Sciences, Tech & Engineering Examples for Free

Research Approach and Methodology

Research philosophy (interpretivism) Research philosophy informs the data collection process (Sekaran, 2006). According to Johnson and Christensen (2010), appropriate and effective data collection process depends on the research philosophy chosen by the researcher. Besides, Johnson and Christensen (2010) asserted that the chosen study philosophy is the viewpoint that is founded...

Words: 1170 Pages: 5

E-Learning in the Academic Industry

Abstract E-learning is commonly utilised in disseminating knowledge to students in institutions of higher learning. Several tertiary educational centres are shifting focus on e-learning mainly because of its flexibility and ease of access. A number of studies conducted globally suggest that e-learning influences the academic sector to a great extent...

Words: 5409 Pages: 24

Mendelian Heredity Experiment. Punnett Square Application

Punnett Square Eggs Sperm ½ P ½ p ½ P ¼ PP (purple) ¼ Pp (purple) ½ p ¼ pP (purple) ¼ pp (white) Purpose The objective of the experiment was to use a Punnett square to determine the genotypes and phenotypes of the offspring produced from a self-pollination cross....

Words: 586 Pages: 3

Information Technology Systems Scenario

Desktop Virtualisation Desktop virtualization is the process by which a computer hosts a virtual hardware system that enables a user to run different operating systems on one device at the same time without switching it off. It is an effective way of managing IT systems because it helps users to...

Words: 1822 Pages: 7

Studying Behavior in Invertebrates (Sow Bugs)

Invertebrates are animals that lack backbones – do not possess a vertebral column; they are about 98% of all animals. They are found in different environments, from cold and unbearable regions to equally hot regions even though the complex nervous systems are major impediments to their adaptation to varied regions....

Words: 1110 Pages: 5

Random Widget Works Firm’s Information Security

As one of the key risk management practices, the enhancement of information security management has a number of benefits to companies such as ensuring that a company limits its vulnerabilities and threat to it assets. From the given case study, Random Widget Works operation regarding its information security managemt has...

Words: 650 Pages: 3

Computer Hardware and Wireless Information Systems

Introduction The onset of wireless communications paved way for the aspect of mobility during communication, which is increasingly becoming a core requirement for organizations due to the nature of the present business environment. This implies that wireless communication is essential for any organization that is to remain competitive in the...

Words: 997 Pages: 4

Computer Forensics: Crime Investigation

Introduction The main goal of computer forensics is the discovery of evidence in a lawful manner. The recovered information can then be used in a court of law against a suspected offender (Sheetz, 2007). Maras (2011) has indicated that computer forensics is made up of four distinct steps; acquisition, identification,...

Words: 3240 Pages: 13

Big Banks Denial-Of-Service Attacks

Since 19 September 2012, major banks in the US were hit with several cyber attacks (Goldman, 2012). Observers referred to those attacks as the biggest in the history of cyber attacks on banks. Consequently, the attacks affected many banks’ customers. There were coordinated Denial-of-Service (DoS) attacks that resulted in daylong...

Words: 560 Pages: 3

System Development and IT in Business Applications

Introduction In today’s business environment, technology is critical for all business processes. This is because it aligns different organizational functions as a unit to achieve organizational goals. It is however imperative to consider that implementation of technology alone is not sufficient to address organizational issues. The business processes, IT infrastructure,...

Words: 1629 Pages: 7

Operating Systems: Venus Operating System

Venus Operating System The paper gives a detailed description of the development of the Venus Operating System with much emphasis on the guiding principles for the design. Venus Operating System is an experimental multiprogramming system employed on small computers in a way that supports up to six concurrent users on...

Words: 839 Pages: 4

Human Resource Information Systems

Introduction In the new age, technology seems to be the answer to everything. This response has been generated over time based on the implementation of the methods that information technology advocated. HRIS was a product of summing up the theoretical principles of Human Resource Management with the new age methodologies...

Words: 2325 Pages: 9

Image Processing Analysis

Introduction Image processing entails mining of data such as the dimension of a detected tumor and the magnitude of an engineering constituent by interpreting arrays obtained during experimental examination. This is widely applied in biomedical works, in-process quality control in manufacturing industries and advanced engineering applications. An image processing software...

Words: 1516 Pages: 6

Open-Source Software in Database Management Tools

Introduction Open-source software is a term that emanated from the staged advertisements of free software. Open-source software is the type of software that is free for the public to use, develop and modify within the scope of their license.The user is at liberty to modify and redistribute the software. Other...

