business Unit: Elegant Solutions installs window treatments for home and office use. Issues: They have a large mobile workforce that spends most of the time out in the field with customers. The salespeople follow up on customer leads, visit the homes or offices, take the orders and measurements,...
Topic: Radio
Words: 310
Pages: 2
Introduction Web-based learning is a popular approach taken in e-learning directions. In that regard, the development of e-learning website, specialized in the preparation of Sat reasoning test, was a good idea to test several features common to web-based learning management systems as well as aligning to usage simplicity as one...
Topic: Tech & Engineering
Words: 957
Pages: 3
Methods of Measuring ERP Systems Enterprise Resource Planning can be evaluated using numerical methods; but there are also other nonnumeric methods of analysis. However, experts assert that there are no fixed rules that govern the way evaluation of the ERP systems should be done (Chen & Lin, 2008, p. 300)....
Topic: Tech & Engineering
Words: 1032
Pages: 3
Introduction In the cyber world, cyber-attacks are quite a common occurrence. The attacks target computer hardware such as scanners, computers, servers as well as software programs such as operating systems and protocols. The recovery of data is made increasingly difficult by the encryption and steganography programs (Britz, 2009, p. 217)....
Topic: Tech & Engineering
Words: 1290
Pages: 5
Issues in the existing information system of the Newton Public Library The Newton Public Library operates through the kindness and donations of benefactors, especially Mr. Jimmy Chung. Ever since its inception, it has run through the manual or traditional system, except perhaps a few modifications when computers and the Internet...
Topic: Tech & Engineering
Words: 1470
Pages: 11
The adoption of Metropolitan Area Network (MAN) will help Rapid freight in enhancing its service delivery, which will promote customers satisfaction. The use of converged networks, as well as converged communications helps in integrating data, voice and video solutions into a single IP based infrastructure. The integration helps employees whether...
Topic: Tech & Engineering
Words: 530
Pages: 2
Critics of scrum have asserted that there is no difference between Scrum and XP without its technical practices. This has led to the development of a sentiment that Scrum is just XP without the technical practices and this paper will attempt to validate this claim by comparing and contrasting XP‘s...
Topic: Programming
Words: 1592
Pages: 6
Introduction The economic value of the construction industry is significant and the industry contributes up to 10% of the annual GDP for most nations (Michael 2005, p.2). The industry encompasses the use of many other complementary industries such as electrical, mining, steel and transportation to name but a few. This...
Topic: Construction
Words: 3039
Pages: 11
Project management elements and processes and tools are usually the same irrespective of whether the project is IT based or not. The problem in the management of IT projects however comes in where most people attempt to manage these projects just like the construction or event organization projects. IT projects...
Topic: Management
Words: 1247
Pages: 4
Abstract The pet feeding system is an automated system that will entail the provision of food to the pet at particular times of the day through a well-regulated system that can be controlled remotely. The system will be controlled by a microprocessor system specifically the Motorola 68000 system. The objective...
Topic: Home
Words: 2151
Pages: 7
Introduction and Thesis Statement Information technology is a broad term used to refer to all the techniques used to store, recover, and manipulate data in an organization. It is the utilization of computers to manage data in a corporation. The department of information technology in an organization is held accountable...
Topic: Tech & Engineering
Words: 2564
Pages: 8
Introduction Today’s world is becoming more digitalized every day. Mobile culture is rapidly being embraced that most people cannot leave without their cell phones. The mobile phone has become a very useful device both as a communication and networking platform. According to Sharples, Taylor, and Vavoula (2007, 27), mobile technologies...
Topic: Tech & Engineering
Words: 1352
Pages: 5
Introduction A neural network refers to an information-processing model operating in a manner that is similar to the natural nervous systems of the human brain (Stergiou and Siganos, 1997). The novel structure is the primary component of this model comprising numerous integrated processing components (neurons) that function together to offer...
