Sciences, Tech & Engineering Examples for Free

What is science, and how does it work? This is a question that has fascinated philosophers and scientists for centuries. At its core, science is defined as an organized system of knowledge about the natural world. It involves theories, models, experiments, and observations that help us to understand and explain the physical universe around us. There are many different branches of science, each of which explores a different aspect of the natural world.

But what sets science apart from other forms of knowledge? For one thing, science provides explanations based on evidence and rigorous reasoning rather than speculation or eyewitness accounts. In addition, the scientific method allows scientists to systematically test hypotheses in order to uncover new insights and knowledge about the world.

When most people think of “technology,” they imagine the latest smartphones, virtual reality headsets, or electric cars. And while these modern products certainly represent important aspects of the field, technology encompasses much more than just consumer goods. At its core, technology refers to how humans use science and engineering to create tools and systems for a wide range of purposes.

Essay writing about technology involves exploring different types of technological advances in different fields. You might consider looking at scientific breakthroughs in medicine, or computer advancements in business and engineering. You might also look at social issues like information sharing and global connectivity, which have all been greatly influenced by technological advancements in recent years.

Engineering is often described as the process of designing and building structures, machines, and other tangible objects. But at its core, engineering is a method of problem solving, involving creative solutions that allow us to overcome obstacles and make the world a better place. Whether you are studying engineering in college or working as an engineer in the field, free essay samples can be a valuable resource for learning more about this fascinating discipline.

Sciences, Tech & Engineering

Cyber Security: Intrusion Detection

Abstract One of the major concerns in the present environment is maintaining privacy. Intruders try to gain access to restricted files or areas thereby hindering privacy. The areas under threat include workstations, data transactions, a forest reserve, and many more. This has led the researchers to come up with what...

Cut 15% OFF your first order
We’ll deliver a custom Sciences, Tech & Engineering paper tailored to your requirements with a good discount
Use discount

The Impact of River Water on Wheat Plant Growth

Abstract Normal plant growth occurs in the presence of water, adequate nutrients, and light. The goal of this study was to investigate the impact of the James River water at varying concentrations on the growth of wheat plants. The highest growth rates were realized in the plants treated with 0%,...

Microscopy & Cells: Laboratory Experiment

Cheek Cell (animal) – the marked cell components are the nucleus and cell membrane. Elodea (plant) – the marked cell components are the cell wall and chloroplast that appear as the green dots. A compound microscope’s total magnifying power is determined by multiplying the ocular lens’ magnifying power with the...

Turkey Country Risk Analysis

Abstract The purpose of this study is to carry out risk analysis in a country and determine the best way to manage the risk. The country of consideration in this case is Turkey. As a country, Turkey is in between Middle East and Europe and has mixed culture between the...

Nuclear Chemistry in Nuclear Reactors

The fission reaction is carried out in the main unit of a nuclear power plant – a nuclear reactor. Nuclear fission is the decay of a heavy atomic nucleus (uranium, for example) into two or more light nuclei. It is accompanied by the emission of two or three neutrons and...

XYZ Inc.: Description of an Information System

Introduction The horizontal construction industry has undergone remarkable transformations over the past decades. One of the factors that has promoted growth within this industry relates to adoption of new construction methods, for example the Accelerated Bridge Construction [ABC]. This method has enabled construction companies to compress their project schedules. Firms...

Lean Project Management in Different Areas

Introduction Background The concept of lean project management is rapidly gaining popularity around the world in different fields. According to Schaufelberger and Holm (2017), a lean operation involves the provision of excellent value to customers using the least amount of resources. Its fundamental principles are the creation of maximum value...

On-Time Delivery!
Get your customized and 100% plagiarism-free paper done
in as little as 3 hours
Let’s start

Evaluation of Current Project Management Practices

Introduction Project management is a broad subject and a concept used in almost all types of organizations, industries, and sectors. Managing a project means taking it through several steps from the start to its completion. The stages are called project life cycle, which entails a series of steps through which...

