Sciences, Tech & Engineering Examples for Free - Page 3

Cyber Security: Intrusion Detection

Abstract One of the major concerns in the present environment is maintaining privacy. Intruders try to gain access to restricted files or areas thereby hindering privacy. The areas under threat include workstations, data transactions, a forest reserve, and many more. This has led the researchers to come up with what...

Words: 2522 Pages: 10

The Impact of River Water on Wheat Plant Growth

Abstract Normal plant growth occurs in the presence of water, adequate nutrients, and light. The goal of this study was to investigate the impact of the James River water at varying concentrations on the growth of wheat plants. The highest growth rates were realized in the plants treated with 0%,...

Words: 1130 Pages: 5

Microscopy & Cells: Laboratory Experiment

Cheek Cell (animal) – the marked cell components are the nucleus and cell membrane. Elodea (plant) – the marked cell components are the cell wall and chloroplast that appear as the green dots. A compound microscope’s total magnifying power is determined by multiplying the ocular lens’ magnifying power with the...

Words: 274 Pages: 2

Turkey Country Risk Analysis

Abstract The purpose of this study is to carry out risk analysis in a country and determine the best way to manage the risk. The country of consideration in this case is Turkey. As a country, Turkey is in between Middle East and Europe and has mixed culture between the...

Words: 2203 Pages: 9

Nuclear Chemistry in Nuclear Reactors

The fission reaction is carried out in the main unit of a nuclear power plant – a nuclear reactor. Nuclear fission is the decay of a heavy atomic nucleus (uranium, for example) into two or more light nuclei. It is accompanied by the emission of two or three neutrons and...

Words: 369 Pages: 2

XYZ Inc.: Description of an Information System

Introduction The horizontal construction industry has undergone remarkable transformations over the past decades. One of the factors that has promoted growth within this industry relates to adoption of new construction methods, for example the Accelerated Bridge Construction [ABC]. This method has enabled construction companies to compress their project schedules. Firms...

Words: 1822 Pages: 8

Lean Project Management in Different Areas

Introduction Background The concept of lean project management is rapidly gaining popularity around the world in different fields. According to Schaufelberger and Holm (2017), a lean operation involves the provision of excellent value to customers using the least amount of resources. Its fundamental principles are the creation of maximum value...

Words: 12486 Pages: 48

Evaluation of Current Project Management Practices

Introduction Project management is a broad subject and a concept used in almost all types of organizations, industries, and sectors. Managing a project means taking it through several steps from the start to its completion. The stages are called project life cycle, which entails a series of steps through which...

Words: 2512 Pages: 11

Study of China and the World

The article by Catherine Keyser and Su Lin is based on the different definitions of the term “peaceful rise” brought about by the different views by the different scholars. There is controversy over the possibility of a peaceful rise through international development and international relations due to delicate international relations....

Words: 1298 Pages: 5

China’s Role in the World Economy

While there are diverse views on whether Chinese leaders who have become more confident in recent years are using their newfound influence to build china’s interest or whether china has just laid down strategies to safeguard he economy, there is no doubt that the role that China plays in the...

Words: 3082 Pages: 12

Business Information System

Introduction With time as the markets are expanding and globalization is taking place all over the world, Companies are finding it more and more intricate to cope with the growing needs of a good organizational structure, plan, and strategy. Whether it may be a manufacturing firm, a service provider, or...

Words: 1736 Pages: 7

Human Resources Management Information System

Information systems management is a relatively new area of management influenced by technological and information changes. Since the kind of performance required depends partly on the technology being used, performance management techniques have to fit with the technology of the organization. In this vein high technology settings have certain characteristics...

Words: 1108 Pages: 5

Evolution and Natural Selection in Darwin’s Finches

Evolution and natural selection were Charles Darwin’s theories that sought to explain the origin, migration and population of living things. All living things fight for their survival through the application of their internal instincts. They also have natural features that enable them to exist and survive in the environment. The...

Words: 1125 Pages: 5

Geographic Information System, Connecting Databases

Geographic Information System (GIS) is a PC framework for catching, putting away, checking, coordinating, controlling, investigating, and showing information identified with positions on the Earth’s surface. Hence, it is a method of connecting databases with maps, displaying data, performing spatial examinations, or creating and applying spatial models. These systems are...

