Technology

Value Management: What It Is, Differences Between VM and VE

Introduction Every organization that exists in the world today has one single purpose that overshadows all the others: to be successful in what it does. Success is a measure defined by the organization’s attitude as well as the processes that govern the organization’s overall operations. Each process is a set...

Aerodynamics: Airfoil Design and Optimization System

Problem statement The design of high-lift machines is one of the most demanding concerns in aerodynamic study. The requirements for the structure of these machines depend entirely on the main disciplines in aeronautical study. These include aerodynamics, aeroacoustics, structures, systems and kinematics. The chief objective of the systems/structures is the...

Collaborative Technology in Education

Automated simulation techniques, social networks and digital games suffer from various public relations predicaments, but today they demonstrate various powerful capabilities and advantages. The viability of these tools is a good indication that schools ought to adapt the new technological trends. However, there are various impacts of collaborating social networking...

Business Intelligence and Information Architecture

Abstract Business environment in this 21st century relies on an extraordinary level of managerial intelligence and information management. A solid Information architecture (IA) could be a cornerstone in enabling information based business intelligence with extensive integration of various information contents in enterprise architecture (EA). But this IA based EA is...

Impact of Information Technology on Indian Banking System

Abstract With its latest developments and innovative tools, information technology has revolutionized every industry, whether in production or in service. Adoption of information technology provides for distinct benefits like improved efficiency in operations, significant reduction in costs and it acts as an enabler for the provision of superior quality customer...

Information Communication Technology in Education

Introduction Globalization and technological change have created a new global economy that is powered by information and communication technology. This technological change has brought serious concerns for educational institutions. Information and communication technology also known as ICTs have become the basis for educational reform. This paper discusses the role of...

Understanding and Managing Cybercrime

Introduction Since its invention, the computer has been integrated in almost all areas of our lives. This includes infrastructure systems like financial systems, communication systems, defensive systems in the military, supply of services like water and electricity, traffic control, security systems among many others. A threat that the United States...

Research Studies Analysis about Education

Outline Introduction Thesis: This research paper presents an analysis of two articles from peer-reviewed journals; these are ‘”Learning with Technology: The Impact of Laptop Use on Student Achievement” by James Cengiz Gulek and Hakan Demirtas and “Engaging Students in Multimedia-Mediated Constructivist Learning – Students’ Perceptions” by Mai Neo and Tse-Kian...

Securing the Host From the Virtual Machine

Introduction The publishing industry is one of the old industries around the world. Books hold a unique place among other media. By the early nineteenth century as the scale of book production increased dramatically, editorial activities split off into the separate business of publishing. The publisher handled and copyedited the...

A Critical Examination of the Rules on Force Relative to the Cyberwarfare

Introduction Background Cyber-attacks or cyberwarfare is a new type of warfare that uses digital technology to distort, steal or erase critical information, which results in serious economic, political and social consequences. Many governments have come to appreciate the power of cyber warfare and are using it to attack other nations...

Computerizing the Purchasing System of the Company

Introduction House incorporated is a medium sized company selling motor vehicle spare parts with over ten branches scattered across five major towns in California. It has several department interconnected using a common server. The departments that are interconnected include accounts and finance and procurement human resources, marketing and administration. The...

Quality of Oil Project by the Kurdistan Government

Introduction. Research question Oil is considered to be the most significant product in the Kurdistan region of Iraq. Throughout the Saddam Hussein ruling, the Kurdistan Regional Government was deal with just 13% of the incomes achieved from their oil. But transforms in the political outlook have also provided a better...

Scope of Improvement on the Environmental Impact of Air Travel

Abstract The given project is devoted to the in-depth investigation of the problem of air travel environmental impact and the ways it can be improved. The significance and importance of the problem precondition the increased attention to the analysis of the aviation industry as one of the most fast-growing spheres...

