Category: Tech & Engineering

  • Oxford English Dictionary and the Wordnet Analysis

    Table of Contents Introduction The Oxford English Dictionary – Electronic Version The WordNet Difference between OED and WorldNet Conclusion References Introduction Dictionaries have undergone a transformation into electronic versions and these versions have proved to be increasing in popularity. Since people work largely with computers and Internet connection availability ha become affordable, the electronic versions…

  • Data Visualization with the Use of the R Language

    Data visualization is significant as it lets users view, connect, and comprehend data. Choosing the best data visualization tool, enables business owners to identify new patterns and correct possible errors in their data. This email’s main goal is to justify my choice of R for data visualization. R enables staff members and business owners to…

  • Fiber Optics Usage in Medicine

    Table of Contents Applications Fiber optics in medicine The endoscope Advantages of fiber optic References This paper presents the travelling of light with respect to different mediums on a special subject mentioned as total internal reflection. Also discussed are applications of total internal reflection mainly majoring in fiber optics in medicine and advantages of fiber…

  • The “Good to Exceptional” Book by Jim Collins

    Jim Collins authored the book Good to Exceptional after researching what separates good companies from great ones. In the first stage of the search, for instance, investors spent six months poring over financial statements to identify businesses with the following basic pattern: 15 years of cumulative stock returns at or below the general stock market,…

  • How a Magnetic Train Works

    Masayuki Shibata is a highly trained and capable professional in the field of engineering. He holds a doctorate degree in science from Tsukuba University. Immediately after obtaining his Doctor of Science degree, he joined Hitachi Ltd in 1988. Currently, he works at the Hitachi laboratory. For a long time, he has developed deep interest and…

  • Description and Countering to Phishing

    Table of Contents Abstract Background Types of attacks initiated by Phishing Counter strategies that can be used to combat phishing Conclusion References Abstract Phishing refers to the attempt of obtaining other people sensitive information by pretense of posing as a trustworthy entity during online communication, with a principal objective of undertaking financial fraud. It is…

  • The Grand Canyon University Library Databases

    Table of Contents Introduction Discussion Conclusion Reference Introduction A significant factor in selecting sources for research papers is a rational evaluation of the database that hosts the material. The GCU CINAHL Complete and Academic Search Alumni databases can provide valuable information to support a capstone project change proposal. Discussion These research sources contain a considerable…

  • Recommendation for a relational database

    Table of Contents Introduction Benefits of using a relational database Justification for relational database system Conclusion Bibliography Introduction The need for information technology in today’s business world is indubitable. Within Information Technology, aspects of data storage, retrieval and security are of great regard (Chatzopoulou, 2001, p 1). Data or information is supposed to be stored…

  • Principles and Practice of Information Security

    Table of Contents Security threats in computer networks Threat classification for the threat being averted References Security threats in computer networks Computer security is an issue that has grown to be of gross concern in the present years. Individuals and companies have suffered major losses as a result of the vice. Many people have spent…

  • Code switching and millennial generation

    Table of Contents Introduction Discussion Summary Works Cited Introduction The millennial generation is extensively influenced by technology. This generation has had access to mobile phones, digital equipments and the internet. The Millennials prefer text messaging, IMing, and social networking sites rather than conventional forms of communication such as phone conversations (Godwin-Jones 13). Consequently, technologically-inflected version…