Tech & Engineering Essay Examples and Topics. Page 20

5,367 samples

Internet Explorer: Software Reviewing

Internet explorer is available with the Microsoft operating systems interfaces. There are various important components on the example of an internet files window.
  • Subjects: Applications
  • Pages: 16
  • Words: 1239

Telecommuting: Benefits and Disadvantages

As the research states, telecommuting generally allows people to work from home, which reduces office space and, as a result, the expenses associated with the operating costs and the amount of energy use.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 976

Cloud Computing in Business

Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
  • Subjects: Cloud Computing
  • Pages: 13
  • Words: 880

Phishing Victimization on Internet Banking Awareness

Therefore, the study is meant to determine and evaluate consumer susceptibility to e-banking victimization through phishing attacks. Subsequently, the study will be designed to evaluate the effectiveness of phishing victimization training to E-banking consumers.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4145

Tabletop Centrifuge Manual

The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Dangers of Logic and Artificial Intelligence

The following are the dangers of logic and artificial intelligence when applied in various areas. The last danger of logic and artificial intelligence relates to autonomous weapons.
  • Subjects: AI
  • Pages: 5
  • Words: 1239

Electronic News Gathering

The Characteristics involve the Utilization of electrical video to gather information, the Incorporation of Audio technologies in gathering news, and the Utilization of portable equipment in the newsgathering process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1366

Big Data and Artificial Intelligence

Of course, there are cons associated with deep fake technology; its core concept is to create a fake so good that it can be considered authentic.
  • Subjects: AI
  • Pages: 1
  • Words: 286

ARC-IT Communications View Description

Architecture Reference for Cooperative & Intelligent Transportation terms the protocol stacks as solutions and consists of a collection of standards to regulate the communication process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 570

Internet Hacking and Cybersecurity Conundrum Analysis

Many people have gained access to computer systems, the Internet, and related products and services, leading to the emergence of cyber-related threats. Cybersecurity improvements are vital to the continuous developments in information technology, national security, [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 824

Internet Hacking and Cybersecurity Conundrum

Therefore, the increasing number of attacks during the pandemic could be handled with the help of machine learning and have the numerous human workers assigned to less crucial tasks that actually require human judgment.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1206

Health and Environment: The Impact of Technology

This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
  • Subjects: Technology Effect
  • Pages: 20
  • Words: 5816

Solid Mechanics: The Two Main Components of the System

However, considering the bending stress of the RHS element, and the sizes of CHS, the loads will be mainly concentrated in the place of RHS and CHS contact, and the square of the contiguity will [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1090

Impact of Cybercrimes on Business

The SolarWinds cyber-raid is described as the most sophisticated and the most significant assault in the world. The vulnerabilities in SolarWind and its customers, such as Microsoft can lead to the loss of millions to [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 878

AI and Job Security Aspects

The biggest fear in the economy's digitalization is the loss of jobs, but this will only be in the short term and only if there is the uncontrolled use of artificial intelligence.
  • Subjects: AI
  • Pages: 4
  • Words: 1132

Nuclear Energy: High-Entropy Alloy

One of the tools for reducing the level of greenhouse gas emissions is the development of nuclear energy, which is characterized by a high degree of environmental efficiency and the absence of a significant impact [...]
  • Subjects: Engineering
  • Pages: 12
  • Words: 4165

Dubai WI-Fi Management

The purpose of this undeniably ambitious project is to make major changes to the social and technological environment of Dubai.
  • Subjects: Project Management
  • Pages: 10
  • Words: 1404

Creating a Database in Microsoft Access

During the database design, it is not possible to delete the primary key fields in the datasheet view until one changes to the design view, since the primary key represents a unique identification field of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 758

Manifestation of Strategic Cultures in Cyber Conflict

The discourse in strategic culture can be traced back to over four decades ago where it incited a renewed thinking of both the origins of the concept of strategy and the strategic choices in politics.
  • Subjects: Cyber Security
  • Pages: 27
  • Words: 7451

Presenting E-Learning and Design Concepts

E-learning is the use of electronic technologies to create learning experiences (Horton, 2012). It is a broad definition of the field of using technology to deliver learning.
  • Subjects: Technology in Education
  • Pages: 15
  • Words: 1081

The Latest Cyber Defense Methods

Conversely, if the application's ability to perform specific tasks is limited, the attacker's objectives may not be fulfilled, and the scope of the damage can be minimized. As a result, it is inadvisable to remain [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1094

Cyber Vulnerabilities and Threats

It is the cyber defense specialist's task to remain aware of the latest threats and issues in security so that they can prepare for potential attacks and be ready to respond to them.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1104