Study of China and the World

The article by Catherine Keyser and Su Lin is based on the different definitions of the term “peaceful rise” brought about by the different views by the different scholars. There is controversy over the possibility of a peaceful rise through international development and international relations due to delicate international relations....

China’s Role in the World Economy

While there are diverse views on whether Chinese leaders who have become more confident in recent years are using their newfound influence to build china’s interest or whether china has just laid down strategies to safeguard he economy, there is no doubt that the role that China plays in the...

Business Information System

Introduction With time as the markets are expanding and globalization is taking place all over the world, Companies are finding it more and more intricate to cope with the growing needs of a good organizational structure, plan, and strategy. Whether it may be a manufacturing firm, a service provider, or...

Human Resources Management Information System

Information systems management is a relatively new area of management influenced by technological and information changes. Since the kind of performance required depends partly on the technology being used, performance management techniques have to fit with the technology of the organization. In this vein high technology settings have certain characteristics...

Evolution and Natural Selection in Darwin’s Finches

Evolution and natural selection were Charles Darwin’s theories that sought to explain the origin, migration and population of living things. All living things fight for their survival through the application of their internal instincts. They also have natural features that enable them to exist and survive in the environment. The...

Get a custom-written paper
For only $13.00 $11/page you can get a custom-written academic paper according to your instructions
Learn more

Geographic Information System, Connecting Databases

Geographic Information System (GIS) is a PC framework for catching, putting away, checking, coordinating, controlling, investigating, and showing information identified with positions on the Earth’s surface. Hence, it is a method of connecting databases with maps, displaying data, performing spatial examinations, or creating and applying spatial models. These systems are...

Impact of Information Technology on a Clothing Company

Information technology (IT) refers to the technology used for dealing with various types of information, such as business data, images, or conversations. The wide use of computers and the Internet has made IT an essential element of the contemporary world and business world in particular. IT has changed the way...

Solar Panels System and Sustainability

Step 1 The key problem with solar power that has discouraged its use is the fact that its technology is still very expensive and unreliable. Compared with the use of hydro, nuclear, geothermal, and coal, the use of solar power has not been widely embraced (Armentrout 24). The popularity of...

The Interface of Technology Within an Organizational Workplace

Introduction The essay analyzes the Interface of Technology within an Organization’s Workplace and the necessity to have a clear understanding of social and behavioral aspects of implementing new technologies. Information Technology uses systems that have the capabilities to input data, store data/information, protect the stored data/information, process data provided using...

British Airways: Information Systems Functions and Safety

Abstract Information systems are a widely used tool to ease company operations by relying on the efficiency information technology brings to system operations. This study identifies that British airways which are heavily reliant on its information technology system to avert air traffic accidents need to improve their data input systems...

Solar Energy in Hydrogen Production and Use in Fuel Cells

What is the cost (in the UAE) using PV technology to produce 1 Kg of hydrogen gas? Hydrogen gas has numerous industrial uses including the production of ammonia through the Haber process, fertilizers and hardening of oils (Gupta, 2008). Hydrogen gas is an environmental-friendly source of sustainable energy because its...

The Conversion of Solar Energy Into Hydrogen Gas for Fuel Cells

What is the cost (in the UAE) using PV technology to produce 1 Kg of hydrogen gas? Fossil fuels are the most common sources of hydrogen, in particular, hydrocarbons such as coal and methane. However, with the increasing requirements of sustainable sources of hydrogen, the electrolysis of water to produce...

Cybercrime and Its Impact in the Gulf Cooperation Council Region

Introduction The introduction of information and communication technologies nowadays offers a great range of advantages for society, especially for the financial sector. Unlimited access to information and communication technologies (ICT) supports freedom of speech as well as promotes online banking and the usage of various mobile data services that ease...

The Concept of Seed Germination

Introduction A seed may be defined as the flowering plant’s unit of reproduction, which can develop into a new plant. Therefore, seeds ensure the continuity of plant reproduction in plants that produce them. Most seeds exist in a dry form that makes them capable of staying dormant for prolonged periods....

