Tech & Engineering Essay Examples and Topics. Page 18

4,666 samples

Databases in Workplace: NoSQL Databases

The purpose of this research paper is to find a NoSQL database that can be used in a working environment and how the organization may benefit from the application of the new model of the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 841

Value Function in Microsoft Excel

In order for Value to work, the text is to be in one of the formats supported by Excel, such as time, date, or any constant number.
  • Subjects: Applications
  • Pages: 1
  • Words: 283

Aspects of Airport Advertisement

The sponsor's principal role is to provide funding and resources for the airport's operations and decision-making on the quality of its services.
  • Subjects: Aviation
  • Pages: 1
  • Words: 352

Notepad++ as a Free Editor for HTML Files

They should locate the HTML file that they want to view, click on it with the right button, choose "Open with," and select a preferred browser.
  • Subjects: Programming
  • Pages: 1
  • Words: 297

Sensitive Data Exposure

In addition to that, even the possibility to reach backups of the discussed information can increase vulnerability. Attackers can get into the conversation of two parties and obtain access to the information they were willing [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 745

Toughness and Corrosion: Definition and Unit

Therefore, the more the energy required to break a material the tougher the material and the lesser the energy required to break the material the less tough the material.
  • Subjects: Engineering
  • Pages: 3
  • Words: 616

M-PESA: Critical Success Factors

Generally, consumers preferred mobile payments on paying for services and transfer of money wherein most of them enjoy the convenience of the technology and this was the initial value point considered by the consumers. The [...]
  • Subjects: Phones
  • Pages: 6
  • Words: 1058

Artificial Intelligence Investments in the UAE

One of the components of the strategy is to support the heritage of the country's founding fathers, which means the UAE has to remain among the most advanced nations.
  • Subjects: AI
  • Pages: 7
  • Words: 1962

Digitalization and Data Policy for National Security

In this paper, the aim is to analyze the impact of digitization on data policy for national security in the United Arab Emirates, specifically focusing on the correlation between digitization, cyber-security, and artificial intelligence.
  • Subjects: Cyber Security
  • Pages: 23
  • Words: 6207

The Million Dollar Page: Why Is It Popular?

Lastly, online advertising's effectiveness was still questionable and difficult to measure; thus, in 1999, Alex's idea would not get enough customers to fill the one million pixels.
  • Subjects: Internet
  • Pages: 1
  • Words: 295

Cyber-Security in Small Healthcare Services

Ensure accurate understanding of cyber-security to small businesses offering healthcare services. As a result, small healthcare firms will require cyber-security frameworks to keep unauthorized individuals out of the systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 558

Impact of Technology on Human Beings

However, despite the numerous benefits of such technology, there are concerns of the effects it has on humans. In that regard, media and communication technologies are suggested to affect the mental capacity of people while [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 302

Information Governance Course and Practical Connection

The author of this paper believes that the use of the mandatory access control model, in which each user is given a digital label, is appropriate to solve the problem of providing specific data for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 890

AppMaker: Threat Agents of Web Attacks

These factors are the capability of the agent, the motivating factor, and the opportunity to attack. This is the main reason most security agents are consistent in exploring web applications with hopes of identifying complicated [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 854

The Role of Technology in Human Capital Management

The two items mentioned can help relay visual information to people in a more accessible manner, enabling them to experience an image that is easier to comprehend and closer to reality than many other modes [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 275

The Vacuum Chamber Access System

Before embarking on the process of the necessities in the construction of the vacuum chamber it would be necessary to think of the kind of materials to be used in the endeavour.
  • Subjects: Other Technology
  • Pages: 11
  • Words: 3028

Security Architecture: Handling Sensitive Data

Due to handling data that could be a danger to the business if obtained by its competitors, the business intelligence and analytics system itself is considered sensitive.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 838

LTE-A Compared to Other 4G Standards

This paper examines the capabilities of LTE-A, the latest iteration of LTE, within the context of other 4G standards. LTE-A represents one of the pinnacles of this technology's accomplishments and a historically important step towards [...]
  • Subjects: Phones
  • Pages: 1
  • Words: 331

WEP, WPA, and WPA2 Networks Comparison

Effectively addressing the latter problem with minimal hindrance to performance is the purpose of WLAN security protocols. WEP, WPA, and WPA2 represent distinct stages in the development of WLAN security measures.
  • Subjects: Internet
  • Pages: 1
  • Words: 337

Future Databases and Performance Tuning

The following data collection allows the analysts to evaluate the intricate patterns to predict the future workload levels and adapt the database.
  • Subjects: Data
  • Pages: 3
  • Words: 725

