Tech & Engineering Essay Examples and Topics. Page 20

4,314 samples

Object Oriented Programming Concepts

It summarizes the relationship between structures, classes and unions, and OOP, and mentions the concepts of inheritance, objects, and polymorphism in OOP. Actually, the declaration of a union is similar to that of a structure.
  • Subjects: Programming
  • Pages: 3
  • Words: 861

Failure Modes and Effect Analysis (FMEA)

Planning risks are the risks associated with the activities and processes of the planning stage of a project. In addition the components of the system are to be tested together and not in groups.
  • Subjects: Programming
  • Pages: 12
  • Words: 3373

The Sports Report Information System (TSRIS)

The Sports Report Information System is designed for the AllSports Sport Club specifically with the goal of ensuring that the club's newsletter is prepared and distributed in time, information access is done with efficiency and [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2141

Virtual Environment “Second Life”

It is as a result of these developments that Second Life was created in which the user is centered compared to the other applications.
  • Subjects: Applications
  • Pages: 2
  • Words: 597

Incident and Accident Investigation

These people are very important because they have full knowledge on the operating mechanism of the aircraft and hence they will be in a position to analyze the remains of the aircraft to determine the [...]
  • Subjects: Accidents & Protection
  • Pages: 11
  • Words: 3068

The RAD Tutorials Under the Network Layer

In addition, the paper provides an evaluation of the tutorial and experience of the tutorials. There are various protocols and network architectures that can be used in the implementation of VPN, with the most common [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 583

Drawbacks and Disadvantages of Distributed Computing

However, in any distributed system, there is a need to either have a coordination mechanism that will ensure that all the computers in the system are synchronized or work towards the reduction of processing time [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 869

Developments in the Field of Machine Learning

The environment of learning consists of a machine input, or a piece of information that a machine can respond to. One of the best ways that we can think of in solving the problem of [...]
  • Subjects: Engineering
  • Pages: 30
  • Words: 7349

The Professional Computing Ethics

Nonetheless, the submission of students' term papers to the Turnitin system for plagiarism detection, along with retention of the same in the archives of the Turnitin database for use in comparing term papers submitted in [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1507

The Strategic Advantage of Cloud Computing

To explain the position of the present system, this report will perform a SWOT analysis, which discusses the difference between the current and desired data storage status of the selected organization and it will suggest [...]
  • Subjects: Cloud Computing
  • Pages: 12
  • Words: 3304

Cloud Computing Adoption by the CU-IT Services

This paper will therefore be designed to inform the company's CIO of the evidence-based clarification of cloud computing; the evidence-based evaluation of the general benefits and pitfalls of cloud computing; the formulation of a framework [...]
  • Subjects: Cloud Computing
  • Pages: 9
  • Words: 2443

Current State of Online Security

The Rich Internet Applications are described as a number of applications that are operational in the normal browsers that customers use on daily basis on the computers and those that interact with web applications.
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1586

Image Processing: The Fourier Analysis

The color of the map is another quality that can be exposed to control mechanisms to show the 3D plot, in which the matrix z height data is in direct proportion to the color of [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 628

Artificial Limbs and Organs Future of Application

Further complexities in the matter of organs and transplants are due to the position of the law on property and a body. Due to these limitations, it would appear that the best solution lies in [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2493

Animal Biotechnology: Ethical and Health Evaluation

The aim of this paper is to present an overview of modern biotechnology in the breeding of poultry and to look at the possible side effects on both the consumer and the chicken.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1880

Communication and IT Infrastructure in London, New York, Paris and Tokyo

London New York Paris Tokyo Technological History London’s history of telecommunications remarkably starts with the development of telephony and telegraphy. Famous inventor Alexander Bell introduced his devices enabling people to communicate at distance (Huurdeman 159). Telegraph technologies started the invasion in 1868 and were marked with the creation of the Indo-European Telegraph Company. (Huuderman 127). […]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1146

Organic-Led Technology Application

The wavelength of the photons emitted depends on the type of the element used in the boundary. In response to the looming change of technology from the use of LED to make TV display panels [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1726

Are Word Processing Programs Making Students Lazy?