Words: 1116 Pages: 5

Impact of Information Technology on a Clothing Company

Information technology (IT) refers to the technology used for dealing with various types of information, such as business data, images, or conversations. The wide use of computers and the Internet has made IT an essential element of the contemporary world and business world in particular. IT has changed the way...

Words: 582 Pages: 3

Solar Panels System and Sustainability

Step 1 The key problem with solar power that has discouraged its use is the fact that its technology is still very expensive and unreliable. Compared with the use of hydro, nuclear, geothermal, and coal, the use of solar power has not been widely embraced (Armentrout 24). The popularity of...

Words: 1445 Pages: 6

The Interface of Technology Within an Organizational Workplace

Introduction The essay analyzes the Interface of Technology within an Organization’s Workplace and the necessity to have a clear understanding of social and behavioral aspects of implementing new technologies. Information Technology uses systems that have the capabilities to input data, store data/information, protect the stored data/information, process data provided using...

Words: 610 Pages: 3

British Airways: Information Systems Functions and Safety

Abstract Information systems are a widely used tool to ease company operations by relying on the efficiency information technology brings to system operations. This study identifies that British airways which are heavily reliant on its information technology system to avert air traffic accidents need to improve their data input systems...

Words: 2547 Pages: 11

Solar Energy in Hydrogen Production and Use in Fuel Cells

What is the cost (in the UAE) using PV technology to produce 1 Kg of hydrogen gas? Hydrogen gas has numerous industrial uses including the production of ammonia through the Haber process, fertilizers and hardening of oils (Gupta, 2008). Hydrogen gas is an environmental-friendly source of sustainable energy because its...

Words: 717 Pages: 3

The Conversion of Solar Energy Into Hydrogen Gas for Fuel Cells

What is the cost (in the UAE) using PV technology to produce 1 Kg of hydrogen gas? Fossil fuels are the most common sources of hydrogen, in particular, hydrocarbons such as coal and methane. However, with the increasing requirements of sustainable sources of hydrogen, the electrolysis of water to produce...

Words: 720 Pages: 3

Cybercrime and Its Impact in the Gulf Cooperation Council Region

Introduction The introduction of information and communication technologies nowadays offers a great range of advantages for society, especially for the financial sector. Unlimited access to information and communication technologies (ICT) supports freedom of speech as well as promotes online banking and the usage of various mobile data services that ease...

Words: 6731 Pages: 28

The Concept of Seed Germination

Introduction A seed may be defined as the flowering plant’s unit of reproduction, which can develop into a new plant. Therefore, seeds ensure the continuity of plant reproduction in plants that produce them. Most seeds exist in a dry form that makes them capable of staying dormant for prolonged periods....

Words: 1226 Pages: 5

Phensuprin Separation Using the Acid-Base Extraction Process

Objective The purpose of the experiment was to separate the individual elements of specific product, Phensuprin using the acid/base extraction process. This analgesic product was contained aspirin (acetylsalicylic acid), acetanilide, and sucrose. These compounds have different solubility. The extraction was used because one solute was more soluble in the solvent...

Words: 2447 Pages: 11

Internet as Social Media: Connectivity and Immediacy

Introduction The Internet has profoundly revolutionized socialization because it is a powerful social tool. It is a powerful and versatile social media as it links people in virtually every part of the world and allows various forms of communication such as blogs, chats, emails, calls, and tagging of videos. Realizing...

Words: 1529 Pages: 6

Information Networking as Technology

Introduction Scientific innovations and inventions have created a business environment that calls for effective information management systems; software accustomed to certain organizational needs is continually being developed (Hongbin, 2006). Contemporary business environments are characterized by information sharing, knowledge management, process automation, shortened product life-cycle, and international trade. These new elements...

Words: 1402 Pages: 6

The Network Security Software

Introduction The increased use of the internet today to accomplish various tasks has led to an increase in internet based crime. Criminals have developed a variety of techniques to increase the threats one is exposed to on using the internet. Among the common intrusion detection schemes is a software application...