Logic and Design: Flowcharts and Pseudocode

The basic understanding of logic and design is that processes should be presented in a way that demonstrates certain algorithms, i.e.the description of a process should be precise and should contain detailed instructions on what [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 590

The Usage of VR Technologies in Football

In sports, VR is on its way to becoming one of the essential tools for a sports organization that aims to acquire a competitive advantage.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 562

Identity Management for Systems in a DMZ

Connecting internal corporate services to the internet is a challenge because exposing these servers to external environments poses a massive risk in terms of security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 306

How the Carbon Absorb the Chemical Harmful Agents

Each of the processes is particular, and can be viewed in the following steps: carbonizing the organic precursor material to carbon of modest internal surface area in the range of tens to hundreds of square [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 686

New “Business” Technological Developments

Big companies, such as Amazon, are trying to harness the power of drones and realize their potential to the fullest. If the effort is successful, the blocks are added to the network, and miners receive [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1930

Mistrust for Results of Big Data and Possible Solutions

However, the number of Big Data challenges using leave concrete reasons for executives to mistrust the analysis results. This challenge is attributed to the complex nature of Big Data and the need for scalability and [...]
  • Subjects: Data
  • Pages: 1
  • Words: 390

Layering and Encapsulation Security Design

The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures. Thus, it is an example of a wrong solution to the world.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 720

Evaluation of the Marketing Mix

"The Race of the Hemispheres" is a video game produced by the Adaptable Home Products Company. As it has been mentioned in the introductory section, AHP sells a video game called "The Race of the [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 838

Working in Virtual Worlds

According to McLennan, it appears that the advent of the virtual world of work that enable more productive virtual environments will increasingly remold the workplace to allow collaboration and connectivity.
  • Subjects: Internet
  • Pages: 2
  • Words: 585

Digital Privacy in an Information Technology Age

Such software could allow collection of private information for instance by evaluating the information that employees send through the company's information systems.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1129

The Process of Knowledge Transfer

The background includes a discussion of CFCL, CFCL's SOFC, and intellectual property protection for CFCL's SOFC. In addition, the scope of use of CFCL's SOFC is known and accepted, that is, if used in the [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1632

Encryption, Stenography & Cyber Criminal Terrorist

The internet and the ICT system as a whole are vulnerable to cyber attacks. This is the method of using to trademark to protect our images and copyright on our intellectual properties.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 580

New Atomic Power Plant Under Construction in Georgia

This will cover the process right from the issuance of the construction permits, the construction process, the size of the output, the type of reactors to be used and the safety measures installed.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1365

Imaging Speed in Biomedical Engineering

A substitute for this in achieve the high speed requirement involves the use of a video rate laser scanner which would have an added advantage of being able to control the size of the aperture [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2751

Analysis of the Basic Attacks That Occur in Cyberspace

One of the risks associated with the use of the internet is the attack of cyberspace. Meanwhile, the FTC was suspicious of the activities carried out by Fortuna Alliance and in May 1996, it begun [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 2048

Evaluating for Trends and Gaps in Analyzed Data

The identification of trends and gaps in available data is a vital part of the project implementation because it may be necessary to modify the approach depending on the situation.
  • Subjects: Data
  • Pages: 4
  • Words: 1216

Mass Spectrometry Data and Database Analysis

The data processing and analyzing tools are used to extract and interpret the masses of the charged molecules from the data output of that particular mass spectrometry.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 906

The Structure of Major US Air Carriers

Some of the major airline carriers in the US are Southwest Airlines; American Airlines; Delta Airlines; Continental Airlines; and United Airlines.
  • Subjects: Aviation
  • Pages: 3
  • Words: 852

Internet Resource Evaluation

To this end, it is clear that the website I have evaluated is a useful resource for getting financial information on the type of investment to pursue.
  • Subjects: Internet
  • Pages: 2
  • Words: 551

Mobile Computing Technology and Accounting

Issues addressed include importance of the concept in the businesses today, the effects of mobile computing on accounting as well as business system, the relation of the technology with emerging technology and the future impact [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 657

How Do Hybrid Cars Work

The branch supports hybrid cars because they help to protect the environment through the reduction of emissions to the atmosphere and use of less fuel.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Object-oriented Programming. Java and C++ Programming

Besides, software engineers are required to understand the languages that are suitable for object orientation since not all languages can implement the OO programming concepts. In other words, classes are used to implement the concept [...]
  • Subjects: Programming
  • Pages: 4
  • Words: 1227