Phensuprin Separation Using the Acid-Base Extraction Process

Objective The purpose of the experiment was to separate the individual elements of specific product, Phensuprin using the acid/base extraction process. This analgesic product was contained aspirin (acetylsalicylic acid), acetanilide, and sucrose. These compounds have different solubility. The extraction was used because one solute was more soluble in the solvent...

Internet as Social Media: Connectivity and Immediacy

Introduction The Internet has profoundly revolutionized socialization because it is a powerful social tool. It is a powerful and versatile social media as it links people in virtually every part of the world and allows various forms of communication such as blogs, chats, emails, calls, and tagging of videos. Realizing...

Information Networking as Technology

Introduction Scientific innovations and inventions have created a business environment that calls for effective information management systems; software accustomed to certain organizational needs is continually being developed (Hongbin, 2006). Contemporary business environments are characterized by information sharing, knowledge management, process automation, shortened product life-cycle, and international trade. These new elements...

The Network Security Software

Introduction The increased use of the internet today to accomplish various tasks has led to an increase in internet based crime. Criminals have developed a variety of techniques to increase the threats one is exposed to on using the internet. Among the common intrusion detection schemes is a software application...

Security Issues in Client-Server Computing

Client-server computing This is a computer networking model, which entails an application design, partitioning the tasks between servers (service providers) and clients (service requesters). Dewire (1993) gave a more succinct definition of client-server computing as the logical expansion of modular computerized programming. The client-servers relationship usually exists between one computer...

Poor Information System Planning and Its Negative Effects

Over budget Poor planning on information system may result in over budgeting thus affecting the financial stability of a project or business. High prices and inaccurate cost estimates can cause the information system projects to take more time and money than initially expected. Poor quality An information system structure that...

Scope Verification Process in Project Management

Tools and Techniques Used for a Project (for the Peters Company Project) In order to initiate the scope verification procedure, specific attention should be given to the inspection process, particularly to the product review. Because the primary purpose of the project management lay in defining the correct material to be...

Network Technology in Modern Business

Introduction In recent years, network technology becomes a populate approach that helps companies to solve problems of daily communication and increase productivity. Networks appear to be significant in knowledge capture, knowledge building, and knowledge dissemination. At a corporate worldwide network both captured underwriting transactions to update the corporate database and...

Providing the Operation Security

Introduction To begin with, it should be stated that information security, as well as operation security, entails the principles of keeping information and information flow (which is even more important) safe. These strategies entail the principles of information confidentiality, integrity and availability of information also entailing access control and undermining...

Prince2®: Project Management Methodology

Introduction Project management is the process of planning, organizing, and controlling activities to achieve a goal while predicting and eliminating risks. According to Jugdev et al. (2013), various methodologies and tools are implemented to ensure the project’s success. Focusing on scheduling, setting objectives, and allocating resources allow project managers to...

Ethics in Research

Definition of research ethics Ethics in Research defines moral and scientific principles and legal rules that researchers must follow when researching any field of study. Research ethics as a term may sometimes have different meanings; first is moral conduct in research; second is the analysis of ethical conduct in research....

Online Business Platform: Project Proposal

Summary of the Project The advancement in technology and increased Internet accessibility around the world has led to an explosion of e-commerce. As of 2016, the industry value was at USD 1.9 trillion; however, it is expected to grow to USD 4.48 trillion in 2021 (Finkle, 2). The improvement in...

Advantages of Use of Radio Frequency Identification in Libraries

Introduction RFID is an abbreviation for radio frequency identification and consists of three essential elements; tag, tag reader and host system (Roberts, 2006), all of which will be discussed in more detail shortly. Melbourne university library services just recently made some breaking historical news when the first ever RFID technology...

Business Information Systems Proposal

Introduction Modern technology has brought about many choices regarding the processing of data to improve business processes. As technology continues to advance, businesses are left with no alternative but to embrace the use of information systems to remain relevant to the needs of the consumers (Nel, 2007). Besides applying information...

The Internet: Historical Viewpoint and Social Aspects

Abstract The internet has become a vital part of the society today. It is used for transmitting and accessing information, conducting business, doing jobs among many more. This report discusses the history of the internet from the 1950s to date. It also focuses on its impact on globalisation and how...