Words: 2703 Pages: 11

Security Issues in Client-Server Computing

Client-server computing This is a computer networking model, which entails an application design, partitioning the tasks between servers (service providers) and clients (service requesters). Dewire (1993) gave a more succinct definition of client-server computing as the logical expansion of modular computerized programming. The client-servers relationship usually exists between one computer...

Words: 1359 Pages: 5

Poor Information System Planning and Its Negative Effects

Over budget Poor planning on information system may result in over budgeting thus affecting the financial stability of a project or business. High prices and inaccurate cost estimates can cause the information system projects to take more time and money than initially expected. Poor quality An information system structure that...

Words: 585 Pages: 3

Scope Verification Process in Project Management

Tools and Techniques Used for a Project (for the Peters Company Project) In order to initiate the scope verification procedure, specific attention should be given to the inspection process, particularly to the product review. Because the primary purpose of the project management lay in defining the correct material to be...

Words: 1658 Pages: 7

Network Technology in Modern Business

Introduction In recent years, network technology becomes a populate approach that helps companies to solve problems of daily communication and increase productivity. Networks appear to be significant in knowledge capture, knowledge building, and knowledge dissemination. At a corporate worldwide network both captured underwriting transactions to update the corporate database and...

Words: 2137 Pages: 8

Providing the Operation Security

Introduction To begin with, it should be stated that information security, as well as operation security, entails the principles of keeping information and information flow (which is even more important) safe. These strategies entail the principles of information confidentiality, integrity and availability of information also entailing access control and undermining...

Words: 574 Pages: 3

Prince2®: Project Management Methodology

Introduction Project management is the process of planning, organizing, and controlling activities to achieve a goal while predicting and eliminating risks. According to Jugdev et al. (2013), various methodologies and tools are implemented to ensure the project’s success. Focusing on scheduling, setting objectives, and allocating resources allow project managers to...

Words: 1407 Pages: 7

Ethics in Research

Definition of research ethics Ethics in Research defines moral and scientific principles and legal rules that researchers must follow when researching any field of study. Research ethics as a term may sometimes have different meanings; first is moral conduct in research; second is the analysis of ethical conduct in research....

Words: 914 Pages: 4

Online Business Platform: Project Proposal

Summary of the Project The advancement in technology and increased Internet accessibility around the world has led to an explosion of e-commerce. As of 2016, the industry value was at USD 1.9 trillion; however, it is expected to grow to USD 4.48 trillion in 2021 (Finkle, 2). The improvement in...

Words: 1467 Pages: 6

Advantages of Use of Radio Frequency Identification in Libraries

Introduction RFID is an abbreviation for radio frequency identification and consists of three essential elements; tag, tag reader and host system (Roberts, 2006), all of which will be discussed in more detail shortly. Melbourne university library services just recently made some breaking historical news when the first ever RFID technology...

Words: 3644 Pages: 14

Business Information Systems Proposal

Introduction Modern technology has brought about many choices regarding the processing of data to improve business processes. As technology continues to advance, businesses are left with no alternative but to embrace the use of information systems to remain relevant to the needs of the consumers (Nel, 2007). Besides applying information...

Words: 888 Pages: 4

The Internet: Historical Viewpoint and Social Aspects

Abstract The internet has become a vital part of the society today. It is used for transmitting and accessing information, conducting business, doing jobs among many more. This report discusses the history of the internet from the 1950s to date. It also focuses on its impact on globalisation and how...

Words: 2475 Pages: 10

The Value of Digital Privacy in an Information Technology Era

Information technology has today altered the way people interact in the society (Banisar, 2011). As connectivity and information becomes readily available to different geographical and demographic sectors, digital privacy has become more valuable (Waldo, Lin& Mille, 2010). On the other hand, privacy has been one of the most enduring social,...

Words: 825 Pages: 4

Pros and Cons of Nuclear Energy

The desire to control global warming and its effects has led many scientists and environmentalists to push for adoption of alternative energy sources. The development of nuclear power plants seems to be the sole solution accessible, for a majority of energy stakeholders. The debate is centered on advantages of nuclear...