Aviation Weather: Atmospheric Pressure

On the other hand, temperature changes the air pressure; therefore, altimeters mostly indicate an altitude different from the true altitude. Thus, the altitude of an airport is the most meaningful altitude to a pilot.
  • Subjects: Aviation
  • Pages: 2
  • Words: 549

Information Security Services for Business

Authenticity: This means that the information security system of an organization should be able to validate data, communications, as well as, transactions and the parties involved so as to ensure that they are genuine.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 924

The Website Caters to Technology Enthusiasts

Unfortunately when it comes to looking for archived articles that are beyond product reviews such types of information require a bit more searching however the website does provide a search bar near the site header [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 725

Effect of Sea Water and Corrosion on Concrete

On the other hand, substantial tautness, for instance due to meandering will shatter the tiny firm pattern, ending up in fracturing and disjointing of the concrete.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4001

Automotive Manufacturing Engineering Processes

Most of the gangs live in the small towns and cities and for this reason, the authorities in such towns and cities must learn the best strategies to use in trying to eradicate the influence [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1384

Pipeline Control During Oil Transportation

Controlling and managing pipeline lines during oil transportation is necessary to ensure that any leakage or unnecessary termination of the oil is avoided.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 917

Reproductive Technologies: Ways of Regulation

For instance, through the use of in-vitro fertilisation IVF, assistance has now been given to those who have problems in conception; also the use of PDGs prevents conception of severely abnormal children.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1572

Routing Protocols for Wireless Sensor Networks

This has motivated serious research in recent years addressing the possibility of cooperation among sensors in processing data and the management of the sensing events and flow of information to the sink.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4283

Positive Influence of AI on Business

The majority of use cases are related to business and manufacturing, making it much easier for organizations to make sure that their improvements are beneficial to business [1].
  • Subjects: AI
  • Pages: 1
  • Words: 362

Optimal Paths for Autonomous Underwater Vehicles (AUVs)

What was described in the proposed video material reflects the urgent need for the intellectualization of automatic unmanned devices, namely the ability to independently build a route map depending on the obstacles encountered on the [...]
  • Subjects: Engineering
  • Pages: 1
  • Words: 283

Course Practical Connection: Operations Security

A company should structure the management, information, owners, for instance, clients and suppliers, and users of the information correctly, to enhance the handling of both hard and soft copies. It exposes both the client and [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 863

Monetizing Web Portals Overview

For example, YouTube and Facebook present ads that show the products and services that are relevant to a certain customer. The existing intranets and extranets can be linked to the external services through cooperation with [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 274

Sifers-Grayson Company: The Cybersecurity Breach

Finally, the recommendations, as per the improvement of the incident response capability, are introduced to ensure the elimination of the identified drawbacks and the compliance of the engineering company with the security requirements presented by [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1380

The SerDes Jitter Data Communication

Fundamental jitter illustrations are defined as well as hypothesis required to comprehend the roll of the SERDES compounds in statistics linkage concert.
  • Subjects: Internet
  • Pages: 9
  • Words: 2644

Loyalty Cards and Privacy Relations

According to them, it is virtually impossible to guarantee that the data in question will not be stolen, and the only way to mitigate the risks is through digital privacy education.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 285

Examining the Human Activity Influence on the Earth

To be more specific, some of the most valuable contributions to maintaining life on the Earth imply the increased number of organizations and communities that aim to solve the existing environmental problems.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 308

The Problem of the Identity Theft

Identity theft is a unique problem that is presently affecting the experiences and goals of many individuals in different parts of the world.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1377

Technology and Its Impact on Education Process

Technology provides the opportunity to involve categories of students with different abilities and pace of learning in the process of progressive education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 349

Malware and Social Engineering Attacks

Social engineering attacks date back to the advent of the Internet, and before that, criminals were using the telephone to masquerade as trusted agents to obtain information.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1226

Airport Operations and Cargo Transportation

Considering the significant number of employees in an airport, and the importance of areas restricted for security reasons, staff identification is a crucial part of an airport's landside security.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Leveraging Technologies to Stay Successful

For example, to stay successful with my studies, I need help with time management, and the Focus Keeper application is my solution.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 593

Acme Corp.: Designing a Better Computer Mouse

The approach that the company is taking toward the early stages of the development process is to only include design engineers and brainstorm ideas.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 558

The Big Data Analytics Methods

The graphical representation of data helps the users to identify patterns and understand the correlations, which are essential in making decisions.
  • Subjects: Data
  • Pages: 3
  • Words: 857

Modern Storage Technology: Data Compression

Data compression can be divided into two types lossless and lossy, with the former conserving all the data, and the latter strategically removing some of it.
  • Subjects: Data
  • Pages: 1
  • Words: 286