Topic: Tech & Engineering
Words: 2750
Pages: 10
Cloud computing provides on-demand computing resources such as applications, hardware, and software over the Internet. The key benefits associated with cloud computing services include better protection against disaster, workload balance, reduction in investments costs, improved accessibility, usability, performance, and mobility, as well as sales automation. These benefits have led to...
Topic: Tech & Engineering
Words: 336
Pages: 1
Competitive Environment The emergence of information technology business solutions has enabled Hong Kong Exchanges and Clearing Limited (HKEx) to be one of the best companies in Hong Kong offering financial services. As a financial services-based company, there is, therefore, a need to understand the company’s business processes and come up...
Topic: Tech & Engineering
Words: 2116
Pages: 9
The Google Company found itself in a tight corner explaining its decision for entering the Chinese market. This was a highly restrictive market as the government monitored and limited the kind of information internet users could access. The company operated on core values of satisfying the user interests and expanding...
Topic: Censorship
Words: 628
Pages: 2
Information technology is becoming a basic commodity in most of the business organizations due to constant changes in technology. This means that organizations only need to control costs of IT and at the same time mitigate the associated risks. IT is now being viewed as a competitive advantage tool used...
Topic: Management
Words: 859
Pages: 3
In Forbes’s article The Forces That Are Transforming How Products Are Made, Beth Ambruch presents several factors transforming product manufacturing in the contemporary setting. These include “digitalization, personalization, “smart” products, connectivity, servitization, globalization and regulation” (Ambruch, 2013, para. 5). The author suggests that the producer’s ability to adapt to these...
Topic: Tech & Engineering
Words: 294
Pages: 1
Introduction Radio Frequency Identification (RFID) technology is based on the transmission of information through special RFID tags, which was initially used in sectors such as logistics, airline luggage automation or parcel distribution. One of the areas which are receiving a wide implementation of RFID technology in libraries (Kern, 2004). In...
Topic: Radio
Words: 1204
Pages: 4
The first tutorial, ‘Learning about SQL databases’, focuses on creating and using reports, database security and publishing the web. The tutorial teaches about security and network connectivity, how to connect your web application to SQL server 2005 express edition, getting started with reporting services and how to embed, package and...
Topic: Tech & Engineering
Words: 893
Pages: 3
Introduction On November 23, 2001.The initial global agreement on computer and internet-connected offence was opened for signature in Budapest. The agreement which is know as the convention on cybercrime was developed by the Council of Europe ( CoE ), climaxing a five-year process dating back to 1997.As of July 16,2002,the...
Topic: Cybercrime
Words: 4574
Pages: 15
Introduction Carbon Nanotubes (otherwise known as CNTs) are distinctive nanostructures which have very notable mechanical and electronic properties and which in recent days of sciences have been marvelously accepted as been of immerse benefit to technology and sciences throughout the world. Presently, the most assured technique for the production of...
Topic: Water
Words: 2793
Pages: 16
Before the era of computer-aided design (CAD), models, lasers and prototypes, individuals were laboriously carving materials from wood or sticking plastic pieces. The revolution of technology in the 1980s brought a solution to the problem. The concept of rapid prototyping resulted in the development of more automated methods. Three-dimensional printing...
Topic: Tech & Engineering
Words: 1735
Pages: 6
Everyday world practice regularly shows us that human life is an incredibly fragile phenomenon that can be damaged by external or internal factors. It is enough to look at the human body in detail to understand that, although it is a rather complicated technical mechanism it has too many nuances...
Topic: Tech & Engineering
Words: 579
Pages: 2
Modern technology of content creation implies the communication of the team of creators, contributors, and editors of the information published on the websites, often in a remote mode. One of the essential content management systems used for such collaboration is a wiki (Hawaiian word for quick), a website that enables...
Topic: Tech & Engineering
Words: 505
Pages: 2
The increased risk of infection due to contaminated surgical instruments has brought to fore the need to use effective and sophisticated methods and equipment for sterilization. Decontamination processes are useful in the disinfection of reusable surgical instruments particularly in the face of increased risk of blood borne diseases (NHS Estates,...