The Value of Digital Privacy in an Information Technology Era

Information technology has today altered the way people interact in the society (Banisar, 2011). As connectivity and information becomes readily available to different geographical and demographic sectors, digital privacy has become more valuable (Waldo, Lin& Mille, 2010). On the other hand, privacy has been one of the most enduring social,...

Pros and Cons of Nuclear Energy

The desire to control global warming and its effects has led many scientists and environmentalists to push for adoption of alternative energy sources. The development of nuclear power plants seems to be the sole solution accessible, for a majority of energy stakeholders. The debate is centered on advantages of nuclear...

What Is Photosynthesis and Light Reaction (Calvin Cycle)

The sun is the main source of energy for all animate things on earth. The energy from the sun is received in form of light and heat energy. The heat energy cannot be directly used by plants or animals but warms up the non living environment. The light energy, on...

Parametric and Nonparametric Tests

According to Zikmund and Babin (2010), specific conditions define a parametric test because the parameters used in the test have a unique mathematical distribution. Hebel (2002) describes the conditions necessary for a non-parametric test to include using data characterized by independent observations with variables measured on an interval scale. According...

Nuclear Energy: Advantages and Disadvantages

Introduction and History of Nuclear Power Nuclear energy is a form of energy that atoms release by fission and fusion mechanisms that occur in an atomic reaction. Nuclear energy is economical because an atomic amount of uranium can generate as much amount of energy that the tons of coals can...

Saudi Arabia. Country Study

Saudi Arabia: Introduction The Kingdom of Saudi Arabia is the largest Arab country in Western Asia. This state can be regarded as a monarchy; yet, this form of government allows for local municipal election (Alshamsi, 2010, p. 219). Arabic is the official language of this country; however, one should bear...

Effects of Nuclear Energy

Currently, nuclear power is the leading source of emission-free energy in the world (Kleiner 131). Nuclear energy has been in existence for over two decades. The first recorded instance of nuclear energy was in 1985 after the accidental discovery of X-rays. After this initial discovery of x-rays, scientists across Europe...

Cell Membranes and Osmosis Analysis

Introduction Gaseous exchange, excretion and intake of water and minerals are essential processes in all living things. The above process takes place at the molecular level and molecules have to move across the membrane (Alters, 1999). The cell membrane is semi permeable or selectively permeable. The function of the cell...

Cystic Fibrosis. Genetic Disease Analysis

Introduction Cystic fibrosis is a genetic disorder that occurs due to mutation of the gene called cystic fibrosis transmembrane conductance regulator (CFTR). A mutation in the CFTR affects the transport of sodium and chloride ions across membranes, thus causing production of viscous secretions and thick mucus in organs such as...

Effects of Nuclear Energy Analysis

Introduction Kleiner, with evidence from research, stated that “nuclear energy is the world’s largest source of emission-free energy” (131-132). It can be tracked from 1985 when Wilhelm Rontgen accidently learnt about the existence of X-rays. After Rontgen discovered about the X-rays, scientists from Europe started experimenting in this arena. Becquerel,...

Vicious Circle of Poverty in Brazil

Introduction Poverty is a global problem that is entrenched in many developing countries since many of the citizens in such countries live below the poverty line. According to Katel, Kregel and Reinert (2009, p. 102), the vicious circle of poverty is “a circular constellation of forces that tend to act...

Effects of Intercropping Oat and Lentil on the Overall Yield on Harvest

Abstract Intercropping oat and lentil has potential in the sense that it is projected to enhance grain yield at a low input cost. The objective of this study was to analyze whether this association results in a positive competition or, not courtesy of the substrates’ biomass knowledge in the trays....

Information Security: User’s Responsibility – Research Design and Methodology

When conducting research, it is very important for the researcher to have a research design or structure before starting the process of data collection and analysis. A research design is important in a research study because it helps the researcher answer the research questions and to meet the objectives set...

Sarbanes Oxley Act, 2002: Research Methodology

Introduction This section of the report discusses research methodology used in obtaining results of this study. The section begins by highlighting research objectives that the paper intends to test empirically. The section also outlines research design and data collection methodology of gathering empirical evidence and data analysis techniques employed in...