How Organizations Protect Customer Privacy

Abstract Personal Privacy Information has been regarded as a crucial issue when eCommerce transactions are discussed. With increased reports of data and identity theft, virus attacks and hacking, customers are worried when they have to give personal information on the Internet. Consequently, organizations are faced with the responsibility of ensuring...

Systems, Process and Use Case Modeling

Introduction Use case modeling has become the foundation of the most popular de facto standard technique for performing software requirements analysis and specification. However, use case modeling has its well-known problems, and different requirements engineers typically perform use case modeling differently. This paper provides a hierarchically organized set of detailed...

Survey of Methodology of Data Mining

Today in information technology era, there is ample of information available and a number of users are accessing data daily for their use and requirements. Data mining is a commonly used term in computer field. Data mining is the process of sorting huge amount of data and finding out the...

An Information System: System Analysis, Design Methods, System Building Blocks

A company has many functional departments (such as Finance, Human Resources, etc.) Explain or describe the process that should be taken to develop an automated information system and or software An information system designing process is a key stage to the implementation of an information system in an organization. The...

Human-Computer Interaction. Passwords and Security

Introduction User ID and passwords control authentication is the widely used mechanism to access the data in most of the current conventional information systems. With the rapid increase in the number of password-protected accounts on the internet, users have to create and remember a host of passwords. Despite the rapidity...

Information Tecnologies Questions Nowadays Analysis

How a message is transmitted from one computer to another one using layers Two computers communicate when they are in a computer network. For such a network to exist the computers are either connected either through a physical medium such as an Ethernet cable or through a wireless network that...

Discriminating Factors During Etl Phase of Data Warehouse

Introduction The extract transform load (ETL) is the trio of distinct functions that are integrated into a common programming tool, most when administering databases. The extort utility deciphers data from a particular resource and pulls out a preferred section of data which is converted into a preferred position. Lastly, the...

Children in Web: Protection and Prevention

Introduction Technology is the improvement made on computers, education, medicine, transportation and other technologies as well as the useful knowledge that enables humans to achieve their purpose more effectively; it is actually the growing capability of humans to achieve their purposes, the great technological transformation must be understood to a...

Image Rendering Methods Analysis

Computer world is comprised of images, videos, images both static and animated. These images are built from a set of pixels on a grid. Rendering is a process of creating image from a model. Image rendering is common term in graphics world, most of the work on graphics requires image...

Technology Integration Across Curriculum

The term “Technology Integration” the term is commonly used by teachers and professors to describe the efficient usage of technology in student’s daily lives and make students understand the effective use of each technology. Not only do university teachers use these tools in classrooms but the K-12 teachers also try...

Performance Measurement in Engineering Projects and Management

Introduction Although it has long been recognised that performance measurement has an important role to play in the efficient and effective management of organisations, it remains a critical and much debated issue. Significant management time is being devoted to the questions – what and how should we measure – while...

Local Area Networks: Concepts, Hardware, Protocols

Introduction Circuit switching was first traditionally offered by the telephone system, in which the low or high capacity for any type conversation is saved on each and every switch with the help of a trunk line among the two subscribers. Although anyone face any type of difficulty to get a...

Establishing an IT Disaster Recovery Plan

Abstract Business today face not only uncertain markets but various threats and disasters that are man made as well as natural. While natural disaster include Tsunamis, Tornadoes, Earthquakes and others, man made disasters include terrorist attacks. What is common among these disasters is that they strike quickly, without warning and...

American Airlines Group Review

Introduction The airline industry has changed due to advanced technology over the last few decades. Currently, the largest airline is the American Airlines Group. In order for one to fully understand the history of airlines, it is crucial to first understand the history of the aeroplane. The first airplane was...

Junk Classifier in the World Wide Web

Abstract This paper addresses the techniques used to analyze web pages and in-text in general to outline effective strategies in junk filtering. The paper as such investigates the effectiveness of traditional and modern junk classifiers to bring out the present state-of-the-artwork. The paper also shows the basic attributes of the...