Topic: Tech & Engineering
Words: 640
Pages: 3
Technology innovation has transformed the modern lifestyles of individuals in many communities. I agree with Nicholas Carr that Google is making us stupid by assuming cognitive functions that facilitate effective decision-making. Activities done with hardship in the past are now easy to execute with technology invention in devices and application...
Topic: Google
Words: 306
Pages: 1
Introduction In recent times, most organizations are adopting emerging technologies to match the high competition in the market. Information systems (IS) are a set of components, which are integrated and aimed at the collection, processing, and storing of data in providing information, digital products, and knowledge (Yaacoub & Salman, 2020)....
Topic: Cybersecurity
Words: 2020
Pages: 7
Introduction In the real estate industry, increasing population projects a progressive opportunity in estimating future potential demand on dwellings. The significant increase in global ageing population has been recognised for decade in connection with the trends in morbidity and mortality of older adults has continuously dropped. So does in Thailand,...
Topic: Aging
Words: 5981
Pages: 2
The cyberspace has developed from a simple academic and research network to a complex communication network used to perpetrate many activities on a day to day basis. According to Spinello (2011), cyberspace have turned the world into a global village; but at the same time, it has hacked into lots...
Topic: Information Technology
Words: 2772
Pages: 10
Introduction Information asset protection is a very critical aspect of business management process for the successful operations and continuity of any business. Any form of threat to the security of the electronic or computerized information and its process is a definite threat to the quality of business end result (Boran,...
Topic: Tech & Engineering
Words: 3490
Pages: 10
Given the fact that practically any router has both Wi-Fi antennas and Ethernet plugs, it would make perfect sense to use a complementing connection at a university. For example, libraries could significantly benefit from such a setup, as students would have the opportunity to use high-speed Wi-Fi. In contrast, the...
Topic: Radio
Words: 297
Pages: 1
Developments in space exploration are taking the center stage in powerful world countries, particularly the US and Russia. The inability to refuel, service, and repair satellites once launched into space is a significant concern, as companies and governments lose millions of dollars in value due to minor problems (Vocative, 2017)....
Topic: Robots
Words: 375
Pages: 1
Introduction Server virtualization is a technique of organizing several separate virtual machines on one physical system. These virtual machines can be thought of as virtual private servers that hide the physical servers, operating systems, and other network resources from people using the servers. By implementing several virtual machines, various operating...
Topic: Tech & Engineering
Words: 1554
Pages: 5
Introduction The field of information technology has been faced with many challenges in its development. However, the security of data is arguably the main challenge in the whole industry. Every new product has to include an aspect of security to attract customers. This paper looks at the security of data...
Topic: Information Technology
Words: 2073
Pages: 8
Introduction VoIP (Voice over Internet Protocol) refers to the technology that enables the transmission of voices through data networks. As the name suggests, VoIP transmissions are carried out using IP (Internet Protocol). The increasing ubiquity of IP voice services in the United States has raised concerns due to unequal regulatory...
Topic: Tech & Engineering
Words: 580
Pages: 2
Google Search is a universal information search tool used by millions of people. Many scholars agree that Google Search is also a useful research tool (Miller and Record, 2017). But this tool has drawbacks and limitations, which should be considered when searching through Google Search. Moreover, awareness when using search...
Topic: Google
Words: 1487
Pages: 5
Introduction RFID is fast taking shape as manifested by the recent media blitz and newspaper articles about the technology. Not many people are able to distinguish the different categories and benefits that the technology brings. It is the purpose of this paper to highlight on the history, uses and benefits...
Topic: Radio
Words: 2947
Pages: 10
Introduction Search engine is a computer program that helps to look for information about a particular topic of interest from the internet (Sullivan, 2006, Para. 2). By using different search engines, we are going to look for information about pediatric ear infection as our topic, evaluate the information they present...