Project Management Theory in the East-West Link Project, Australia

Introduction Project background The Australian government is cognisant of the role of infrastructure in supporting product and service delivery and improving the country’s productivity. After the industrialization epoch, infrastructure development became part of any meaningful economic growth due to the necessity to transport goods and workforce. Consequently, the Australian government...

The Victorian Desalination Project

Introduction The Victorian government announced that it intended to construct a desalination plant with a capacity of 150-gigalitres of water. The announcement paved the way to the Victorian desalination project on 19 July 2007 (Norimitsu 2010, p.12). Appendix a shows an aerial view of the Victorian desalination project. The major...

The Value of Digital Privacy in an Information Technology Age

Intelius.com is a site that American citizens have used in finding details of other people. The site displays an individual’s data such as addresses, location, email addresses, phone numbers, and full names. In addition, Intelius.com has been targeting people who are interested in dating and reconnecting with family members, military...

Scientific Research: Qualitative and Quantitative Data Collection

Qualitative and quantitative are two major methods of data collection that are applicable in scientific research. While the qualitative method of data collection focuses on intangible parameters such as relationships, behaviors, ethnicity, religion, and social norms, the quantitative method of data collection examines tangible parameters of a given subject of...

Deploying IPv6: Current IPv6 State, and Current Uptake of IPv6

Abstract The internet has been evolving at a very fast rate. This has necessitated the need for its applications to change with the demands of the changing times. The internet protocol version four has been in use for the last twenty-five years. It has however not been effective in the...

Holding Killer Whales in Captivity at Sea World

Introduction Killer whales have been held captive at Sea World for entertainment purposes for many years. The park uses Shamu, the original name of the Orca that had been held captive at the park and that died in 1971, as a trademark for the killer whales held there (Robertson par1)....

The Study of the Social and Moral Implications of Stem Cell Research

Stem Cell Research (“SCR”) is no longer confined to the scientific realm. It has to be analysed using an ethical framework. The study of the social and moral implications of SCR falls under bioethics (Brady, 1996). According to Dahnke and Dreher “bioethics is the sub discipline of applied ethics that...

“Sustainable Diffusion of Renewable Energy Technologies”

Introduction The article ‘Sustainable diffusion of Renewable energy technologies as an example of an Innovation-focused Policy’ by Tsoutsos and Stamboulis in 2005, discusses the new and emerging renewable energy technologies that are different from other policies on renewable sources of energy. The current renewable energy approach only focuses on the...

The Victorian Desalination Project and Its Impact on Melbourne

Executive Summary The Victorian water desalination project is a significant water supply project for Melbourne. The project is part of the state’s effort to complement Melbourne’s water supply. This paper shows that its success lies in the continued partnership and collaboration between the project’s public and private partners. Indeed, the...

The Victorian Desalination Project: Desalination Plant

The state of Victoria located in Australia for almost over ten years had experienced a contagious condition of drought. This had a lot of impact on the water reserves. In June 2007, the Australian government, having known her strategy, decided to concentrate on a large scale production of water reservoirs....

Energy and Technology Innovation

Overview Energy resources are mainly utilized for residential, commercial, and industrial purposes. The speaker argued that implementing energy efficiency can serve 85% of load growth over the next twenty years. Similarly, energy efficiency was defined as a decrease in energy intensity, as a result of behavior change. Generally, energy efficiency...

The Enterprise Resource Planning Systems

Abstract Enterprise resource planning (ERP) has undergone many advancement phases since its instigation in the 1970s in anticipation of establishing itself like a backbone of the majority of leading companies and organisations in the world. Regardless of the immeasurable benefits, the majority of ERP executions necessitate intense customisation to attain...

The Victorian Desalination Project: Overview

Introduction The Victorian desalination project shown above came into being on 19 July 2007 when the Victorian government announced the intention for constructing a desalination plant with a 150-Gigalitre capacity. The main objective of executing this project was to augment water supplies within Melbourne and Geelong coupled with the surrounding...