Words: 837 Pages: 4

Genetically Modified Foods: Effects on Human Health

Introduction The increased global population is one of the main contributing factors to the insufficiency of food for consumption. For a long time now scientists have been altering different types of crops and animals through selective breeding in a bid to improve their production. Although selective breeding is one of...

Words: 2766 Pages: 11

Technology Integration Ideas in Education

Previous experience I have had with computers During my training as a teacher in college, I attended a private college on basic computer applications that would be important in class. In college, we were exposed to computer applications; lecturers made sure that we presented our work in class using PowerPoint;...

Words: 651 Pages: 3

Fire Development, Growth and Spread

Introduction Fire plays a pivotal role in the lives of human beings. It’s used for lighting, heating, cooking and in some cases protection. As such, humankind acknowledges that fire is an essential component to any ecosystem. However, despite its uses and benefits, fire poses a serious danger to nature, people...

Words: 3758 Pages: 14

Nuclear Energy: Overview

Introduction Nuclear energy refers to power generated from exothermic nuclear processes such as nuclear fission, nuclear fusion, and nuclear decay (Cravens, 2007). Among the three processes, nuclear fission is the most effective method of nuclear energy production. It is responsible for more than 30% of the nuclear energy produced in...

Words: 871 Pages: 4

Systems Analysis & Object-Oriented Design

Introduction The role of information technology (IT) has in recent years played an increasingly important role in the way people do business (Shelly, Cashman and Rosenblatt 4). IT refers to a combination of hardware and software products and services used widely in business for management, access, communication, and sharing of...

Words: 3671 Pages: 15

Effective Thermoelectric Cooler Analysis and Design

Introduction A thermoelectric cooler (TEC) is an electric garget that contains a p-n junction necessary for creating a temperature gradient between the surfaces of the junctions (Tse, 1989). TEC is a dual purpose garget that can be used to either generate current courtesy of a temperature difference on the surfaces...

Words: 1794 Pages: 6

Hypothetical Designs:. Strategies & Methods

Quantitative Design This research paper reviews the numerous strategies, which are essential for a broader assessment and basic understanding of the topic under discussion. When making a decision on which technique to use, the choice depends on the type of objective that the study has as the main intention. For...

Words: 968 Pages: 4

Mobile Security of the Web 2.0 Platform

Introduction A significant characteristic of the Web 2.0 platform is that mobile users are the ones who undertake actions such as generation and uploading of content to the web sites. This is increasing evident as large enterprises are embarking on the adoption of Web 2.0 tools, which include blogs and...

Words: 612 Pages: 3

Information Security Problems Analysis

Abstract Despite the fact that efficiency in organizations has greatly improved over time, thanks to technological innovations, it is obvious that a lot has to be done to guarantee the safety of important information stored by these organizations. The use of the Internet to carry out numerous business transactions requires...

Words: 3097 Pages: 12

Value Management and Value Engineering

Value management and value engineering are synonymous engineering terms that involve ‘valuing’ construction projects, mostly focusing on the different functions with the aim of minimizing unnecessary costs and maximizing the potential usage of the project. There are slight differences between these two significant engineering terms. One is that value management...

Words: 3909 Pages: 16

Intrusion Detection System: Sguil’s Viability as a Network Security Monitor

Introduction Computer systems and the internet are arguably the greatest inventions by humankind in the 21st century. Although these two entities are hardly a century old, they have revolutionalized the way in which we carry out our day to day activities and hardly any arena in our lives has escaped...

Words: 4676 Pages: 18

Engineering Response to the Gulf of Mexico Oil Spill

Case study of the Gulf of Mexico Oil Spill Companies that engage in oil and gas exploration, drilling, and production face a wide range of risks, including marine environmental uncertainty, adverse exposures in drilling and construction of offshore oil wells, performance of equipment, and defects in plans and specifications. On...

Words: 1436 Pages: 6

Sociotechnical Systems in the Wal-Mart Organization

Introduction According to Information Technology experts, the 21st century is characterized by the migration from “…accepted systems and procedures (commercial, administrative, technical) to new ones (electronic commerce, digital cash, teleworking, electronic mail)” which requires a major paradigm shift for both end-users and entrepreneurs who do not want to be left...