Besides, easy access, availability, and strong support in learning institutions have contributed to the widespread use of word processing programs among students. However, the capability of word processing programs in correcting grammatical and spelling mistakes [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 884

Systems Engineering Advances and Competition

One of the radical changes that occurred in different areas of human activity is the growth of automation which influenced the employment and level of qualification and training.
  • Subjects: Engineering
  • Pages: 2
  • Words: 549

Data Carving and Data Hiding Concepts

The phenomenon of data hiding is urgent for current practices in computer forensics and involves information storage in places where this information is not expected.
  • Subjects: Data
  • Pages: 3
  • Words: 849

Intrusion Detection and Incident Response Concepts

Security breaches in the form of intrusions are becoming harder to detect due to the nature of the activities. Unexplained variations in the status of these files will most likely indicate a breach of the [...]
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1658

Nanotechnology: Principles and Benefit

Zimmerman explains that this technology is quite unique because in other technologies, the materials are usually bulky when they are extracted from their original source and have to be refined in order for them to [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1545

Fuel Cell Vehicles: Status 2007

The two authors' contribution to the paper is valuable as it gives the view of professionals in fuel cell technology, this gives the paper a professional touch and hence makes it a credible source of [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1054

Text Message Device Design Analysis

This report is a description of a project to design and install a text messaging device on the office door of the professor to enable them to communicate with students and other people that might [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2485

Chief Information Officer of a Separate Enterprise

Such view of IT in the organization provides a better explanation of the way the CIO will be able to better harmonize each part of the department-enterprise, deliver better value for the organization, and what [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1264

Review of Gauchito Project Plan

The satisfaction of the customer concerning the costs, the workmanship and the delivery of the product which was the rocket were very important in making sure that the goals that the project had were achieved.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1256

Summary of C4.5 Algorithm: Data Mining

5 algorism: Each record from set of data should be associated with one of the offered classes, it means that one of the attributes of the class should be considered as a class mark.
  • Subjects: Data
  • Pages: 2
  • Words: 505

Programming Solution Proposal Analysis

The preliminary investigation will crystallize the benefits of the proposed system compared with the current system to reinforce the rationale of adopting and implementing the proposed system.
  • Subjects: Programming
  • Pages: 2
  • Words: 550

Global Climate and Computer Science

In an attempt to discover the role technology can play in the research of climate change, several approaches have been recommended by the UN's Intergovernmental Panel on Climate Change.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 611

Analysis of Design Engineering and Its Faults

The main external interfaces are numerous information systems and software that enables the personnel to test the work of equipment. At this point, it is necessary to replenish the supplies of fuel and energy.
  • Subjects: Engineering
  • Pages: 2
  • Words: 571

The Importance of System Engineering

For instance, three dimensional modeling and simulation was used in the manufacturing process and the product design of Boeing 777. During the process of product development for Boeing 777, the simulation process was used to [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 750

Importance of Retaining Company Data: Methods and Types

By exploring risks associated with storage media such as; theft, data remanence and data access, this paper discusses the hardware solutions and user policies that an organization can institute to reduce the chances of data [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

Enterprise Security and Audit

The present report is identification and the assessment of the organization's information security. Loss or deletion of information Unauthorized access to software, databases, and servers.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 407

Intel and WiMAX Case – Key Players

In the case of the WiMAX and LTE, the existent infrastructure and coverage plays the largest role, and thus, it might be assumed that they will be developed simultaneously.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 657

Engineering for Community Development

These are some of the indications of poverty which is to an extent linked to means and ways of energy production and usage adopted within respective regions.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1722

Machine Learning and Bagging Predictors

The aggregate uses the average of the single predictors, to improve the accuracy of prediction especially for unstable procedures such as neural sets, regression trees and classification trees.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 558