A Threat to Online Privacy

Introduction Since the advent of technology, so many things have changed and very many aspects of life have been made easier. However, technology just like all other aspects in life is a two edged sword. It is like the two sides of a coin. With all the advantages it has,...

Generation Electricity Through Road Surfaces

Introduction Electricity may be defined as the movement of an electric power charge through a given medium. One of the effects associated with electricity is lightning. Electricity occurs due to several factors. One of the factors is an electromagnetic charge. If a component is electromagnetically charged, then electromagnetic fields are...

Environmental Technology: Solar Energy

Energy in layman’s language is the ability to do physical work; solar energy is, therefore, the ability to do physical work with the sun being the source. According to science, energy is neither created nor destroyed but it is transformable from one form to another; for instance potential energy, i.e....

Developments in Spark-Ignition Engines

Abstract Human civilization has been largely influenced by the invention of engines. From the time when external combustion engines were invented to the introduction of internal combustion engines, people were highly dependent on engines to run machines that were vital in making their work easier. The spark-ignition engines which use...

Computer Components in the Future

Issei Masaie, et al. “Design and development of a card-sized virtual keyboard using permanent magnets and hall sensors.” Electronics & Communications in Japan 92.3 (2009): 32-37. This paper proposes a method to distinguish the key-type of human fingers attached to small permanent magnets. It explains how the various Hall sensors...

Ohs in the Australian Offshore Petroleum Industry

Executive summary The offshore gas and oil industry is highly hazardous. Therefore, the expectations of workers and society are that safety measures should be extremely maintained by the industry players. In fact, offshore oil and gas operators are expected to maintain high safety standards and reduce dangers associated with major...

Engineering for Community Development

Executive Summary Engineering for community development is a project work that is designed for Shaima village. It is a project that is to be carried out by the Stepping Forward Engineering Group. It clearly shows how the group intends to provide the village with power, water and road transport. The...

West Gate Bridge Project Case Study

An Analysis of the West Gate Bridge Project’s Structure and Management The West Gate Bridge project was initially conceived by the Lower Yarra Crossing Company Ltd (LYCC), which was negotiating with the government on the project. The state disbanded LYCC and instead established a management body called Lower Yarra Crossing...

System Application Products (SAP) Enterprise Resource Planning

System application and products (SAP) is application software used by most businesspersons to carry out certain functions, such as data processing used in their businesses resulting to increased efficiency, effectiveness and also enhanced innovation. SAP AG was founded in 1972 in Germany and was modified in America where it changed...

Nuclear Energy: Economic Effects and Social Impact

Nuclear energy is produced through fission using uranium as fuel. This energy is created through a process of controlled nuclear reactions. In this process, a lot of heat is produced. This heat is the main source of energy in a nuclear reactor. It is mostly used to boil water and...

Genetic Disease Diagnosis, Screening and Treatment

Introduction Genetic technology is one of the fastest growing sectors in health care provision today. The emergence of genetic based diseases has prompted medical practitioners all over the world to put more focus on the diagnosis, screening and treatment of these conditions (Lapham & Kozma, 1996). This has been achieved...

Constitutional Law: Information Security

Information security is a critical detail of any government seeking to insure its economic growth and national security. With the revolution of technology, globalization, and the advent of the internet, a new crime has emerged waging war on a virtual front in the form of cyber attacks. Consequently, the government...

Project Management and Software Quality

Abstract For the last few decades, project management and software quality management have undergone tremendous changes. This has been prompted by the constant pace of change in the information technology world, which has brought in new challenges hence calling for different solutions to the problem. This paper explores a number...

Computer Software as Barrier to Wide Use of Wireless Information Systems

Wireless communication is a medium through which different devices and parties communicate. The components that are required to implement an effective wireless technology are important because they enhance people’s understanding of communication. Computer software is important in developing effective wireless communication technology systems. Computer software is important as it enhances...

Using RFID Technology in Health Industry

Abstract The use of Radio Frequency Identification (RFID) technology in the health care industry has increased in the last three decades and has been effective in managing inventory and assets, tracking of products and patients, and identification of patients. This paper reviews the history of RFID, its application in the...

