Another negative aspect that raises opposition to COPPA and CIPA is the impossibility of controlling children in places other than home or a school library.
The closed-circuit television cameras should be positioned at the entry and exit points labeled A in the airport plan to allow the monitoring of people.
Thus, it is also true that technology contributes to the expansion of the generation gap and the erosion of human relations.
Welding, which is "the fusion of material by the use of heat," dates back to the Middle Ages. Nevertheless, arc welding developed only after the invention of the electric generator in the middle of the [...]
Regulation of the internet will eliminate or reduce the anonymity of using the internet and therefore help to reduce the exploitation of women and girls.
What are the advantages and disadvantages of allowing employees to use their personal smartphones for work? Compare the BYOD experiences of IBM and Intel.
Libraries remain to be imperative repositories despite the fact that the internet is rich with information because most of the credible academic sources require purchasing.
When a user searches for a music file by title or a musician's name, the user's request is sent out to all computers in the network, and a response list is generated to the user [...]
Finally, three articles on the impact and value of online education were chosen. An Overview of Online Education was about the challenges and benefits of online education.
The availability and development of handheld devices facilitate mobile learning acceptance as a method to provide personalized, accessible and flexible learning.
Therefore, airport security in the UAE must manage the latest challenges and threats to passengers, airport infrastructure and assets, and cargo.
Starwood Hotels could also mount a touch-screen on the wall and this would contain information on the nutritional contents of the various foods served in the hotel.
The teacher plugs in the scanner to the power source and places a paper format document on the glass part of the scanner.
First, people had to use the tactics they utilized moving on the land, but the use of radio, radar, and, finally, satellites enabled people to improve navigation significantly.
Drones are an emerging sector of the aviation industry that has been received differently by the public primarily due to the possibility of misuse, infringement of privacy, and military use in combat.
As a result of the automation of ATC, more control will be given to pilots and crews, including in conflict management.
The current paper will consider the basic features and the structure of the three incident command models or systems: the National Incident Management System, the Joint Decision Making Model, and The National Command Centre.
The authors compare the quick advancement and loss in the price of 3D printers with the rise of the personal computers.
The purpose of this paper is to investigate the domain of time travel and to provide evidence that traveling to the future is more likely than to the past if the necessary conditions have been [...]
The biggest advantage of LMS is the opportunity to prepare substantial resources for educating the employees or students. DoceboLMS is a powerful and extendable SaaS incorporating a function of activating an Enterprise Cloud Solution application [...]
Because of globalisation and the heightened competition, the airlines of the current world regard the essence of joining strategic alliances as crucial for bolstering their competitiveness.
In establishing and maintaining safety in work place, a business should identify the major cause of the accidents in its systems of operations.
The quality and quantity of the information provided on a web site is critical in helping the customer make the decision to purchase a product.
This paper is a critical analysis of the crisis communication surrounding the marooning of the Carnival Triumph Cruise ship. The contribution of the Carnival's PR in addressing the Triumph crisis is subject to analysis to [...]
This paper will, therefore, attempt to look at the reasons of the growth of the airline industry that has been evident lately, as well as consider competition and the influence of the Internet on the [...]
The fast and quick connectivity of smartphones to the internet provides a wide spectrum of understanding issues that individuals face in their professional and social lives. Creativity and innovation that smartphones facilitate lead to enhanced [...]
The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
In my future presentations, I will consider some of the techniques mentioned in this article that include creating client newsletters, marketing postcards and presentation folders to enhance efficiency and exhibit a level or organization.
In the early years of the field, AI scientists sort to fully duplicate the human capacities of thought and language on the digital computer.
Robots remain the best option, as they will connect the children with the happenings in the school. They will dress the robot with their favorite clothes, communicate with the teacher using the robot, and swivel [...]
In the introduction, the author outlines the genesis of his choice of the book's title by discussing the origin of the term, 'the most human.' Therefore, the introductory chapter gives the reader a strong base [...]
If a security breach occurs, then the attacker will only have access to that part of the operating system, thereby preventing access to the entire system.
The visually impaired To assist the visually impaired to use computers, there are Braille computer keyboards and Braille display to enable them to enter information and read it. Most of these devices are very expensive [...]
The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
To make an in-depth study of the emergency preparedness plans in the UK and USA including the recommendations of IAEA To compare the emergency preparedness procedures and methods of the UK, the USA and the [...]
One of the significant advantages of using technology is that it enables teachers to design and implement interactive course materials that could be used to enhance learning experiences that are more pleasurable and meaningful to [...]
In the flurry of the responses that followed, there was concern whether the smart phone market was becoming monopolistic. This was a clear indication that the competition in the smart phone market was becoming monopolistic.
The issue is that some of the motions and rapid movements may lead to confusion, and it is paramount to take all the necessary measures to make sure that the level of stability of is [...]
France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
Mobile communication, mobile hardware and software are the main concepts in mobile computing. The objective of mobile computing is to be able to work from anywhere.