Words: 836 Pages: 4

Impact of Information Technology Business Outsourcing and Off-Shoring

An abundant rise in the number of IT firms outsourcing their IT services within the country and overseas has registered a rise in the recent past. That has been driven by prevailing and rising trends in endowment factors which provide comparative advantage due to comparative cost differences for IT firms...

Words: 7884 Pages: 33

The Key Requirements of Project Management Professionalism

Introduction As an individual interested in and hoping to be among the top experts in project management, Mr. Bin and I met one day for an interview. Mr. Bin has worked as a project manager for more than a decade, and he has headed the regional board of project management...

Words: 1338 Pages: 5

Information Technology: Issues of Trust

Introduction Computer and information systems play a major role in the operations of any given organization. However, trust is an imperative component in ensuring the effectiveness and reliability of their use in the organization. A possible internet security threat is obvious if an inappropriate strategy of controlling their use is...

Words: 930 Pages: 4

Significant Threats to Information Security

Introduction The article “Why do organizations need information systems?” describes information as the lifeblood of an organization (Answers Corporation, 2011, 2). The article goes on to point out that poor management and security of information in an organization attracts financial losses and liabilities such as lawsuits (Answers Corporation, 2011, 2)....

Words: 4423 Pages: 17

Osmosis and Diffusion: Selectively Permeable Membrane

Introduction The cell membrane is composed of a phospholipid by-layer that selectively allows substances in and out of the cell. The movement of substances in and out of the cell is facilitated through a couple of transport mechanisms. The type of transport employed is determined by the type of substance...

Words: 827 Pages: 4

Virtual Private Network Technology

Introduction In modern economies, businesses that previously used to handle local information now have to think of global markets. Multinational companies now have their branches and outlets spread all over the world. Simultaneously security concerns of their data and network from hackers, as well as sending data over the Internet...

Words: 2190 Pages: 8

Project Management: Strategic Design and Implementation

Discussion Haynes (2002) defines project management as “an undertaking that has a beginning and an end which is carried out to meet established goals within cost, schedule and quality objectives” (p.3). Bringing together and making the best use of necessary resources required to complete the project. These are skills, talents...

Words: 2693 Pages: 11

Enterprise Security Plan Project

Introduction Conducting a security audit in an enterprise is an essential aspect, considering that “[e]very enterprise faces a multitude of risks”, many of which are related to information systems (Dunn, Cherrington, & Hollander, 2004). The latter is specifically true for organizations with connections between the public internet and their internal...

Words: 1287 Pages: 8

Super Crunchers by Ian Ayres: Information Technology Revolution

Introduction The book super crunchers by Ian Ayres informs us of the application of simple statistical models to large data sets. These models have been gaining popularity in improving decision making in various applications including business and professional orientation. The increased use of these models is an indication of their...

Words: 1077 Pages: 5

Communication Network for a Library System

Introduction Information technology has the potential of revolutionizing service provision in all sectors of the economy. Many people continue to loose their jobs as others create new ones because of advances in information technology. The email has taken over the role of conventional mail. There have been libraries since time...

Words: 2762 Pages: 11

Systems Development Methodologies

Introduction Managers and business organizations invest in information technology and systems because such strategies provide real economic value to the business. The decision to implement or sustain an information system presumes that the profits on this investment will be higher than that of other assets (Laudon & Laudon, 2006). In...

Words: 873 Pages: 4

Security threats in Wireless Cellular Networks

Abstract Cellular Communication has become an integral part of our everyday life, not only for day-to-day communications but also for accessing the Internet, conducting monetary and business transactions. Limitations of cellular networks, their Network security issues and the threats, Risks, Vulnerabilities and the different types of attacks they are subject...

Words: 3414 Pages: 13

Are We Too Dependent on Computers?

There are three common apples in the world-one was eaten by Eve when the world was being created; one hit Isaac Newton on the head; leading to his discovery about gravitational force; and the last one is the one that is owned by Steve Jobs, which has revolutionized the world...

Words: 638 Pages: 3

Problems with Home Networks

Context of the problem Home networks are a recent computing ideology that most of end users prefer contrary to the public computer networks. With the ever increasing need to have access to the internet and telecommuting, individuals are being compelled to set up home networks that can guarantee access to...

Words: 1664 Pages: 7

Network for ABC Company Analysis

Overview Effective network planning and implementation require a methodology that puts into consideration the business needs and the network requirements. The methodology which will be used in designing a network for the ABC Company is described as a process that involves 9 fundamental steps which are based on the engineering...