Qualitative Research – Ethnographic Methodology

Introduction Ethnographic methodologies are a significant part of any research. They are especially applied in the study of anthropology. Human beings exhibit special group characteristics like any other animals. Previous studies that have used an outside approach in their methodologies have always had some problems with the accuracy and quality...

Genetic Engineering: The Various Viewpoints

Anderson, C.E. (2000). Genetic engineering: Dangers and opportunities. The Futurist, 34(2), 20-25. Web.  This article came from a peer-reviewed journal and was intended for a general reading audience. The focus of this article was on the probable impacts, both good and bad, that genetic engineering can have. The methodology utilized...

The Embryonic Stem Cell Research

Stem Cell Research as an Ethical Issue in the Field of Genetics Stem cell technology is considered one of the miracles of the 21st century. It has emerged as one of the promising fields of study for preventing, curing, or even understanding the nature of debilitating and life-threatening diseases such...

Security Risk Management in Financial Service Companies

The development of information management technologies have been hailed as a valuable milestone in terms of enhancing effective and efficient business management. Several benefits have been accrued from the applications of modern information managemt technologies. These include enhancement managemt of business information, increase in the speed of business transactions, reduction...

Sarbanes-Oxley Act: Impact and Issues Before and After the Implementation

Introduction Financial auditing has had a dramatic change over the past decade and is still expected to change as more businesses and companies continue to rely on information technology to help them achieve their core objectives. Sarbanes-Oxley Act of 2002 was enacted as a response to a wave of highly...

Virtualization, Cloud Computing, and Security

Introduction Virtualization and cloud computing are new technologies that have widely been adopted by many organizations offering computing services. Among the reasons for the trend are that many organizations have found virtualization and cloud computing cost effective. That has strongly reinforced the need to understand the technologies (cloud computing and...

Nuclear Reactor: Functions and Importance

Introduction Nuclear power is both liked and loathed because it stands between the border of humanity’s greatest hopes and deepest fears for the future. The fact that atomic energy provides a clean energy alternative that relieves the human race of the problems associated with fossil fuel dependence is not in...

Virtualization, Cloud Computing, and Security

Abstract More and more companies offering computing services are shifting towards virtualization and cloud computing technologies. These new technologies provide a platform for the provision of computing services on demand. Virtualization provides a platform to run different applications on underlying hardware platforms by running multiple operating systems on a single...

Human Error in Operator Decision-Making

Introduction Human error in operator decision-making often results to tragic events and industrial accidents. In particular, in aviation, human error has far-reaching implications on the safety of the passengers and the pilot as well. Hence, an effort to design better computer systems to reduce human error and make the aviation...

Information Technology Professional’s Resource Center

The Information Technology Professional’s Resource Center was initially created in early 1999 to offer provision for a one-stop-shop for Information Technology experts to retrieve important information that touches on data and networking. They also play a great role in providing links to information related to networking, making it accessible and...

Infrastructure: The East-West Link Project Management

Executive Summary The East West Link Project has been based on a careful research done by the Victorian State Government to try to eliminate traffic congestion in Melbourne City. This city has been losing its attractiveness to investors and visitors due to slow movement of traffic. In a bid to...

The Security of Organizational Networks

Introduction Data is as important to a company as its employees and the physical assets that generate income. Therefore, the compilation, transmission, storage, analysis, and access should be secured (Whitman, Mattord, & Green, 2011). Network security is a concept that successful companies embrace and implement because it protects and secures...

The Use of Companies Big Data

Abstract Big data, which is also known as business intelligence, significantly influences accounting operations following the accessibility of new data types. It can avail textual, video, and image information, which may be very useful in enhancing financial reporting, managerial accounting, and financial bookkeeping. For managerial accounting, data analysis can assist...

Using Social Media Impact on Online Courses

Introduction Higher education structures are rapidly changing. Traditional libraries that were synonymous with bookshelves have since been replaced by digital libraries. Students have turned to new media resources such as videos, e-books, and DVDs as sources of knowledge and information. Social media is one of the internet tools that have...