Riordan Manufacturing Virtual Organization

Before expanding the company's IT infrastructure by setting up the IT system in the new office, it is important to consider the organization's information systems and their functionalities, the information technology system in the new [...]
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1106

Computer Network Security Legal Framework

With the introduction of cloud computing, the need of data protection has been rising significantly within computer networks to facilitate the protection of Intellectual Property among the users.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2289

Development of an Interactive Organizational Website

The site should be easily navigable and interactive to make it easy for users to access information they will be looking for. It should be possible for a user to navigate to the main sections [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1151

Mobile Application Services: Digital Credibility in Education

The best pattern according to which the mobile phone application services, which can be made available to potential students and their families, can be described, is the one which takes into account the way in [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2329

Properly Managed Disk Resources

The size and structure of a disk has a great impact on the performance the computer system. As indicated above, there are two forms of formatting that have to be done on the disk; low [...]
  • Subjects: Other Technology
  • Pages: 20
  • Words: 5648

Making Informed User Decisions: Windows v. Linux

Security is one of the most critical differentiating components between Linux and Windows considered in the discussion as user programs and data at corporate and individual levels get majorly concerned about the safety of their [...]
  • Subjects: Programming
  • Pages: 20
  • Words: 5667

Federal Aviation Authority

The following report explains the various aircraft -noise control measures that are taken by the Federal Aviation Authority in controlling the noise problem.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2189

Computer Forensics and Audio Data Retrieval

Advanced technology in the modern society has contributed to the increase in computer and computer supported criminal activities due to the soaring increases in the number of internet users across the world and computerization of [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 850

Definition of 3D Television Technology

The first one of course is to wear eyeglasses, which will do the work of filtering offset images before they reach the eye, and secondly, we can use a light source to divide the images [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1117

GNS3 and Explaining How to Work With It

GNS3 is a graphical network simulator, which provides a platform for the simulation of a complex network. It is a powerful tool for real labs and is used by network engineers as well as other [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 588

Cyber Security: Security Audit

On the issue of computers and laptops, I learned from the administration that each laptop was specifically assigned to a single person who was entrusted with a password known to him and the organization's administration [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 735

Network Design for Business

The physical and the logical layout structure of the network have to match the design and the business needs in that particular context.
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Tech: Database Forensics

Brinkmann & Carracedo observes that one argument in which the outcome of database forensic can be of greater importance to a company is the fact that a company can be able to determine whether the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 874

Speech and Voice Recognition

Voice recognition is the use of software and additional apparatus to capture voice-based commands from a user and transfer these to a computer.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 210

IP Addresses Running Out Problem

In response to the growing concerns regarding the exhaustion of numeric addresses in IP version 4, internet designers have sought to establish a long term solution to the problem by launching a new addressing format [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 826

Software Piracy: Windows

In addition to this the vendor has a high incentive to increase the product security when the level of piracy is high owing to poor implementation of anti piracy legislation.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 639

Assessment of Firewall Security

In general given that a firewall is aimed at providing security to the system and user data it is important that the software is capable of preventing attacks.
  • Subjects: Computer Security
  • Pages: 9
  • Words: 2463

Computer Forensics: Data Acquisition

Data acquisition is a branch of computer forensics concerned with the retrieval of data originally located on a suspect medium such as a hard drive.
  • Subjects: Data
  • Pages: 3
  • Words: 862

Various File Systems Used by The Different Versions Of Windows

File systems used by various versions of windows fall into two broad categories, namely, File Allocation Table file systems and New Technology File Systems. FAT and NTFS file systems also contrast in terms of their [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 864

Incident Response Team Overview

The team has the responsibility of identifying and handling incidents in a systematic way to precisely investigate, lessen and report it to the concerned individuals in an organization.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 325

Network Security. Profound Use of the Internet

The major purpose of the Defense in-depth approach to computer security is to delay the onset of the potential threat rather than prevent the hacker from breaking into the system.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 961