Words: 3095 Pages: 12

The History of the Uses of a Telescope

Introduction Since the dawn of time, Man has looked up into the sky and wondered what is beyond the realms of this planet. This curiosity and interest have pushed the man to develop tools and techniques to observe the world not only around him but also above him. One of...

Words: 1459 Pages: 6

Engines and Fuels: How Hydrogen Vehicles Work

Introduction The increasing depletion of world resources coupled with the devastating effects of population is rapidly calling for the need to devise cleaner and renewable sources of energy (North Atlantic Treaty Organization, 1995). Of particular concern are the automobiles. Their pollution rate is alarmingly high besides the escalating costs of...

Words: 971 Pages: 4

Effective Organizational Security Policy

Introduction Information security is continually gaining prominence within the corporate world because of the value that organizations are currently realizing from information as an asset. As valuable, as this is the corporate world is going to great lengths to understand what requirements need to be setup to ensure an effective...

Words: 944 Pages: 4

Pythagorean Theory: Discovery, Proofs and Other Forms

The Discovery of the Pythagorean Theory During his stay in Egypt, Pythagoras studied with engineers who constructed the pyramids, they were called ‘rope stretchers’. The rope stretchers had a special secret they used for constructing pyramids and other structures. This was a circular rope with 12 uniformly spaced knots, when...

Words: 829 Pages: 3

Wireless Networks: Advantages and Benefits

Introduction Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of computer networks. These two entities have virtually transformed the world as far as information processing and communication is concerned. The interconnection capability of computer systems can arguably...

Words: 1410 Pages: 6

Internet Security: Threats and Protection Methods

Introduction Improvements made in information systems and telecommunications in the past 70 years have propelled humankind into a new ‘Age of Information’. The information age is characterized by ease of communication, fast processing power and a wide spread of technology. The internet is one of the main products of the...

Words: 3587 Pages: 14

Qualitative Methods of Research: Analysis

There are two primary methods of researching social science. In the field of criminology, it is the appropriate method. This is because it focuses on the meaning and characteristics that define people and experiences. It helps criminologists understand the social concepts on how crimes occur. It is guided by ideas...

Words: 644 Pages: 3

Concepts of Stem Cell Research Legislation

Introduction Since the successful isolation and culturing of human embryonic stem cells in 1998, stem cell research has been limelight globally. Prior to the 1998 scientific breakthrough in culturing human embryonic cells, most embryonic stem cell research initiatives were funded privately, as most of them involved the harvesting and the...

Words: 1853 Pages: 8

The Use of Business Intelligence Tools in an Organization

Introduction A system is a set procedure of operations that are linked to each other and contribute to a result. For effective delivery of results, all processes must be in operation and be effectively managed. System safety is a risk management strategy aimed at ensuring that any malfunction of the...

Words: 1360 Pages: 6

Wi-Fi Security Standards and Operations

Introduction Wi-Fi is an acronym for Wireless fidelity though this is just an unofficial use. This is a technology which was built on a standard known as the IEEE 802.11. The standard is tested and maintained for compatibility with systems by the Wi-Fi alliance which came up in 1999. For...

Words: 2105 Pages: 9

Processes That Lead to the Formation of the Solar System

Introduction There are a number of theories that have been raised to explain the gradual formation of the solar system. This paper however focuses on the solar nebular theory which was formulated by Immanuel Kant and proposes that the formation of the sun and other identified planets occurred at the...

Words: 2161 Pages: 9

Issues in IT Project Management and Decision-Making

Introduction Project management as a practice today draws a lot of attention based on the benefits that accrue from its successful application (Alberto, et al. 2006). As business processes keep changing there is a need for a defined process to initiate, plan, execute and monitor these processes (Schwalke 2005; Nicholas...

Words: 2740 Pages: 11

Pharmaceutical Ltd: Project Management

Brief description Pharmaceutical ltd has been doing business in manufacturing pharmaceutical products and boasts of being able to produce drugs every year. The production of these drugs has endeared Pharmaceutical ltd to many people. In order to effectively handle the increasing purchases, System Developers have been approached to be able...

Words: 2129 Pages: 8

Virtual Local Area Network (VLAN)

Introduction Routers and switches have an essential role in the field of networking. This is because the improved network architecture is entirely different from the past network that entirely depended on collapsed backbones. Routers are usually essential in a network because of their ability to break broadcast domain. On the...