Words: 557 Pages: 3

What Is Photosynthesis and Light Reaction (Calvin Cycle)

The sun is the main source of energy for all animate things on earth. The energy from the sun is received in form of light and heat energy. The heat energy cannot be directly used by plants or animals but warms up the non living environment. The light energy, on...

Words: 1439 Pages: 6

Parametric and Nonparametric Tests

According to Zikmund and Babin (2010), specific conditions define a parametric test because the parameters used in the test have a unique mathematical distribution. Hebel (2002) describes the conditions necessary for a non-parametric test to include using data characterized by independent observations with variables measured on an interval scale. According...

Words: 546 Pages: 3

Nuclear Energy: Advantages and Disadvantages

Introduction and History of Nuclear Power Nuclear energy is a form of energy that atoms release by fission and fusion mechanisms that occur in an atomic reaction. Nuclear energy is economical because an atomic amount of uranium can generate as much amount of energy that the tons of coals can...

Words: 2262 Pages: 9

Saudi Arabia. Country Study

Saudi Arabia: Introduction The Kingdom of Saudi Arabia is the largest Arab country in Western Asia. This state can be regarded as a monarchy; yet, this form of government allows for local municipal election (Alshamsi, 2010, p. 219). Arabic is the official language of this country; however, one should bear...

Words: 2198 Pages: 9

Effects of Nuclear Energy

Currently, nuclear power is the leading source of emission-free energy in the world (Kleiner 131). Nuclear energy has been in existence for over two decades. The first recorded instance of nuclear energy was in 1985 after the accidental discovery of X-rays. After this initial discovery of x-rays, scientists across Europe...

Words: 2277 Pages: 9

Cell Membranes and Osmosis Analysis

Introduction Gaseous exchange, excretion and intake of water and minerals are essential processes in all living things. The above process takes place at the molecular level and molecules have to move across the membrane (Alters, 1999). The cell membrane is semi permeable or selectively permeable. The function of the cell...

Words: 860 Pages: 4

Cystic Fibrosis. Genetic Disease Analysis

Introduction Cystic fibrosis is a genetic disorder that occurs due to mutation of the gene called cystic fibrosis transmembrane conductance regulator (CFTR). A mutation in the CFTR affects the transport of sodium and chloride ions across membranes, thus causing production of viscous secretions and thick mucus in organs such as...

Words: 1332 Pages: 6

Effects of Nuclear Energy Analysis

Introduction Kleiner, with evidence from research, stated that “nuclear energy is the world’s largest source of emission-free energy” (131-132). It can be tracked from 1985 when Wilhelm Rontgen accidently learnt about the existence of X-rays. After Rontgen discovered about the X-rays, scientists from Europe started experimenting in this arena. Becquerel,...

Words: 1946 Pages: 8

Vicious Circle of Poverty in Brazil

Introduction Poverty is a global problem that is entrenched in many developing countries since many of the citizens in such countries live below the poverty line. According to Katel, Kregel and Reinert (2009, p. 102), the vicious circle of poverty is “a circular constellation of forces that tend to act...

Words: 1140 Pages: 5

Effects of Intercropping Oat and Lentil on the Overall Yield on Harvest

Abstract Intercropping oat and lentil has potential in the sense that it is projected to enhance grain yield at a low input cost. The objective of this study was to analyze whether this association results in a positive competition or, not courtesy of the substrates’ biomass knowledge in the trays....

Words: 1354 Pages: 5

Information Security: User’s Responsibility – Research Design and Methodology

When conducting research, it is very important for the researcher to have a research design or structure before starting the process of data collection and analysis. A research design is important in a research study because it helps the researcher answer the research questions and to meet the objectives set...

Words: 928 Pages: 4

Sarbanes Oxley Act, 2002: Research Methodology

Introduction This section of the report discusses research methodology used in obtaining results of this study. The section begins by highlighting research objectives that the paper intends to test empirically. The section also outlines research design and data collection methodology of gathering empirical evidence and data analysis techniques employed in...

Words: 4779 Pages: 18

Project Management Theory in the East-West Link Project, Australia

Introduction Project background The Australian government is cognisant of the role of infrastructure in supporting product and service delivery and improving the country’s productivity. After the industrialization epoch, infrastructure development became part of any meaningful economic growth due to the necessity to transport goods and workforce. Consequently, the Australian government...