Topic: Infection
Words: 539
Pages: 2
The current level of technology development allows the creation of many technological solutions aimed at ensuring human safety. One of the directions in this area is replacing humans with autonomous robots controlled by an operator. Thus, a person can be protected from working in a hazardous environment, and the likelihood...
Topic: Airport
Words: 386
Pages: 1
Modern Computers and Their Functions in Human Lives The use of computers changes human life considerably in different ways. People discover more ways on how to improve their work, communication, and calculations. Within a short period of time, a computer becomes an integral part of this life, and there is...
Topic: Computers
Words: 518
Pages: 2
Introduction Titanium Diboride is a hard compound that consists of Titanium and Boron. Titanium Diboride is useful in designing various products (Huber, 3000). One such product is a capacitor. Apart from capacitors, Titanium Diboride is used in the making of extremely hard materials such as army wares and ceramic cutting...
Topic: Tech & Engineering
Words: 3637
Pages: 14
Summary description of its structure and purpose The site PCMAG.COM has rather interesting and clear structure with the help of which it is possible to identify the purpose set by the site developers. Looking at the main page of the site, the visitor is free to choose any interesting for...
Topic: Tech & Engineering
Words: 610
Pages: 2
A dedicated “solution” is needed for MPS staff frequently who have multiple identities associated with their different job roles MPS stands for Metropolitan Police Service which is an organization in the United Kingdom to keep the law and order in the country. “Today, the Metropolitan Police Service employs 31,000 officers,...
Topic: Management
Words: 2542
Pages: 8
The Balanced Scorecard or BSC is performance management and IT governance tool, which is used to evaluate the companys efficiency and identify those aspects which need modification or improvement (Kaplan & Norton, 1996). It helps to develop the policies of the enterprise according to the vision and the initial goals....
Topic: Tech & Engineering
Words: 849
Pages: 3
The companies, which specialize in the development of software solutions, have to attach great importance to business continuity planning because they are exposed to many internal and external threats, for example, the failure of hardware, virus attacks, power cuts, mistakes of the personnel and so forth. Each of these threats...
Topic: Tech & Engineering
Words: 1126
Pages: 4
The term “Anthropocene” was coined to refer to the era in which human beings became the main driver of environmental change. While scientists argue about whether a new geological era should be officially distinguished in the history of the Earth, the atmosphere is rapidly changing. An increase in the level...
Topic: Environment
Words: 1141
Pages: 4
Introduction New practices and technologies are continually advancing every day by using computers to transmit, manipulate and store information and data, concerning the tools and processes deployed to protect sensitive business information from modification, destruction, inspection, and disruption. Hardware authentication, data loss prevention, the cloud, deep learning, and user behavior...
Topic: Tech & Engineering
Words: 944
Pages: 3
Introduction There are several barrier related to technology integration into studies. This literature review explores different aspects related to factors that affect technology integration into studies as well as the appropriate measures that need to be considered to address these underlying issues. This section has been put into four sections....
Topic: Technology
Words: 2444
Pages: 10
The present literature review, first of all, considers the definitions of attitude and attitudes towards computers, it also sheds light on the concept of attitudes, attitudes and language learning, teachers’ attitudes towards the computers in EFL instruction, Arab teachers’ attitudes towards the computer in EFL instruction, students’ attitudes towards computer...
Topic: Tech & Engineering
Words: 9098
Pages: 28
Introduction Science is the marvel of the present world and modern technologies are an application of science to fulfill man’s long-cherished dreams to control and manipulate the forces of nature for his relevance. But at the same time, it is also very true that the blessings of science depend upon...
Topic: Technology
Words: 659
Pages: 2
Introduction: Facts of the case On February 06, 2014, Ioan Leusca and Dezso Gyapias were charged in a U.S. Federal Court for stealing customer data from automated teller machines (ATMs). The two men had used data acquired from the ATMs to steal from bank customers in Connecticut, New Jersey and...