Implementation of the Boston’s Smart City Concept

Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 608

Front End Web Development Job Market Reflection

The 2% of large businesses in Vancouver offer minimal growth prospects for front-end web development entry-level graduates because the experienced staff have a competitive advantage and satisfy the demand.
  • Subjects: Programming
  • Pages: 3
  • Words: 797

Interactive Tools: Types and Its Benefits

In this modern day, it is important to remain competitive. Information technology and interactive tools are some methods which one can improve the online consulting process.
  • Subjects: Applications
  • Pages: 12
  • Words: 1586

Information Age, Future, and Big Data

According to Blecker et al, the prevalence of heart failure has been on the rise despite the few reported cases of admissions and readmissions in hospitals.
  • Subjects: Data
  • Pages: 2
  • Words: 600

POD Placement Factors

The size of the population is what might affect the ability of the local emergency agencies to respond to an incident.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 313

Robotics and Artificial Intelligence in Organizations

Otherwise, cognitively complex tasks and those demanding emotional intelligence will be performed by humans, with the support of robotics and AI. Therefore, this study speaks of the importance of employee trust in AI and organization.
  • Subjects: AI
  • Pages: 7
  • Words: 2005

IPad Product and Apple’s Project Management

The iPad's project management reveals how the attention to the details and high level of requirements helped a company build a revolutionary product.
  • Subjects: Project Management
  • Pages: 2
  • Words: 663

HindSight: Direct Encoding of Personal Interaction History

Finally, the two properties which are of the most relevance to the presented research: the extent to which history is directly tied to an object or recorded separately and whether history is tied to an [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1430

Business Information System

In order to ensure that no shortfall from the individual and collective ends of the personnel involved, the British Computer Society has developed a code of conduct as a criteria for membership that defines the [...]
  • Subjects: Applications
  • Pages: 7
  • Words: 1901

Implementing Skype over Ip Phone

The paper uses decision tree calculation to do a financial analysis of the using IP phones and Skype, and then we provide an argument for using IP phones over Skype.
  • Subjects: Applications
  • Pages: 2
  • Words: 772

George Winslow: Preparing for Next-Gen HD

This is mostly the norm for recording of TV programs but the author argues that Blu-Ray offers a higher resolution of 1080p which improves the quality of the media.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 547

Electromagnetic Compatibility Testing and Its Design

The sink and the source act as radio antennae where the electromagnetic waves emanating from the source crosses the open space and is received by the sink, McFee, S and Giannacopoulos, D.
  • Subjects: Engineering
  • Pages: 3
  • Words: 988

WebEx Web Conferencing and Online Meeting Services

In common with other providers of multimedia conferencing, WebEx services can be used for any number of participants from a 1:1 to a full event conference linking many thousands of people.
  • Subjects: Applications
  • Pages: 4
  • Words: 2087

Particle Swarm Optimization: Definition

Particle swarm optimization (PSO) is an artificial intelligence (AI) or a computational method for getting solutions to problems through maximization and minimization of numeric.
  • Subjects: AI
  • Pages: 10
  • Words: 349

Proxy Fights: Definition, Factors and Implications

In a way, the phenomenon of a proxy fight can be viewed as the tool for reinforcing the strengths of the organization by creating a very strong and well-coordinated team of shareholders, who are willing [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 962

Tonya’s Chips Website Migration Project

Also, the company wants the website to be redesigned thus allowing the customers to make online orders. This can amount to losses for the company since they have to pay the host for the website [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 3010

Power Source for Rovers

When choosing suitable types of power sources for a rover, it is necessary to define environmental conditions where it is expected to operate.
  • Subjects: Engineering
  • Pages: 5
  • Words: 679

Aerospace Toxicology: Flourinert

The current knowledge about this fluid should become the foundation for completing additional experimentations and researches to discover additional health, toxicological, and safety benefits and expand its possible applications in different heat exchange systems.
  • Subjects: Engineering
  • Pages: 1
  • Words: 279

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791

Strategic Decisions in the European Automobile Market

Particularly, this is true for the European automotive market, which is affected by uncertainties regarding the legal status of trade among European nations, in the wake of the "Brexit" aftermath, and growing uncertainties regarding the [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1097

IoT Adoption and Cyber Awareness in Saudi Arabia

As the implementation of these cyber technologies penetrates the economic sector, there is a need to understand potential vulnerability for businesses to be attacked through the Internet and other networks.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 552

Role of Information Technology in the Business Sector

In this way, the author concludes that IT is powerful enough to affect the successfulness of business and its competitiveness. It is also vital to ensure that IT is aligned with the overall business goals [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 598