Words: 4638 Pages: 18

The Victorian Desalination Project

Introduction The Victorian government announced that it intended to construct a desalination plant with a capacity of 150-gigalitres of water. The announcement paved the way to the Victorian desalination project on 19 July 2007 (Norimitsu 2010, p.12). Appendix a shows an aerial view of the Victorian desalination project. The major...

Words: 2769 Pages: 11

The Value of Digital Privacy in an Information Technology Age

Intelius.com is a site that American citizens have used in finding details of other people. The site displays an individual’s data such as addresses, location, email addresses, phone numbers, and full names. In addition, Intelius.com has been targeting people who are interested in dating and reconnecting with family members, military...

Words: 1129 Pages: 5

Scientific Research: Qualitative and Quantitative Data Collection

Qualitative and quantitative are two major methods of data collection that are applicable in scientific research. While the qualitative method of data collection focuses on intangible parameters such as relationships, behaviors, ethnicity, religion, and social norms, the quantitative method of data collection examines tangible parameters of a given subject of...

Words: 669 Pages: 3

Deploying IPv6: Current IPv6 State, and Current Uptake of IPv6

Abstract The internet has been evolving at a very fast rate. This has necessitated the need for its applications to change with the demands of the changing times. The internet protocol version four has been in use for the last twenty-five years. It has however not been effective in the...

Words: 4920 Pages: 19

Holding Killer Whales in Captivity at Sea World

Introduction Killer whales have been held captive at Sea World for entertainment purposes for many years. The park uses Shamu, the original name of the Orca that had been held captive at the park and that died in 1971, as a trademark for the killer whales held there (Robertson par1)....

Words: 671 Pages: 3

The Study of the Social and Moral Implications of Stem Cell Research

Stem Cell Research (“SCR”) is no longer confined to the scientific realm. It has to be analysed using an ethical framework. The study of the social and moral implications of SCR falls under bioethics (Brady, 1996). According to Dahnke and Dreher “bioethics is the sub discipline of applied ethics that...

Words: 1181 Pages: 5

“Sustainable Diffusion of Renewable Energy Technologies”

Introduction The article ‘Sustainable diffusion of Renewable energy technologies as an example of an Innovation-focused Policy’ by Tsoutsos and Stamboulis in 2005, discusses the new and emerging renewable energy technologies that are different from other policies on renewable sources of energy. The current renewable energy approach only focuses on the...

Words: 599 Pages: 3

The Victorian Desalination Project and Its Impact on Melbourne

Executive Summary The Victorian water desalination project is a significant water supply project for Melbourne. The project is part of the state’s effort to complement Melbourne’s water supply. This paper shows that its success lies in the continued partnership and collaboration between the project’s public and private partners. Indeed, the...

Words: 2214 Pages: 9

The Victorian Desalination Project: Desalination Plant

The state of Victoria located in Australia for almost over ten years had experienced a contagious condition of drought. This had a lot of impact on the water reserves. In June 2007, the Australian government, having known her strategy, decided to concentrate on a large scale production of water reservoirs....

Words: 2232 Pages: 9

Energy and Technology Innovation

Overview Energy resources are mainly utilized for residential, commercial, and industrial purposes. The speaker argued that implementing energy efficiency can serve 85% of load growth over the next twenty years. Similarly, energy efficiency was defined as a decrease in energy intensity, as a result of behavior change. Generally, energy efficiency...

Words: 601 Pages: 3

The Enterprise Resource Planning Systems

Abstract Enterprise resource planning (ERP) has undergone many advancement phases since its instigation in the 1970s in anticipation of establishing itself like a backbone of the majority of leading companies and organisations in the world. Regardless of the immeasurable benefits, the majority of ERP executions necessitate intense customisation to attain...

Words: 3308 Pages: 13

The Victorian Desalination Project: Overview

Introduction The Victorian desalination project shown above came into being on 19 July 2007 when the Victorian government announced the intention for constructing a desalination plant with a 150-Gigalitre capacity. The main objective of executing this project was to augment water supplies within Melbourne and Geelong coupled with the surrounding...