Topic: Computers
Words: 1682
Pages: 6
The issue touches on the ethics and legality of OSHA to change the levels allowed for benzene exposure in the workplace after the publication of a new report that reveals the number of deaths caused in places where the level of benzene was above 10ppm yet the required amount was...
Topic: Ethics
Words: 875
Pages: 3
Introduction Speaker recognition is a procedure carried out through a computer program that validates the identity claimed by an individual through taking into account certain aspects of human voice. The technical field of speaker recognition attempts to provide a practical and cost effective means for recognizing an individual from audio...
Topic: Tech & Engineering
Words: 4158
Pages: 15
PayPal, an online money transfer service established in 1998, has since become the primary form of money transfers, overtaking the traditional system of money orders and checks. With a total income of $7.9 billion, the service allows users to deposit, withdraw, and transfer funds with 26 different currencies globally. Peter...
Topic: Tech & Engineering
Words: 558
Pages: 3
All the research journals included in this study, claim that integrated management of information is used across most organizations. Such organizations engage in manufacturing and other services related to management of customer relations. A number of journals indicate that when the process is automated, it uses ERP systems that are...
Topic: Tech & Engineering
Words: 596
Pages: 2
Introduction In the context of public construction projects in Abuja Nigeria, project success can only be realized when stakeholder performance is evaluated against a performance evaluation framework. A performance evaluation framework provides well established and evaluated standard measures against which the performance of project stakeholders can be measured to evaluate...
Topic: Construction
Words: 7116
Pages: 27
Introduction In the 21st century, the technological environment is under influence of high degree of robustness (Barry, Atul & Arun 1). This has had a great impact on various sectors of the economy. Amongst the technological sectors that have undergone revolution with a high magnitude, is the information communication technology...
Topic: Evolution
Words: 1515
Pages: 5
Due to globalization, there is greater demand for electricity, as most of the productive activities require energy power. Globalization has brought people, institutions, and governments of various nations together. Through globalization, international trade and capital investments have been conducted internationally through the help of information technology (Ehrfeld 210). The interaction...
Topic: Energy
Words: 1434
Pages: 5
What is Finite element analysis via (FLAC)? And how is it done? Finite element analysis (FEA) could run in 2D or 3D and is used for geotechnical applications in the determination of tunnels, deep foundations, slope stability, seepage analysis, soil structural analysis, and capacity for earth retaining structures (Lee, Y.S....
Topic: Tech & Engineering
Words: 7500
Pages: 12
Introduction In every organization, data recovery plan plays a pivotal role in ensuring maximum security of important data. In many cases, several companies have found themselves in problems of losing some of important data through various forms of disasters. It is advisable for every organization to have an effective method...
Topic: Tech & Engineering
Words: 1116
Pages: 4
Energy harvesting can be described as a process of deriving energy from external sources, such as the sun, thermal power, and the wind. This method of capturing and storing energy is considered safe for the environment, and therefore, is a promising innovation. The energy harvesting systems are the technology used...
Topic: Energy
Words: 594
Pages: 2
Introduction Verizon is a telecommunication company in America providing services for wired and wireless communications beads on third-generation technology (Verizon, 2011a). The organization is innovative in the telecommunication sector and it provides video and broadband communications and other modes of entertainment through an advanced fiber-optic network. The organization is committed...
Topic: Tech & Engineering
Words: 1167
Pages: 4
Bogdane, R., Gorbacovs, O., Sestakovs, V., & Arandas, I. (2019). Development of a model for assessing the level of flight safety in an airline using concept of risk. Procedia Computer Science, 149, 365-374. The authors consider the current state of the SMS in aviation, suggesting general approaches such as a...
Topic: Aviation
Words: 1515
Pages: 4
Introduction The Association of Computer Machinery (ACM) code consists of 24 imperatives that are formulated as statements of personal responsibility. It comprises most of the issues that professionals are likely to encounter. The ACM code outlines how software engineers should conduct themselves ethically in their profession, and while relating to...