Words: 2341 Pages: 9

Internet Security: Password Management and Patch Management

Introduction The world is in an information era where the use of computers has taken center stage in almost all areas of a business. A new mode of communication has emerged, which is the use of the internet. The only problem with the internet is the danger that it exposes...

Words: 1221 Pages: 5

Project Planning Using MS Project

Introduction to task planning using MS project Microsoft Project Planning application is a flexible project planning application designed to provide seamless project planning and management support tools. The broader context of Microsoft Project as a flexible software application connotes the use of this application as the best application for scheduling...

Words: 2708 Pages: 11

Autonomous Robot Using GPS and Compass

Acknowledgement I hereby take this opportunity to thank all those who helped me carry out the project successfully. First is to my supervisor Dr. John Readle who advised and directed me in choosing the appropriate project that suited my course. I also wish to thank Mr. Mistry the head of...

Words: 1317 Pages: 6

Internet Security and Information Technology Project Management

Introduction With development in technology, computers have become part and parcel of business today. With the development of computers, there is internet that was developed to meet the goal of making the world a global village. Almost each company whether profit making or nonprofit making, countries embassies, and local government...

Words: 1097 Pages: 5

Solar Energy: History, Chemistry, Pros and Cons

Introduction The declining amounts of traditional sources of energy have presented humanity with the biggest challenge of inventing innovative ways to harness the power of the sun. This forms the reason as to why the conversion of solar power into high voltage electricity remains a political agenda in both developing...

Words: 1094 Pages: 5

The Importance of Solar Energy

There are a lot of matters which have been raised in the recent past over the issues of the energy in the solar system. The energy in use has been of great concern to many people and scientists in particular. There has been an increasing rate of global warming which...

Words: 1075 Pages: 4

Effective Information Technology Support Teams

Introduction Effective technology support teams are very flexible and motivated; they are characterized by good communication and frequent learning so that they can enhance IT systems, recognize areas for technological improvement and hence boost company performance. What it takes to build an effective technology team Good management is a critical...

Words: 1221 Pages: 5

Information Technology Infrastructure

The Role of IT in Businesses Information technology plays a very vital role in the running of a business: that is through systems such as software’s which enable the business to function efficiently. Information technology systems enable employees of an organization or a company to function efficiently in their duties,...

Words: 1207 Pages: 5

James Moor – Policy Vacuum

Computer technology has become an important part of our lives and it has given people ability to perform many tasks at the same time, for examples sending emails, research work, and chatting on the internet in the chat rooms. “Policies which regulate and guide the use of computer technology in...

Words: 984 Pages: 4

Memory Management under UNIX

Introduction Memory management is an important function performed by an operating system. Other functions include coordinating input and output devices, integrating the user and computer communication, and controlling the utilization of the processor resources. In managing memory, an operating system allocates and de-allocates the computer memory to different processes. This...

Words: 1171 Pages: 5

Marine Surveying, Inspection and Safety Practices

Introduction The newly acquired 37,000 mt dwt product tanker upon sailing into the sea was a subject of survey and inspection. The inspection report covered all aspects of Load Line; Structure and Stability; Live Saving Appliances; Safety and Navigation Equipment; Fire Fighting Equipments and Bilge Pumping Arrangements. This was to...

Words: 4088 Pages: 15

The Concept of Correlation and Regression Analysis

Regression analysis Regression analysis refers to any kind of technique used in modeling and evaluation of variables especially when the center of analysis lies between dependent variables and several independent variables. More expressly, regression assists tacticians to comprehend how the characteristic value of the dependent variable changes with variation in...

Words: 644 Pages: 3

Technological Development: Positive and Negative Effects

Introduction The knowledge and use of tools, techniques, systems, or methods, of organization in conversion of raw materials and natural resources into tools is what we refer to as technology. Discovery of fire is the most ancient form of technology followed by others like the discovery of the wheel that...

Words: 1271 Pages: 5

Mobile Voice Over Internet Protocol (VoIP)

Abstract VOIP (Voice over internet Protocol) technology has come a long way since the IEEE (Institute of Electrical and Electronic Engineers) in 1974, published the paper that was to herald a new frontier into the unchartered waters of telecommunication. The paper was titled “A Protocol for Packet Network Interconnection.” Several...

Words: 2748 Pages: 11

Brief Description of the Robotic Surgery

Annals of Surgery. Robotic Surgery. A Current Perspective. Web.  The specialists From the Department of Mechanical Engineering and Mechanics, Drexel University propose a wide review of the robotic surgery history based on the materials from Medline and the description of robotic surgery’s present and future. Having reviewed the available data...