Words: 3035 Pages: 12

A Threat to Online Privacy

Introduction Since the advent of technology, so many things have changed and very many aspects of life have been made easier. However, technology just like all other aspects in life is a two edged sword. It is like the two sides of a coin. With all the advantages it has,...

Words: 1436 Pages: 6

Generation Electricity Through Road Surfaces

Introduction Electricity may be defined as the movement of an electric power charge through a given medium. One of the effects associated with electricity is lightning. Electricity occurs due to several factors. One of the factors is an electromagnetic charge. If a component is electromagnetically charged, then electromagnetic fields are...

Words: 4086 Pages: 15

Environmental Technology: Solar Energy

Energy in layman’s language is the ability to do physical work; solar energy is, therefore, the ability to do physical work with the sun being the source. According to science, energy is neither created nor destroyed but it is transformable from one form to another; for instance potential energy, i.e....

Words: 1680 Pages: 7

Developments in Spark-Ignition Engines

Abstract Human civilization has been largely influenced by the invention of engines. From the time when external combustion engines were invented to the introduction of internal combustion engines, people were highly dependent on engines to run machines that were vital in making their work easier. The spark-ignition engines which use...

Words: 3238 Pages: 13

Computer Components in the Future

Issei Masaie, et al. “Design and development of a card-sized virtual keyboard using permanent magnets and hall sensors.” Electronics & Communications in Japan 92.3 (2009): 32-37. This paper proposes a method to distinguish the key-type of human fingers attached to small permanent magnets. It explains how the various Hall sensors...

Words: 1547 Pages: 7

Ohs in the Australian Offshore Petroleum Industry

Executive summary The offshore gas and oil industry is highly hazardous. Therefore, the expectations of workers and society are that safety measures should be extremely maintained by the industry players. In fact, offshore oil and gas operators are expected to maintain high safety standards and reduce dangers associated with major...

Words: 2783 Pages: 12

Engineering for Community Development

Executive Summary Engineering for community development is a project work that is designed for Shaima village. It is a project that is to be carried out by the Stepping Forward Engineering Group. It clearly shows how the group intends to provide the village with power, water and road transport. The...

Words: 3384 Pages: 12

Failures in the Management of the West Gate Bridge Project

An Analysis of the West Gate Bridge Project’s Structure and Management The West Gate Bridge project was initially conceived by the Lower Yarra Crossing Company Ltd (LYCC), which was negotiating with the government on the project. The state disbanded LYCC and instead established a management body called Lower Yarra Crossing...

Words: 1438 Pages: 6

System Application Products (SAP) Enterprise Resource Planning

System application and products (SAP) is application software used by most businesspersons to carry out certain functions, such as data processing used in their businesses resulting to increased efficiency, effectiveness and also enhanced innovation. SAP AG was founded in 1972 in Germany and was modified in America where it changed...

Words: 596 Pages: 3

Nuclear Energy: Economic Effects and Social Impact

Nuclear energy is produced through fission using uranium as fuel. This energy is created through a process of controlled nuclear reactions. In this process, a lot of heat is produced. This heat is the main source of energy in a nuclear reactor. It is mostly used to boil water and...

Words: 857 Pages: 4

Genetic Disease Diagnosis, Screening and Treatment

Introduction Genetic technology is one of the fastest growing sectors in health care provision today. The emergence of genetic based diseases has prompted medical practitioners all over the world to put more focus on the diagnosis, screening and treatment of these conditions (Lapham & Kozma, 1996). This has been achieved...

Words: 1709 Pages: 7

Constitutional Law: Information Security

Information security is a critical detail of any government seeking to insure its economic growth and national security. With the revolution of technology, globalization, and the advent of the internet, a new crime has emerged waging war on a virtual front in the form of cyber attacks. Consequently, the government...

Words: 1472 Pages: 6

Project Management and Software Quality

Abstract For the last few decades, project management and software quality management have undergone tremendous changes. This has been prompted by the constant pace of change in the information technology world, which has brought in new challenges hence calling for different solutions to the problem. This paper explores a number...