Malé International Airport: The Landside

The Male International Airport is the main international airport of the Republic of Maldives. This island can be found in the North Male Atoll, not far from the isle of Male, the city on which [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1165

The Dissection of the Obogs and Lox Systems

On the other hand, it is rather critical to address the pilots' ability to identify the predictors of a hypoxic environment and their skills in terms of performing a pre-flight examination of the existing systems.
  • Subjects: Aviation
  • Pages: 1
  • Words: 286

Acquiring Knowledge About Computers

One of the key features of A.I.U.'s learning platform is the use of the Gradebook. The best feature of the instant messaging tool is the fact that it is easy to install with no additional [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 1930

The Design Characteristics of an Airplane

Control defines the ability of an airplane to respond to the controlling actions of a pilot and the ability to produce the desired displacement of altitude in flight.
  • Subjects: Aviation
  • Pages: 2
  • Words: 540

Proper Water Flow Requirements

In order to ascertain the proper flow of water, standard typical sprinkler testing should be carried out on all the established water systems.
  • Subjects: Engineering
  • Pages: 2
  • Words: 565

Information Technology Metrics and Measurements

The size of the project and the kind of team to be used by the manager help in making decision as to whether the project is worth to be undertaken or not.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1276

IT Network Connectivity

Consequently, the Ethernet card is still available to internet users and can be used in the process of connecting the University's computers to their cable modem.
  • Subjects: Internet
  • Pages: 3
  • Words: 874

Technological Innovations: Importance in Manufacturing

Innovation is the principled exploitation of ideas related to knowledge of those entering the industry as well as those moving out of the industry for the purpose of hastening modernization within the company and expansion [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1000

Solar Powered Universal Charger

However, based on a thorough evaluation of a number of other options not listed here and the idea of a solar powered charger, the group settled on the design and development of a solar powered [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1385

The Flashlight Technology Description

The plastic casing of the husky flashlight consists of a 5 inch cylindrical plastic container with a very thin spring or a strip piece of metal that is used to make the electrical connections between [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 649

Coca Cola Bottling Co: Project Management

The following is how Project Solutions Group approached and implemented the project but first; the paper looks at the principles of PM. One of the most important aspects in a project is to save on [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2771

ABC Ltd.’s Automated Accounting System Project

The project involves the installation of a computerized accounting system instead of the company's IT system and accounting processes. The new system will also enable the company to reduce employee costs by lowering the number [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 2571

Automated Accounting System’s Risk Management Plan

The process of designing an automated system project is associated with a number of risks, starting from the basic probability of equipment failure to more complex issues including the threat of the wrong choice of [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 939

Information Technology Quality Management Project

So the following factors have to be considered: Cost of the Smart Phone including the future cost of maintenance, Expected output / Results nature of the job in relation to the phone, Altitude of the [...]
  • Subjects: Project Management
  • Pages: 40
  • Words: 10237

Security Components in Sporting Goods Stores

Components of security within an organization are comprised of a list of practices that can help an organization have better management of security and reduce the associated losses. The first and most important component of [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1351

Information Systems Project Selection Practice

In this method, the project selected in an array of possible projects to be mounted is the one that gives the shortest period of return on the initial investment.
  • Subjects: Project Management
  • Pages: 3
  • Words: 1142

Using Information Technology to Analyze Financial Market

The difference now is that with the wide availability of personal-use software and the wide spread of internet helped to maintain all the data needed quicker and without the need to special skills or expensive [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 1038

Mechanics of Materials, Stresses in Beams

It implies that the material near the top surface of the beam is in compression with the x-direction with the bottom surface in tension.
  • Subjects: Engineering
  • Pages: 15
  • Words: 3876

Digital Control Systems: Digital Signal Processing

The second use of the digital filters is the "signal restoration" which is needed when there is distortion of a signal due to any reason like poor equipment quality or mishandling of devices etc.in this [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1459

CCTMS LabVIEW Interface: Program Development

The functionality of this counter is as follows: The counter will start count down to zero on receiving a START trigger from CCTMS server. On reaching a value zero the counter will start counting upwards.
  • Subjects: Programming
  • Pages: 4
  • Words: 514

Operating Systems: Discussing Different Types

The failure-oblivious computing technique allows a server to concentrate on executing critical data and discard any errors detected in the program execution environment.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2040

Usability Testing and Pact Analysis Report

The PACT analysis is conducted to find the utility of the tool in the optimum resource management at a call center. The usefulness of the Call Center Traffic Monitoring System is to be measured by [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3200