Ethical and Legal Constraints Affecting Engineers

For instance, before the construction of a building or any other structure commences the engineers are the ones who are responsible of verifying the plan of the building and they act as the project managers [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 751

Concept Drifts and Machine Learning

The main theory that is used in explaining machine learning is referred to as the computational learning theory where the learning theory is focused on the probabilistic performance bounds of the learning algorithm because the [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2774

Introduction to the Web Mining

Today World Wide Web has become an increasingly popular platform for storing, retrieving, and disseminating information as a result of the significant and rapid growth of Web data the knowledge available over the Internet.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1857

The Incident of the Distributed Denial of Service Attack

In that regard, Turley had the option of pulling the plug, but nevertheless, he evaluated such a decision between the risks at stake and the identification of the type and the source of the attack, [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 816

Network Caching Overview and Analysis

The second importance of the application of caching in networking is a productivity increase in the end-users. This request is subject to the rules of filtering traffic that are employed by the server.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2659

Using the Internet for Master’s Programmes

First, the benefits of the Internet will be introduced at the beginning of the next section; secondly, we will focus on the risks of the Internet and the ideas on how to avoid plagiarism.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 930

The Digital Divide Term Description

Currently, the wouldigital divide' is increasingly used to refer to differences not only in access, but also in skill and proficiency level in the field of computers, the net, telecommunications, and information and communication technologies [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1319

ABC Corporation’s Security System

Negligence of the security is mostly by the security guards who fail to check and deal with employees violating the policy appropriately.
  • Subjects: Applications
  • Pages: 4
  • Words: 549

Ground-Source Heat Pump System and Its Sustainability

Their operation is based on a renewable energy technology utilized in heating or cooling spaces."This technology is dependent on the fact that the earth has the most stable temperatures, warmer than the air during winter [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2345

Software Development and Design Patterns

The iterator also has the advantage of providing a common interface to the user through the technique of returning only the elements of importance to the client.
  • Subjects: Programming
  • Pages: 2
  • Words: 628

Face Biometrics in a School: Pros and Cons

As such, the only way to gauge the efficiency and effectiveness of face biometrics in our school is by conducting a SWOT analysis of these systems.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1295

Aircraft Crash and Emergency Management: Flight UA232

There was no indication of any type of problem that could have warned the pilots of the impending disaster that would force them to crash-land the DC-10 that carried 285 passengers and eleven crew members.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2038

Diesel Generator, Its History and Future

In a diesel engine fuel and gas are mixed in the cylinder before ignition while in a spark engine fuel is mixed external to the cylinder before ignition. The coupling of diesel engine and Maxwell's [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 706

Nanophotonics and Its Applications

The fiber and the couplers are believe in charge of the conveyance of the light wave to the system optical switches.
  • Subjects: Robotics
  • Pages: 3
  • Words: 852

IPad, JooJoo, or Android: What Tablet to Choose?

The launching of Apple's Ipad led to a rush by the personal and the business users to have the gadget. It appears that the impact that the Ipad will have is nothing in comparison to [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 644

Evaluation of Software: Oracle

On the other, hand, it can be stated that for the other part of the company's business, i.e, standard production, the functionality of the suite will be sufficient to perform satisfy all the needs of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 704

Token-Based MAC Protocols: Wireless Networks

In the case of the wireless networks, the radio frequency in which the network is tuned is the only medium. The key difficulties of wireless data transmission are the encoding of the data, speed of [...]
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2448

Enterprise Resource Planning: Types and Importance

The modules include Inventory, Bill of materials, Sales orders, Manufacturing Resource Planning-MRP, Jobs, Purchasing and Accounting as in the print screen below; In the area of labour and machine requirements planning, the main functional objective [...]
  • Subjects: Applications
  • Pages: 9
  • Words: 2591

Simulation of a Direct Detection Optical Fiber System

Meanwhile, the report will be discussing the procedures initiated during integration processes that includes the device parameters and stating all components required to make the device. Below are the procedures and the components used in [...]
  • Subjects: Programming
  • Pages: 7
  • Words: 1928