Topic: Computers
Words: 688
Pages: 2
Introduction Computer scientists have in recent years come up with ways of solving problems that occur in the real life situations by use of computers. Artificial intelligence is the field that computer scientists have concentrated much on so as to achieve intelligent agent software. It is a study whereby computer...
Topic: Artificial Intelligence
Words: 1165
Pages: 3
Introduction A microprocessor, commonly referred to as the Central Processing Unit (CPU), a central place where all data processing is done, is a gadget that distinguishes only binary code as numbers and ascertains basing on the orders by employing assemblage languages. This piece of writing is a detailed explanation of...
Topic: Tech & Engineering
Words: 1692
Pages: 8
Abstract The dependence and utilization of drones are continuously increasing in several domains, besides the law enforcement departments. The basis for this is the drone’s capability to provide live-stream, real-time, and image capture; of course, drones can fly and carry goods from one place to another. Such drones’ ability to...
Topic: Police
Words: 3427
Pages: 12
Abstract This research paper’s major purpose is to discuss and research accessibility issues in relation to websites. The paper questions whether enough is being done to make websites suitable for people with disabilities and from that look at what could be done to improve the area going forward. Do individuals/...
Topic: Technology
Words: 3706
Pages: 13
Airport Operator Security Responsibilities The business of securing a commercial airport is, ideally, a shared responsibility between the airport operator and the Transportation Security Administration (TSA). Before the September 11 attack, every aspect of airport security was the responsibility of the airport operator, except for passenger screening. Since, September 11,...
Topic: Airport
Words: 596
Pages: 2
Background The process of playing video games has always been linked to the hypothesis that recurrent displays of gore and violence have a negative influence on children and their cognitive and learning development. Nevertheless, the number of reviews that support an opposite idea grows on a daily basis, with the...
Topic: Tech & Engineering
Words: 1149
Pages: 4
Concepts Raised by the Case Study Among the paramount concepts learnt in class that are evident in this case is the issue of responsibility. For Google to convince the populace that it can effectively handle their medical records, it must take the responsibility to guarantee secrecy of medical records. The...
Topic: Tech & Engineering
Words: 1912
Pages: 5
Introduction The recognition of patterns has erstwhile been considered simple and straightforward for human beings. This is however not the case while dealing with machines and it can be quite taxing to train or program a computer to recognize such patterns. In this realm, the best way to try and...
Topic: Tech & Engineering
Words: 609
Pages: 2
Encryption refers to a system that programs a plain readable text into a non-readable status for security purposes. The sender uses an encryption system to send the data, such that the receiver will have to use a key to retrieve the data to a readable form again. The major use...
Topic: Tech & Engineering
Words: 1162
Pages: 4
Summary Within the last two years, a series of events have happened that are characterized with internet hacking. Some of these activities include spying on google documents, Western companies, spying on Iran’s nuclear sites using Israeli created Stuxnet and spying on US secret cables by wikkiliks. Cybersecurity laws in the...
Topic: Cybersecurity
Words: 2037
Pages: 7
Introduction Online threats remain a reality for today’s businesses, especially those relying on the internet. Active and passive attack incidents are escalating every day and network administrators are having a daunting task of detecting, controlling or minimizing the effects of such attacks. Stewart, Tittel and Chapple concur in that one...
Topic: Tech & Engineering
Words: 1388
Pages: 5
Technologies have become an integral part of modern life. Digitalization could be noticed in medicine, building, and transportation, to name but a few areas affected by this process. Still, the implementation of new technological facilities and ways of schooling based on them is a highly disputable topic. In the present...
Topic: Tech & Engineering
Words: 5790
Pages: 21
Introduction Jet fuel refers to a form of aviation fuel, made up of a mixture of a great amount of various hydrocarbons, which is manufactured for use by aircrafts. It is crucial that the fuel used in a jet be of the required quality because contaminants can be detrimental not...