Words: 850 Pages: 4

Future of Information Systems

Introduction Information systems deal with the interaction between people, processes, data, and technology. Many organizations use information and communication technology to support the business processes that they carry out. Individuals in an organization interact with information and communication technology and use resources to produce products and services that can benefit...

Words: 2757 Pages: 11

Stem Cell Research

Introduction Stem cell research can change the entire human population’s health because of its enormous possibilities; the only hurdles that must be overcome are the misconceptions and the myths surrounding it. The paper shall attempt to demystify this discipline and give reasons why stem cell research should be allowed. Why...

Words: 2625 Pages: 10

Information Technology Governance

Introduction Information Technology governance is a field that deals with IT systems within companies in order to help them discover their full potential. COBIT offers a company various procedures and practices in Information Technology that will help them grow and expand their horizons. IT governance and COBIT work hand in...

Words: 1845 Pages: 7

Tracing the Origins of Signal Diversity in Anole Lizards

Various factors have been shown to influence the evolution of communication structures in animals. For instance, signals used by species to attract mates will tend to be favored by selection (Jord and Martins, 2006, p. 2). The properties of the animal’s environment, especially the makeup of the habitat, are another...

Words: 1353 Pages: 5

Advantage to Computer Virtualization

Abstract Virtualization plays an important role in any computing environment. The invention of virtualization brought radical changes in the computing environment making it easier and more important to economically employ information technology in business operations. Before then the rising cost of administration was threatening to reverse the benefits of computerization....

Words: 1718 Pages: 7

Radiations and Their Health Effects

Introduction Nuclear energy has been used for several decades in the production of electricity. Many countries are adopting this method of power production for industrial and domestic applications owing to the numerous advantages it has over other methods of electricity production. Nuclear energy is produced in a process known as...

Words: 3254 Pages: 13

Internal Combustion Engine

The, K., S. Miller, and C. Edwards. 2008. Thermodynamic requirements for maximum internal combustion engine cycle efficiency. Part 1: optimal combustion strategy. International Journal of Engine Research 9, 449-465. In the article Thermodynamic Requirements for Maximum Internal Combustion Engine Cycle Efficiency, The et al. 2009 argue that equilibrium dynamics dictate...

Words: 620 Pages: 3

The Idea of Genetic Engineering

Introduction The development of human society is a complicated phenomenon in the course of which people have always tried to make their lives easier and more convenient. For this purpose, people have invented instruments that would make manual work not so hard and effort-consuming. They created automated machines to assist...

Words: 1662 Pages: 7

Enzyme Protease and Its Industrial Application

Introduction  The enzyme protease is a group of enzymes whose main work is to break down peptide bonds of proteins. There are different types of proteases depending on the type of peptide bond each hydrolyses. Examples include trypsin, pepsin, fungal, protease, papain, bromelain, chymotrypsin and subtilisin (Mikel, 2004). Industrial application...

Words: 275 Pages: 2

Network Security: Increasing Demand

Abstract Problems of computer securities are increasingly becoming concerns to business organizations and computer security experts. Intruding in the database of different organizations is becoming widespread in the business cycles, and despite the sophisticated network securities that many organizations have installed for the securities of their computer warehouses, hackers are...

Words: 2035 Pages: 9

Internet Technologies and Their Use in Different Spheres of Life

Introduction In the modern era use of the internet has rapidly been increasing and new technologies are being developed to match the requirements of the daily business needs. To match the new developments new and innovative technologies are being introduced for and on the internet. Internet today has become a...

Words: 1359 Pages: 6

Forensic Dna Profiling, Facts on Dna Mistakes

Introduction According to Patrick (17), DNA or Deoxyribonucleic Acid can be described as the ingredient in a person’s complete genetic makeup which can be seen as ingredient that every individual cell found human body has. Throughout a person’s lifespan this component (DNA) does not change. Every individual has his/her own...

Words: 2933 Pages: 11

Research Methods and Sources of Data

The following are the three things that I would like to learn for conducting research in my area of interest. They are: Qualitative Methods, Quantitative Methods and Secondary Research. Qualitative Methods The main objective of developing qualitative research methods is to enable the researchers to make an in-depth study into...