Local Area Networks: Elements, Servers, and Layers

What are the elements of a network? There are usually three basic elements of a computer network: software, hardware, and protocols. A combination of these three elements forms a network. When we assume that a computer network is like a rail or road where vehicles pass through, then the “traffic...

Learning Theories Behind New Technologies

Introduction The role of new technologies in contemporary education is well-recognized and largely studied by numerous scholars. There are various opportunities for the integration of these technologies into the educational process as well as considerable challenges. This paper aims to discuss several questions and concerns related to theories and models...

Foundation Concepts, Hardware and Protocols

Who creates Ethernet standards? What is the difference between Baseband and Broadband transmission? Which physical standard should be used for a web hosting company? Why? Ethernet standards Ethernet is a dominant LAN technology, developed at Xerox Palo Alto Research Center by Metcalfe and Boggs. After the initial development, Ethernet was...

Effective Electronic Systems: Qualitative Analysis

Introduction To collect data on the topic of effective electronic systems, interviews with four participants were conducted. Each interview consisted of five questions associated with respondents’ perceptions of the use of electronic systems in the workplace. Questions that the participants were asked aimed to answer the following research questions: What...

Telecommunication Management Analysis

What does the data link layer do? The data link layer offers the functional and procedural way for the transmission of data between network entities and to detection and correction errors that may occur in the physical layer (Fitzgerald & Dennis, 2001). Typically, the data link layer was planned for...

Interactive Whiteboards in Saudi Primary Schools

Introduction Contemporary school has a task to prepare every student for life in the information society. Consequently, it is a task of a teacher to create a favourable environment and provide opportunities to learn and communicate. Communication is a substantial aspect in individuals’ lives and through it knowledge can be...

Data Strategic Applications’ Benefits in the Aviation Industry

Abstract This thesis aims to investigate the benefits of data strategic applications in the aviation industry. The study seeks to examine the impact of data strategic application and digitalization on the curated travel experience, security identification, customer experience, and airport services. Digital transformation and other important financial evolutions are motivating...

Internet Financial Reporting Analysis

Introduction The 21st century is characterized with increased technology and in particular in the information technology. There has been noted a great advancement in information technology that has enabled promoted the performances of many organizations greatly by facilitating online shopping and Internet Financial Reporting. Online selling is the process where...

Arab Open University’s Information Technology Infrastructure

Requirements Definition The scope is by using IMS open architectural specifications to build an IT infrastructure that will be used for general purposes and e-learning, pointing to the obvious advantages of such methods. IMS – is a project, which unites the efforts of 29 representatives of industry, government apparatus and...

VoIP Quality of Service Evaluation.

Executive Summary This research paper explores the performance of VoIP, as well as the parameters that affect the quality of service of VoIP. The different communication aspects of VoIP namely; call signaling protocols and networking environments have also been explored, with the latter’s emphasis on LAN and WAN. Performance evaluation...

User Involvement in Value Management of Construction Projects

Abstract The investigation was conducted to determine the impact of end-user Involvement in value Management of mega construction projects to ensure their satisfaction. The underlying objectives consisting of the history of value management, managing value in construction work, meeting value objectives, integrated value and risk management, user involvement in quality...

Culture in Project Management

Abstract Due to the ongoing globalization of business, international expansion of different companies, and the emergence of culturally diverse environments, project managers face challenges that have not existed before. Some of these issues can have a significant adverse effect on the performance of the team, and so they should be...

Local Area Network: Foundation Concepts, Hardware and Protocols

BOTS and Hacking BOTS are simple DDOS exploitation programs that attack in a unique manner. These programs when remotely installed are able to send commands and execute accordingly by the hacker. The attacks represent the mainstream of DDOS and work through the centralized control of distributed zombies or bots. The...

Telecommunications Management – Network Security

The Need for Network Security Network security is an increasing phenomenon that is used to combat the increasing threat of attacks on the private information being transferred and stored on the internet. The need for network security has increased due to the increase in the traffic on the internet, the...