Tech & Engineering Essay Examples and Topics. Page 20
The twisted-pair cable is used in the given diagram, which is considered the most common type of cabling for LAN. In the given Network Diagram, the unshielded twisted-pair cable is used.
Clean –agent extinguishing systems are important in high-value resource centers that contain resources such as telecommunication equipment and data storage system.
The torpedo could travel hundreds of meters while maintaining underwater depth due to its pressurization system known as 'The Secret.' The Secret was a combination of hydrostatic and pendulum that gave the hydroplane stability to [...]
A lack of interest in the technology from managers shows that the UAE has no intentions to adopt artificial intelligence. Leaders who are willing to prioritize learning about artificial intelligence are in a better position [...]
Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
As the second criteria, the authors used information on how close the sampled probability distribution was to the specified distribution as a measure for the errors of the sampling algorithms. The new class of algorithms [...]
Hengstler et al.suggest that the best approach to take in enhancing trust in the use of AI is viewing the relationship between the company and the technology from a human social interaction perspective.
The users can sign in their accounts and transact to another user and the blockchain records the transaction which is viewed by other users. It is difficult to collect taxes and trace malicious activities in [...]
Overall, the study aims to investigate the impact of predictive analytics by assessing inventory, sales, and customer data of a small business.
Three excellent data practices are confidentiality, availability, and integrity: Confidentiality refers to the protection of confidential data by restricting access to it for those who have been trusted. The COBIT arrangement includes contractual contracts in [...]
Nevertheless, despite the wide range of suggested measures, not all of them fully reveal and solve the shortcomings of the security system.
This report reviews the overall technical design of the Delta Glider Plane in detail in terms of the applicability of the aerodynamic models and the purpose of the electronic components of the overall system.
In this research, it is important to discuss advantages and disadvantages of fracking with the focus on consequences for the environment and suggest approaches to addressing negative effects of using this technology.
Therefore, we will discuss on how to create an email address using a Google account and using that email address to create a Facebook account and store data using the two accounts. We need to [...]
Second, the exploration of human factors in the framework of cyber-security can assist in resolving the issues of understanding a defender's cognitive state, possibilities for automation, and an attacker's subjective traits.
The key goal of the presentation is to determine whether the modifications can be introduced to the technology used in the classroom.
The project manager will have the overall responsibility of assigning roles to ensure that all aspects of the project are on schedule for the dinner party.
Drones improve the psychological wellbeing of soldiers because they eliminate the trauma and stress of engaging in war.
A federated architecture can also enhance security by overcoming the security risk posed by the heterogeneity of IoT devices and protocols.
Overall, the budgeting manager app will help Nick understand his expenses, determine what items he spends the most money on and plan his expenses a month ahead. The use of a budgeting manager app will [...]
The primary problem in this research is the insecurity in the online voting system due to the increase of cybercrimes. It is essential to comprehend the related dangers as political up-and-comers progressively go to the [...]
The development of the electronic vaccination and the testing app would positively affect the strategies to control the COVID-19 pandemic while also enhancing the economic restoration.
The necessity to introduce technology to urban schools is urgent to prepare students for modern demands of technologically advanced workplaces.
A prototype of an autonomous un-guided vehicle designed on the basis of Himoto Rock Crawler RCF-8 chassis was created to test its capabilities in various environments.
Examples of cloud platforms are Open Stack and Own Cloud; each have different applications and limitations in the Cloud computing realm.
The region and the use of the car will guide the owner on the required level of protection. The ballistic level of protection depends on the owner of the vehicle's requirements.
Even though it might not be a lawfully binding text, stakeholders append their signs in the prepared charter as a show of expression of commitment and support to the ongoing project.
The central argument of this discussion is that advances in technology such as online dating sites, social media, emails, and instant messaging have enabled people to develop, manage, and enhance romantic relationships.
Automated drones fitted with spraying features are used in the monitoring of agricultural processes and crops to schedule tasks and expeditiously address the observed issues throughout plant life.
The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
The overall view of the water quality index of the present study area revealed that most of the study area with > 50 standard rating of water quality index exhibited poor, very poor and unfit [...]
