Category: Tech & Engineering 2928

  • Cloud Computing Service Models and Providers

    Table of Contents Background Statement of Need Cloud Service Providers Recommended Plan Impact of Recommended Plan References Background This document offers a concise summary of the various cloud computing service models and key cloud service providers. It covers the possible advantages and drawbacks of moving Don & Associates technical infrastructure to the cloud. Financial services…

  • DC Motor Rotational Speed Characteristics

    Table of Contents Introduction Description Procedure Results Conclusion Works Cited Introduction DC motors are machines that convert direct current electrical energy into mechanical energy or torque, whoch is also reffered to as the moment of a force. The operational mechanism of the motor is based on the forces that act on the magnetic field, which…

  • Media Usage as a Mode of Learning

    In the recent past, the use of electronic media has increased in our schools. This can be attributed to globalization and emergence of information technology in the 21st century. Because of many challenges related to the use of media and information technology, I will discuss use of media as a mode of learning and recommend…

  • Professional Networking: Advantages and Disadvantages

    Available literature demonstrates that the use of online professional networking comes with obvious advantages, particularly in this era where many professionals and businesses rely on information and communication technologies not only to communicate but also to conduct business. The foremost advantage of online professional networking is that it can enhance an individuals visibility online because…

  • Modernization of Educational Process: Positive and Negative Sides

    Modern day colleges and universities have implemented numerous methods of improving access to their courses and services (Brodahl, Hadjerrouit & Hansen, 2011). This comes in form of online distance learning, the digitization of books and course materials, college web portals where registration for courses can be done in a quick and effective manner as well…

  • Overfitting: Cross-Validation, Dropping Out, and Feature Selection

    In most cases, overfitting happens when a model performs perfectly during training data but generalizes poorly to unseen data. It is common in machine learning, and numerous studies have revealed methods that can prevent overfitting (Delua, 2021). Some of the most potent ways to avoid overfitting are cross-validation, dropping out, and feature selection (Zhou et…

  • Overfitting: When Models Fit Training Data Exactly

    It is important to note that overfitting is a major problem in data science. It takes place when a statistical model fits exactly against its training data, which means that algorithms are unable to perform effectively when faced with unseen data (IBM Cloud Education, 2021, para. 1). The issue is tied to the key features…

  • Data Structures and Algorithms

    My understanding on data structures and algorithms goes mainly to the three books that I read as a beginner and continue to consult the books whenever I need guidance. Data Structures Using C by Aaron M. Tenenbaum Data Structures, Algorithms, and Program Style Using C by James F. Korsh Data Structures and Algorithms with Object-Oriented…

  • The Networking Topology Concepts and Approaches

    Understanding basic network topologies is central to building a viable physical design thereof. Currently, the point-to-point (P2P), bus, ring, star, and mesh topologies are considered to be the most effective and, therefore, the most broadly used ones. The P2P topology, as its name suggests, requires a direct connection between two computers for the network to…

  • Addressing the Bruces Issue With DNS

    In the first scenario, Sharon receives booking requests on a daily basis via a Hotmail account. However, her laptop lacks a firewall and an Avast virus scanner, while her virus diagnostics and system updates are now out of the current. Having received an official-looking mail, she opened the embedded attachment and, as a result, her…