Words: 3815 Pages: 15

Computer Software as Barrier to Wide Use of Wireless Information Systems

Wireless communication is a medium through which different devices and parties communicate. The components that are required to implement an effective wireless technology are important because they enhance people’s understanding of communication. Computer software is important in developing effective wireless communication technology systems. Computer software is important as it enhances...

Words: 838 Pages: 4

Using RFID Technology in Health Industry

Abstract The use of Radio Frequency Identification (RFID) technology in the health care industry has increased in the last three decades and has been effective in managing inventory and assets, tracking of products and patients, and identification of patients. This paper reviews the history of RFID, its application in the...

Words: 3420 Pages: 14

Qualitative Research – Ethnographic Methodology

Introduction Ethnographic methodologies are a significant part of any research. They are especially applied in the study of anthropology. Human beings exhibit special group characteristics like any other animals. Previous studies that have used an outside approach in their methodologies have always had some problems with the accuracy and quality...

Words: 2507 Pages: 11

Genetic Engineering: The Various Viewpoints

Anderson, C.E. (2000). Genetic engineering: Dangers and opportunities. The Futurist, 34(2), 20-25. Web.  This article came from a peer-reviewed journal and was intended for a general reading audience. The focus of this article was on the probable impacts, both good and bad, that genetic engineering can have. The methodology utilized...

Words: 1121 Pages: 4

The Embryonic Stem Cell Research

Stem Cell Research as an Ethical Issue in the Field of Genetics Stem cell technology is considered one of the miracles of the 21st century. It has emerged as one of the promising fields of study for preventing, curing, or even understanding the nature of debilitating and life-threatening diseases such...

Words: 755 Pages: 3

Security Risk Management in Financial Service Companies

The development of information management technologies have been hailed as a valuable milestone in terms of enhancing effective and efficient business management. Several benefits have been accrued from the applications of modern information managemt technologies. These include enhancement managemt of business information, increase in the speed of business transactions, reduction...

Words: 3361 Pages: 13

Sarbanes-Oxley Act: Impact and Issues Before and After the Implementation

Introduction Financial auditing has had a dramatic change over the past decade and is still expected to change as more businesses and companies continue to rely on information technology to help them achieve their core objectives. Sarbanes-Oxley Act of 2002 was enacted as a response to a wave of highly...

Words: 1001 Pages: 4

Virtualization, Cloud Computing, and Security

Introduction Virtualization and cloud computing are new technologies that have widely been adopted by many organizations offering computing services. Among the reasons for the trend are that many organizations have found virtualization and cloud computing cost effective. That has strongly reinforced the need to understand the technologies (cloud computing and...

Words: 6051 Pages: 24

Nuclear Reactor: Functions and Importance

Introduction Nuclear power is both liked and loathed because it stands between the border of humanity’s greatest hopes and deepest fears for the future. The fact that atomic energy provides a clean energy alternative that relieves the human race of the problems associated with fossil fuel dependence is not in...

Words: 1742 Pages: 7

Cloud Computing and Virtualization as Complimentary Technologies

Abstract More and more companies offering computing services are shifting towards virtualization and cloud computing technologies. These new technologies provide a platform for the provision of computing services on demand. Virtualization provides a platform to run different applications on underlying hardware platforms by running multiple operating systems on a single...

Words: 6269 Pages: 25

Human Error in Operator Decision-Making

Introduction Human error in operator decision-making often results to tragic events and industrial accidents. In particular, in aviation, human error has far-reaching implications on the safety of the passengers and the pilot as well. Hence, an effort to design better computer systems to reduce human error and make the aviation...

Words: 2808 Pages: 11

Information Technology Professional’s Resource Center

The Information Technology Professional’s Resource Center was initially created in early 1999 to offer provision for a one-stop-shop for Information Technology experts to retrieve important information that touches on data and networking. They also play a great role in providing links to information related to networking, making it accessible and...

Words: 865 Pages: 4

Infrastructure: The East-West Link Project Management

Executive Summary The East West Link Project has been based on a careful research done by the Victorian State Government to try to eliminate traffic congestion in Melbourne City. This city has been losing its attractiveness to investors and visitors due to slow movement of traffic. In a bid to...