Words: 744 Pages: 3

Nuclear Power Future: Its Sustainability Issues and Challenges

Introduction The question of sustainability is a persistent yet difficult concept to achieve in environmental matters. This is especially the case when it comes to the development of energy options that can meet the needs of present and future generations adequately. Therefore, the paper shall investigate nuclear power as one...

Words: 1864 Pages: 7

Four Alternative Fuel Types

Today’s world is well aware that our dependence on oil as a primary source of energy cannot be sustained. As a result, it is necessary for us to discover other forms of energy. Toward that end, a number of alternatives have been brought forward. These can include hydrogen, ethanol, solar...

Words: 1268 Pages: 5

Security, Privacy and Ethical Issues in Information Systems

Introduction Various issues have come up regarding the security and privacy in using electronic systems. According to Turn (1976), lack of privacy and security in the use of information technology has led to many people lacking confidence in the technology. Many people have opted for other ways of carrying on...

Words: 2055 Pages: 9

How Information Technology Can Be Used to Gain a Competitive Advantage?

Introduction The report aims to illustrate how Verizon Wireless Incorporation can attain a higher competitive advantage through the V Cast. Verizon Wireless Incorporation is a public limited company that operates within the telecommunication industry. The firm is located in the United States with its headquarters at Basking Ridge, New Jersey....

Words: 1403 Pages: 5

Network and Information Security Perception

Introduction A computer network is a group of interconnected computers. A network is nothing, but a collection of computers and related devices connected through wired or wireless devices or other media. This network allows computers to exchange information with each other and share resources. It is consisting of millions of...

Words: 2484 Pages: 10

Evolution – The Genetic Legacy of the Mongols

The research attempts to authenticate a proposal on the presence of a chromosomal lineage that was found in men across the Asian region (Zerjal, et al., 2003). The proposal holds that there was a phase during the time of the Mongols which indicates a behavior that is far from natural...

Words: 580 Pages: 3

Darwin’s Evolution Theory

Introduction Even though science was progressing and accumulating the facts, which were extremely contradictory to the metaphysical world outlook, the views on the immutability of nature continued to dominate in the XIX century. Some problems were impossible to solve. The first of them was the problem of conversion of one...

Words: 2327 Pages: 9

Genetically Modified (GM) Foods

Introduction Genetically Modified (GM) foods are those food items whose DNA is being changed through Genetic Engineering. Enhancing host plant resistance has been a management tactic for curbing key pest species (Kennedy, 2008, p. 1). Insect-resistant GM crops have the capacity to establish sustainable crops and increase the scope of...

Words: 2155 Pages: 9

Computer Ethic: Ethical Issues in Ethical Hacking

Due to the rapid development of the World Wide Web, the art of hacking has penetrated the world of computer technologies. It means that e-business and e-commerce are under the threat of destruction. That is why electronic information transfer is not the safest method. Nowadays, the problem of hacking is...

Words: 1336 Pages: 6

The Impact of Technologies on Higher Education

There is no doubt that technology has had an enormous impact on different areas of modern life, such as higher education. For universities and other higher learning institutions, it is an excellent opportunity to improve the quality of teaching and encourage students to learn new information in more interactive ways....

Words: 1945 Pages: 8

Comparing Western and Eastern Beauty Concepts: France and Korea

Tolerance and inclusivity – the attributes of the mainstream Western narrative – cannot be reached by ignorance. Thus, understanding another party is crucial for the ones seeking acceptance of different traditions. This essay compares and contrasts the beauty standards in South Korean and French societies. The choice of these two...

Words: 598 Pages: 3

Cyber Identity Theft in 2013

Personal, legal, and group recognition is essential to individual uniqueness within society. The state names a person based on their accumulated documents such as passports, birth certificates, and credit reports. These designators and other relevant tokens such as Social Security Number (SSNs) can easily be stolen in cyberspace. According to...

Words: 2008 Pages: 9

Improving Your Short-Term Memory

Aspect of Memory The aspect of memory that I picked for the current research paper is short-term memory. The reason for this is the fact that this type of memory may be the most confusing and complex among its other types. Even though there are other aspects that could be...

Words: 1408 Pages: 6

Virtual Classes Cannot Replace Traditional Classes

With the last decade witnessing rapid technological advancements and the recent changes in the educational environment caused by the COVID-19 pandemic, the popularity of virtual education has been gradually increasing. However, while providing multiple new opportunities for both students and teachers, virtual classes are thought to never be able to...

Words: 832 Pages: 5