DC Stepper Motors: Power Element for Control

The term hybrid is derived from the fact that the motor is operated under the combined principles of the permanent magnet and variable-reluctance stepper motors.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1432

Interoperability of Web Services

Interoperability is the felicity of a software interface working with diverse and varied software systems swiftly and at ease for providing special finesse and rhythm to web services' network and its operations.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2410

The Various Types of Aviation Pioneers

This paper explores the various types of aviation pioneers and focuses on Sir Frank Whittle by detailing his invention coupled with how it contributed to the future of aviation. In this way, it is clear [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 837

Recommender Systems: Techniques and Uses

Consumers can have access to so many items on sale over the internet and recommender systems are there to help them make the right choice or pick according to their liking after they have inputted [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1332

Project for Wireless Internet Access for Hostel (WIAH)

There has been great demand of more convenient wireless internet access by guests although internet connection is already available in the common rooms of the hostel at a reasonable fee.
  • Subjects: Project Management
  • Pages: 3
  • Words: 888

Printed Book of Technologies of Electronic Publication

According to the copyright in the United States, works first published before 1923 in the United States are in the public domain1, which means these books do not come within the purview of copyright regulations [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1249

Driver Fatigue Monitoring System: Service Design

It tracks the driver's ability to maintain a distance from the car in front of the vehicle and the ability to keep the vehicle steady in the middle of the road.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1112

Technology Acceptance Model

Hence, it is vital to understand the concepts of PEOU and PU that play the most significant roles in the analyzed model and determine its essence. TAM represents a research approach to contemplate on the [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1477

Zuhair Fayez Partnership: Project Quality Management in Practice

Project quality management is among the most challenging areas for a Project Manager because this area of expertise implies that the quality of the project's outputs remains consistent throughout the duration of the project.
  • Subjects: Project Management
  • Pages: 14
  • Words: 3914

Disinfecting Robots: Care Ethics, and Design

Thus, the utilization of this technology may be expected to reduce the incidence rate of HAIs. However, it is essential to consider the cost of this technology and reimbursement as they may be key factors [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Workforce Learning and Development in the Digital Era

One of the most important tasks facing the UAE in the field of developing the potential of the workforce to work in the public sphere is the restructuring of the training and development of specialists, [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1229

Multi-Hazard Risks in New York City

During the last decade, the need for evidence-based strategies that could be used to respond to various emergencies has increased as a result of an increase in the rate of disasters.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 585

Toolkit for Context-Aware Applications

The final challenge that has to be overcome in the design of context-aware applications as given by Coulouris, Dollimore and Kindberg is context dynamism. According to the framework, this function is carried out by the [...]
  • Subjects: Applications
  • Pages: 10
  • Words: 2911

Extensible HyperText Markup Language

The role of internet in education and business remains pivotal to the very existence of these two critical facets of life.
  • Subjects: Internet
  • Pages: 3
  • Words: 836

RAD Data Communications Company

The UDP model is another procedure that is important in the realization of networking objectives. It is one of the simplest transport procedures in networking.
  • Subjects: Project Management
  • Pages: 2
  • Words: 498

Development of Municipal Wi-Fi

Municipal Wi-Fi's are usually expensive to construct and maintain, and that is why a collaborative agreement between the private sector and the local government is necessary for the success of these services.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1252

Software Engineering Online Learning Center

However, it is not easy to tell what the website is promoting just by the look of the homepage and thus, visitors with less time might not be interested to click to the sub-sections and [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Process Virtualization Theory Overview

Therefore, the author found it appropriate to address the theoretical underpinning of IT in virtualization processes to account for the gap in the field.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1420

Aspects of Nuclear Engineering

As such, the power level is a function of the rate of fission and neutron population in a reactor. This is given by: When the ratio keff is equivalent 1 then this is referred to [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 897

Physical Security Control and Web Hosting

This paper will discuss the physical security controls that most web hosting and business continuity providers offer to their customers as well as provide examples of such providers along with their products to potential customers.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 920

Computer Museum: Personal Experience

While in the Revolution, I got a chance to see a working replica of the Atanasoff-Berry Computer, which was the first real model of a working computer.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1211

Database Management: Review of the SQL tutorial

Thus, the keyword from is used to identify the table from which the data will be retrieved, while an optional keyword where specifies the criteria which will be used for selecting the data.
  • Subjects: Data
  • Pages: 3
  • Words: 846

Problems and Opportunities Created by Having Too Much Data

An increase in the size of data generated directly increases the amount of data handled and required in different departments of the institution, company, organization or business for marketing, planning and budgeting, decision making, report [...]
  • Subjects: Data
  • Pages: 3
  • Words: 901