Topic: Aviation
Words: 866
Pages: 3
DBR provides me with an opportunity to work on and improve my PMP and PMI projects. These two types of tasks require certain skills and background knowledge to complete all the necessary assignments on a proper level. To be more exact, the essence of PMP and PMI projects is closely...
Topic: Management
Words: 1599
Pages: 4
Introduction Created by Linus Torvald in 1991, Linux operating system originated from the previously popular UNIX. During this time, an operating system known as MINIX was under creation, also based on UNIX, but users had to pay to have a copy of this operating system. Therefore, Mr. Torvald designed Linux...
Topic: Tech & Engineering
Words: 1942
Pages: 6
Introduction The field of ethics is a very important one which can be viewed as universal in its applications and practice. However, many individuals do not believe that ethical practices are universally applicable in all areas of operation, and therefore, some of them end up associating more of their applications...
Topic: Ethics
Words: 915
Pages: 2
Business Intelligence is typically a broad grouping or category of diverse applications and technologies allied to gathering, analyzing, storing as well as offering access to essential data to aid the enterprise end users makes sound business verdicts. Hence, BI aspects encompass such features as query, reporting, decision support systems, online...
Topic: Business Intelligence
Words: 606
Pages: 2
Introduction This report provides information regarding the Resource Scheduling project. The Resource Scheduling project is useful for a consultant company that provides resources of different types to various companies for a particular duration. An example of a company that would require this kind of software is an IT consultant company....
Topic: Software
Words: 4129
Pages: 15
Multihoming is the process of configuring multiple network interfaces or IP addresses on a single computer. In means having as many internet roots assigned to an IP network as possible. This strategy is increasingly becoming popular in many companies as a technique to increase reliability of network applications. Although maximum...
Topic: Infrastructure
Words: 947
Pages: 5
Introduction The Columbia Shuttle accident occurred in 2003 when the shuttle was disintegrated over Texas during its re-entry into the Earth’s atmosphere because of damaging the thermal protection system. The most tragic detail connected with the accident was in the fact that this tragedy which caused the deaths of seven...
Topic: Performance
Words: 600
Pages: 2
Response 1 I agree with Danielle on the topic of using visual media, such as animations and images, in the educational process. A teacher must implement this method of conducting knowledge when interacting with younger generations. Barry et al. (2015) state that students “are willing to merge their online presence...
Topic: Tech & Engineering
Words: 296
Pages: 1
Calibration is an important practice that ensures instruments meet their desired standards of operation. To make sure that this obligation is met, standardization bodies have to be set up to check conformity and compliance with the set standards. Therefore, the role of calibration goes hand in hand with the duty...
Topic: Tech & Engineering
Words: 779
Pages: 3
Introduction Liability is the responsibility that is borne by a party. It is a common term in the insurance business. Aviation product liability deals with the responsibility, mostly financial, that is borne by a party as a result of injury or damage resulting from the products that are used in...
Topic: Aviation
Words: 2563
Pages: 9
Introduction The purpose of this point paper is to explain the importance of implementing cybersecurity strategies for healthcare organizations that currently adopt information technologies based on the case of ransomware attacks. Our intention is to sell the technological tools for telemedicine services, as well as provide guidance on the ways...
Topic: Cybersecurity
Words: 665
Pages: 2
Technology is transforming many fields of study by introducing new tools and possibilities for people to communicate, collect data, and use it to test hypotheses. Business administration is not an exception, with more non-technology oriented companies adopting artificial intelligence (AI). This paper will examine how artificial AI is transforming business...
Topic: Artificial Intelligence
Words: 839
Pages: 3
Performance requirements are important to consider when developing a solution. It is unacceptable to have a web service that takes several seconds to reply to a simple request. Therefore, the developer should consider the available methods of improving the performance of their code. Chapter 12 discusses parallel programming, which is...
Topic: Programming
Words: 1106
Pages: 4