The Gold Airways Fleet Management

Providing fast service of equipment at the airport and launching passengers into the cabin will allow one to efficiently manage finances and increase the number of flights, which will reduce the price of tickets.
  • Subjects: Aviation
  • Pages: 1
  • Words: 351

Technologies: Buffer Overflow

The phenomenon of a buffer overflow attack is one of the more recent challenges to online security, which implies that the amount of incoming data exceeds the processing capabilities of a machine, thus causing extra [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Legal Driving Age Policy in the United States

In the following paper, the issue of changing the legal driving age in the United Stated in order to raise the level of safety on the roads will be examined.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1648

Tools for Installation Stage of Cyber Kill Chain

A hack tool is also used to create malware by adding an unauthorized user to the list of those permitted and then deletes the logs to prevent tracking of the attacker in the system.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 578

Certification Authorities: Comodo, DigiCert, and Entrust

The innovative services are accompanied with the highest level of support to guarantee the client can fully unleash the probable of the online business. The achievement of programs is featured to Comodo company flexible service [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 395

Emerging Digital Workplace Technologies and Organizational Change

Emerging technology in an organization usually leads to the disruption of the existing relationships and routines within the firm. The emerging technology has brought about tremendous changes within the operation of an organization, a fact [...]
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4136

Technology and Wind Energy

Efforts by the elite members of the society enlightened the global countries about the benefits of renewable energy sources in conserving the environment prompting the need to consider wind energy.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 295

Privacy and Smartphone Apps: Documentary Review

The documentary is about the privacy risks posed by the many apps that people are using on their smartphones. If a person is not ready to give access to the information the application wants, they [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 553

Aspects of the Cyber Kill Chain

The latter is needed to fulfill the objective of data mining and theft. The main idea behind it is to respond early to the attack instead of focusing on post-compromise phases and effects.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 554

Analysis of Cyber Kill Chain Causes

With the emergence of the Internet, the world has witnessed the arrival of cybersecurity threats that jeopardize both individual and organizational databases.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 588

Discussion of Coding of Qualitative Data

Coding will address questions of leadership in nursing, tendencies for the experienced professionals to continue education, and the need for a DNP degree in clinical practice.
  • Subjects: Data
  • Pages: 2
  • Words: 559

Online Platform Development: Rafeeq

The company is also catering the needs of the target customers in the most creative manner. The order received by the administration, which acknowledges the order with the restaurant and the customer.
  • Subjects: Applications
  • Pages: 1
  • Words: 1666

Cyber Kill Chain: Application and Utilization

Cyber Kill Chain means a sequence of steps that assist in tracing the phases of cyber-attack from the early investigation to the exfiltration of data. Delivery involves the transmission of the weapon to the target [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 925

Multimedia Use in Teaching

The main reason for easier conceptualization of the facts is the interaction and identification of images presented in videos and the ability of video to arouse imagination in the watchers.
  • 5
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 1856

The Impact of Handheld Device Usage on Life

More specifically, I want to examine the impact of telephones on my interaction with friends and my perceptions concerning the mental effects of the device application.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 673

Samsung NX1000: Digital Camera Overview

The NX1000 is relatively small in size. This makes them it convenient for travelling. It has Light and darkness sensor features.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 363

The Impacts of Internet Telephony (VoIP)

Internet telephony has impacted many lives and has led to ethical, social, and political issues in the contemporary world. In a nutshell, internet telephony has impacted many lives in the ethical, social, and political facets [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 711

The Most Influential Force in Modern Society

Therefore, I believe that digital technology in general and social media, in particular, represent the most influential force that sets the tone for an individual's personal values.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 306

Computer Forensic Incident

All evidence should be collected in the presence of experts in order to avoid losing data as well as violating privacy rights.N.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 587

The Use of Technology in Teaching Practice

As to the possible revisions of the lesson plan, it is necessary to help students grasp the material more effectively and have a more positive attitude towards their wrong answers.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 386

Using Jing in Teaching

Jing is a free, screen casting and image capturing tool (TechSmith, 2013). It also grants marking up uses and wide sharing probabilities within a short time.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 210

Information and Communications Technology in Education

Moreover, many research projects started to investigate the benefits of MALL in learning the language. The research revealed women to be, on average more inclined towards mobile learning in perception and attitude.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1511

The Halpin and Relational Approaches

The relational approach, in turn, is a framework to adapt a database design to a real-world environment. Tying to the specific needs of the organization forms the basis for working on such a structure.
  • Subjects: Data
  • Pages: 1
  • Words: 278