With the advancements in information technology and the massive use of the internet, communication has become quite effective as people can connect when they are in different countries around the world, at any time.
Maps delivered through ArcGIS are beneficial in the sense that the user is able to gain access to the GIS functionality.
The OS of a computer is a set of instructions communicating directly to the hardware of the computer and this enable it to process information given to it.
Applying the Kantian theory of ethics the software engineer will have to inform the stakeholders including the investors of the company and the clients that there will be a delay in the launching of the [...]
Professor Roentgen's discovery of X-Ray in 1895 was a very big step in the field of medicine since it was the beginning of a long and interesting journey in the study of radiation.
One of the biggest advantages that technology has brought in the field of education is global learning. It is a fact that technology has brought about massive improvement in the field of education.
It is so simple to use, with a user friendly language vocabulary and so fast in compilation these have made it the widely used language in programming.
From the above analysis, it is more evident that digital technology has a wide range of effects to our culture and to the young generation.
Considering the fact that most of the controversy about cloning arises from misinformation or ignorance about the matter, this study shall set out to conclusively research on cloning and its merits so as to attest [...]
The equipment running under the UPS gets supply of power for several minutes before switching the power to an alternative or emergency power options such as batteries in case of electric failures.
IoT is a new reality in the modern world of business due to the reliance of technological and innovative industries on IoT.
The migration from the analog to the digital world was viewed as a major milestone in the management of data. The use of machine learning and data analytics can be applied to cyber security.
As the use of technology in the classroom increases, people have to be more mindful of ethical issues that arise from it. It is important to remember that there are also legal issues connected to [...]
This chapter reviews trends in the threat landscape, including human mistakes, crisis events, the growth of artificial intelligence and the Internet of Things, and the evolution of cyber-attacks in terms of purposes.
Engaging and empowering Hispanic communities in cybersecurity efforts promotes diversity and inclusion in the field and improves cybersecurity outcomes for all individuals and organizations.
With software engineering, students are taught about computers and technology and how they can code programs and design applications, software and websites. The most popular and growing professions are electrical engineering.
Therefore, it is worth concluding that although artificial intelligence is now at a high level of development, the communication of technologies among themselves needs to be improved. The bots will be trained by artificial intelligence [...]
Therefore, the information system is a collection of data, facts, or knowledge integrated in an intentional manner for the purpose of collecting, processing, and storing.
As governments shut down factories, stores, and events to stop the transmission of the virus, the COVID-19 pandemic has had a tremendous impact on the worldwide fashion industry.
For this reason, the given study focuses on investigating the role of space science and technology development in the UAE and their contribution to the development of international relations.
For example, a reduction in the number of jobs in an organization can lead to a decrease in the quality of service, and then to the loss of customers.
NASA's Best Engineering Design Process course demonstrates how presenting the audience with the idea of bringing a satellite to the Moon can lead to introducing deeper problems associated with the engineering side of the idea.
The novelty of this technology can be used by unscrupulous employees as an excuse to avoid preparing for lessons and working with students.
The paper evaluates a con article on 'The impact of cybercrime on e-banking' [1]. H2: Identity theft will have a negative impact on the adoption of electronic banking.
The primary reasons for it are the outdated equipment in UPS's facilities, as well as the necessity to modernize them instead of buying new technology outright.
An FBI IT Specialist supports the FBI facilities with the enactment and daily operations of the computers, printers, and other IT devices.
Next, it is necessary to implement various stages of digital transformation of cybersecurity, which include improving the maturity of enterprises in cybersecurity issues and the use of new solutions.
The 5 C's of brand management has grown in popularity since it thoroughly evaluates all the important aspects of a company and allows for approach adjustments depending on what is and is not effective.
The concepts of single buffering and double buffering are essential to understanding how animation is being displayed. Hence, single buffering and double buffering are particularly useful in animation and address the issue of display and [...]
Diagraming a data flow is useful due to the fact that it brings structure and organization to a complex set of processes, such as ordering a cap for graduation.
The first problem is correlated with keeping the identity of the person evolved in data mining secret. One of the major myths regarding data mining is that it can replace domain knowledge.
Remote working is a form of arrangement where the employee does not have to commute to the workplace. The number of telecommuters increased to 2,000 in 1983, and the figure continued to grow in the [...]
Utility apps are the kind of applications that people need daily. The user session time is one of the longest in entertainment and social media apps.
At the time of the release of the first iPhone, it was a challenge for thinking and action for the whole world.
Data science is the discipline that studies the life cycle of digital data from appearance to use in other fields of knowledge.
Artificial intelligence in marketing is a method of using customer data and AI concepts, including machine learning, to predict the next step of the consumer and meet his needs, even those that the consumer has [...]
Many of the costs of complying with the isolation rules, the costs associated with the spread of the disease, can actually be offset by replacing the workforce with robots.