The Tactical Throwable Robot

The main technical characteristics of the machine are given below in the table offered by Czupryniak Rafal and Trojnazki Maziej in their article "Throwable tactical robot description of construction and performed tests".
  • Subjects: Robotics
  • Pages: 4
  • Words: 1151

Human-Computer Interaction and Communication

As the person is interacting with the gadgets or the computers, he should be favored by the design in that the system should be in such a way that it supports human usability.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1372

Impact and Types of Networks

The demerit of this kind of network is that if the server is faulty the entire network will be brought to a halt.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 713

The Credibility of Web Pages

The first thing that justifies the reliability of a web site is the availability of detailed information concerning the person or the organization that created the website.
  • Subjects: Internet
  • Pages: 2
  • Words: 591

Willa Brown: Impact on the Aviation Industry

Through the analysis and perusal of relevant literatures, the study will in detail provide an informative and well thought out discussion as regarding to the various aspects of life as experienced by Willa Brown.
  • Subjects: Aviation
  • Pages: 10
  • Words: 3000

The Concept of Document Object Model

If the user wishes to add a book, then she must provide the title, first name and surname of all the authors, name of the publisher, and the year of publication.
  • Subjects: Programming
  • Pages: 10
  • Words: 1273

Education and Training: Conversation System

The invention of the digital computer is believed to have been the turning point of the 20th century and the facilitator for the move from the Industrial Age to the Information Age.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2582

LAN Design for Return2Fender Company

This necessitates the requirements of ensuring a network is designed to link all the offices without compromising performance for the sake of business enhancement and continuity.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1247

ISDN, RIP, IGRP, and OSPF on the Cisco Routers and Switches

ISDN is digitally designed in such a way so that it can allow digital voice transmissions and also data transmission through the ordinary copper wires that are used in ordinary telephone circuits and in the [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1857

Blackberry and iPhone: Exploits of Smartphones

The trends in mobile technology changed the entire concept of mobile phones and different models are entering the market. Unauthorized calls from Blackberry and iPhones have, in many cases, caused threats to the security of [...]
  • Subjects: Phones
  • Pages: 14
  • Words: 3684

Dependability of Computer Systems

In the dependability on computer systems, reliability architects rely a great deal on statistics, probability and the theory of reliability. The purpose of reliability in computer dependability is to come up with a reliability requirement [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3384

Growing Use of 3D Technology in Theatres and at Home

One of the major beneficiaries of technological advances that have been made by man over the cause of the last century has been the entertainment industry which as grown exponentially through the years.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4446

Using Robots in the Medical Industry

Third, the robot surgery further has been observed to increase comfort on the part of the patient as the surgery proceeds, and this results from ergonomic position that the robot assumes as the operation proceeds.
  • Subjects: Robotics
  • Pages: 3
  • Words: 990

Software Engineering: Data Modelling and Design

It may be physical e.g.a toy car representing a real car or it can be conceptual, only represented on paper to bring a good description of the operation of the real object."A data model is [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1210

The Overview of Information Assurance

It is necessary to establish the impacts and the degree of the risks in the group and learn which scenarios require the most attention.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 863

Autonomous Mobile Robot: GPS and Compass

The other realization is that in most instances the challenges presented in the motion of the appendages of a particular robot are not only limited to the number of joints but can significantly exceed the [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2538

Defining Data-Data Element Overview

A vendor Tracking ID is one of the specific examples of data elements used in a medical setting for the pre-requisite information that is used to define and format the data elements and validation values.
  • Subjects: Data
  • Pages: 2
  • Words: 632

Just-in-time Purchases and Extranets

On the other hand just in time purchasing is a new technology that uses information technology infrastructure to control the inventory and also the customers use the same system to make orders and also buy.
  • Subjects: Internet
  • Pages: 1
  • Words: 343

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2967