Words: 3661 Pages: 14

The Security of Organizational Networks

Introduction Data is as important to a company as its employees and the physical assets that generate income. Therefore, the compilation, transmission, storage, analysis, and access should be secured (Whitman, Mattord, & Green, 2011). Network security is a concept that successful companies embrace and implement because it protects and secures...

Words: 1156 Pages: 5

The Use of Companies Big Data

Abstract Big data, which is also known as business intelligence, significantly influences accounting operations following the accessibility of new data types. It can avail textual, video, and image information, which may be very useful in enhancing financial reporting, managerial accounting, and financial bookkeeping. For managerial accounting, data analysis can assist...

Words: 2024 Pages: 8

Using Social Media Impact on Online Courses

Introduction Higher education structures are rapidly changing. Traditional libraries that were synonymous with bookshelves have since been replaced by digital libraries. Students have turned to new media resources such as videos, e-books, and DVDs as sources of knowledge and information. Social media is one of the internet tools that have...

Words: 1432 Pages: 6

Ethical Considerations in the Use of Assistive Technologies

According to Beauchamp and Childress (2001, p. 78), the use of technology in the treatment and management of dementia is widespread. One such technology is assistive technology which is being used to provide medical solutions and services. Sommerville (2003) indicates that its potential can be misused. Ethically, the wishes of...

Words: 610 Pages: 3

Data Communication Laboratory Report of Wi-Fi and LAN Technologies

Introduction The experiment detailed below analyses several components and functionalities of Wi-Fi and LAN technologies. In the experiment, a number of units were analysed. The units included protocol analyser, network analyser, TCP/IP LAN technology, advanced LAN technology, rack server module, wireless LAN technology, and copper tool kit. Network monitoring analyser...

Words: 1031 Pages: 4

Cell Division: Mitosis and Meiosis Mechanisms

Abstract Cell division tends to generate daughter from a parent cell to the transfer of genetic characteristics in the form of DNA from the parent cells. Cell division happens in two different forms namely mitosis and meiosis. Mitosis involves identical daughter cells formed by replicating and dividing the original chromosomes...

Words: 1225 Pages: 6

Is Nuclear (Fission) Power Sustainable?

Nuclear power is generated through three main nuclear processes that include nuclear fission, nuclear fusion, and nuclear decay (Ferguson, 2011). Nuclear fission of chemical elements produces the highest amount of energy compared to nuclear decay and nuclear fusion of the same elements. In 2012, nuclear energy accounted for 13% of...

Words: 898 Pages: 4

Research Approach and Methodology

Research philosophy (interpretivism) Research philosophy informs the data collection process (Sekaran, 2006). According to Johnson and Christensen (2010), appropriate and effective data collection process depends on the research philosophy chosen by the researcher. Besides, Johnson and Christensen (2010) asserted that the chosen study philosophy is the viewpoint that is founded...

Words: 1170 Pages: 5

E-Learning in the Academic Industry

Abstract E-learning is commonly utilised in disseminating knowledge to students in institutions of higher learning. Several tertiary educational centres are shifting focus on e-learning mainly because of its flexibility and ease of access. A number of studies conducted globally suggest that e-learning influences the academic sector to a great extent...

Words: 5409 Pages: 24

Mendelian Heredity Experiment. Punnett Square Application

Punnett Square Eggs Sperm ½ P ½ p ½ P ¼ PP (purple) ¼ Pp (purple) ½ p ¼ pP (purple) ¼ pp (white) Purpose The objective of the experiment was to use a Punnett square to determine the genotypes and phenotypes of the offspring produced from a self-pollination cross....

Words: 586 Pages: 3

Information Technology Systems Scenario

Desktop Virtualisation Desktop virtualization is the process by which a computer hosts a virtual hardware system that enables a user to run different operating systems on one device at the same time without switching it off. It is an effective way of managing IT systems because it helps users to...

Words: 1822 Pages: 7

Studying Behavior in Invertebrates (Sow Bugs)

Invertebrates are animals that lack backbones – do not possess a vertebral column; they are about 98% of all animals. They are found in different environments, from cold and unbearable regions to equally hot regions even though the complex nervous systems are major impediments to their adaptation to varied regions....

Words: 1110 Pages: 5