For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
In addition, evaluating flaws and indications and estimating the risk to the company are the third and fourth steps in OPSEC strategies.
It may be critical to prevent cybersecurity breaches or data leaks to maintain the effective functioning of the government and ensure the sovereignty of the country.
The lean standards of manufacturing are the activities and techniques applied in the production process to identify the bottlenecks and streamline the efficiency of the process while ensuring high productivity.
One of the essential traits of smartphone addiction is tolerance which is defined as "a gradual increase in the mobile phone use to obtain the same level of satisfaction".
Data conveyed from the sender to the recipient using analog signals is referred to as analog communication. Digitalization communication refers to the transmission of data between a producer and a recipient via digital signals.
The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
The implantation of a chip in video cameras to identify the face of the shown participant is actively used for national security purposes of the state, in the agricultural sector, and in the front camera [...]
They can encrypt it on a computer with the help of a software program before uploading information to the Cloud. In conclusion, it can be noted that Cloud storage is an effective device used by [...]
Furthermore, since video conferencing is used as an education tool, my peers and I now have the opportunity to study in our residential areas.
Jing is a free, screen casting and image capturing tool (TechSmith, 2013). It also grants marking up uses and wide sharing probabilities within a short time.
But in the case of welding, the by-products of the welding process can be hazardous to the health of the workers.
Most of the learning activities were undertaken in a classroom in front of the students, and assessment processes were conducted in class with paper and pen assessments.
Both learners and teachers agree that adopting educational technology to enhance virtual and online classes is the best move in continuing the learning and teaching processes during and after the COVID-19 pandemic.
To begin with, in the modern world, it is crucial to come up with newer models of education and extend the existing approaches.
This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
The plastic casing of the husky flashlight consists of a 5 inch cylindrical plastic container with a very thin spring or a strip piece of metal that is used to make the electrical connections between [...]
While in the Revolution, I got a chance to see a working replica of the Atanasoff-Berry Computer, which was the first real model of a working computer.
The system will make it possible to carry out underwater sensing and imaging experiments using three communication layers namely: "the interface stations over the ocean surface; underwater base stations; and the sensing and imaging units, [...]
The design of the surface condenser is such that steam is made to get its way into the condenser system through an opening at the top section of the condenser system after which distribution takes [...]
It must be noted though that liquid cooling systems utilize more electricity compared to traditional fan cooling systems due to the use of both a pump and a radiator in order to dissipate the heat [...]
This paper discusses the Wi-Fi application and the technology behind its operation and functionality. This is a set standard within the wireless domain and is based on IEEE802.
However, the actual electronic circuitry is located in the plane's hand rest where it takes the sound signal from the microphone which is behind the headphones then inverts it sums it up together with the [...]
In general given that a firewall is aimed at providing security to the system and user data it is important that the software is capable of preventing attacks.
It is important to note that the first evolution of a personal computer occurred in the first century. This is because of the slowness of the mainframe computers to process information and deliver the output.
In this paper, we will look at road safety in the Middle East and Gulf countries, global statistics, types of road crashes, causes of road accidents and solutions to road crashes.
In some organizations the company portal is used by employees and clients to access important services that are available virtually. Tender's portals are used by bidders to bid for bidding tenders electronically which is much [...]
One of the major beneficiaries of technological advances that have been made by man over the cause of the last century has been the entertainment industry which as grown exponentially through the years.
In modern technology, the NAND-based flash memory is the standard for many solid-state drives. Solid-state drives are made up of DRAM volatile memory or the NAND flash non-volatile memory.
Reasoning: The jury argued that the defendant conspired to violate the Computer Fraud Abuse Act as well as the CAN-SPAM Act, caused havoc to computer networks of the national defense department of the federal government, [...]
They occupy the central place in our framework because RFID is the tool for arrangement of successful SCM and the SC is the central issue of concern in the whole production process of any supermarket [...]
LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
The Linux Operating System is a general term that refers to a Unix-like Operating System and it is based on Linux kernel.
Define terms of debate: The author will argue in support of the negative effects of video gaming. Detail: Children show signs of annoyance when deprived of video gaming.
The attackers' purpose is to obtain the credentials of a Wi-Fi network. It appears to have the name of the Wi-Fi network the user is trying to connect to.
Moreover, the pressure drop in a fluid that goes through a control valve is subject to numerous factors, relating to the design of aperture, type of fluid, piping system of fluid, temperature, and pressure.
In 1906 he broadcasted a Christmas concert, including his voice and violin play with the help of 400-foot towers to the ships of the United Fruit Company, which were equipped with Marconi's radios. In 1922 [...]
The humanity dreams about innovative technologies and quantum machines, allowing to make the most complicated mathematical calculations in billionths of a second but forgets how quickly the progress of computers has occurred for the last [...]
This increasing popularity of the multigenre computer world is reflected in the concerns of the world community about the potential harm to gamers.