The development of interest in the subject will be greatly enhanced if there is a close partnership between the animators and teachers in designing the desired syllabus with the acquaintance of the tools of animation.
This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
The failure mode for SS-FMEA is thus represented as a violation of logical relations in the combination of elements that are specific for each system.
The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
Network safety, regardless of the company size, is one of the most important things to remember when operating over the Web, local area network or other technologies.
The importance that technologies have for new generations has long been discovered, and the consequences are still being discussed.
Such plan or strategy represents a list of steps, which should be immediately taken in case of a cyber-attack to limit the potential damage and reduce expenses.
It can be used to set the degree of influence of independent variables on the dependent ones. Before proceeding to the analysis of data, it is vital to identify the variables.
The two selected cloud providers are Amazon Web Services and Microsoft Azure, which are in the top 5 largest providers in the United States.
The field of Artificial intelligence is one of the newest areas in science and engineering. When explained in terms of thinking critically, AI is the desired outcome of human effort to make computers think, portrayed [...]
Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
For instance, contemporary concerns about global warming and the 'carbon footprint' of the UK power industry virtually dictate official attention to matters of fuel in use and the national volume of electricity consumption.
This opportunity assessment is about the potential opportunities in the field of remanufacturing the laser toner industry in the USA. That is, the cartridges are designed to carry toners.
Relative to this fact, Mukhopadhyay et al.say that the uptake of technology and the prominence of the Internet of Things, which is a network of objects that communicate with each other, has increasingly exposed companies [...]
In project management, the project initiation document is crucial as it outlines the project's scope, power, and criteria to measure the project's success. A project is said to be successful if the aim for its [...]
Infusion of funds from the central bank during natural disasters results in higher process of exports as a direct result of an increase in the value of the local currency.
It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
At the moment, it develops even faster; however, one of the crucial factor for this development was the transition from the acoustic to the electric recording.
By definition, packet sniffing is the process of gathering data packets passing through a particular network for analysis, regardless of how the packets are addressed.
The process goes through five stages: the discovery of what is required by the user, the analysis, designing and prototyping, and, finally, the implementation.
The study will focus on examining the resilience of Austria to the threat of cyber-attack. The significance of the study will help in contributing to the literature about cybercrime and ways to respond to the [...]
In the third stage, with the advent of the Internet, PC, and multiple interactive devices, the focus was shifted to the perception of the mechanism as an autopoietic system in a social setting.
Various aspects can be analyzed concerning cyberterrorism, competing factors, and possible course of actions in corporations to show that cyberterrorism is a legitimate option for the expression of grievances by terrorists.
The power supplier provides technology and software, while the energy company offers the infrastructure to implement the project. A major risk that the APP project is exposed to is cyber-attack.
To begin with, in the modern world, it is crucial to come up with newer models of education and extend the existing approaches.
The building of the Vasa Ship construction exposed the project to several risks leading to the vessel's capsizing. The king authorized the craft's launch despite previously identified stability challenges, and the ship capsized in front [...]
The right to privacy and confidentiality of correspondence is a constitutional right, and violation of this jeopardizes the law. Thus, access to confidential information should be provided to law enforcement agencies only in case of [...]
One of the areas that Google invests in and promotes is self-driving automobiles. The company is working with the Renewable Energy Buyers Alliance to promote legislative changes that simplify corporate procurement of wind and solar [...]
This study is aimed at identifying both positive and negative influences of computer technologies on the human resources who work in offices.
For instance, the tool can collect data on what a customer has chosen and predict what they may want to buy. No traditional data collection method can be that effective in the gathering of customer [...]
Internet explorer is available with the Microsoft operating systems interfaces. There are various important components on the example of an internet files window.
A virtual instructor can improve online education experiences, and this presentation will demonstrate this fact.
To begin with, AI is defined by Nilsson as a field of computer science that attempts to enhance the level of intelligence of computer systems.
The purpose of purpose of RDMS is to serve as an effective tool for R&S Entertainment in launching online business, the system will improve R&S inventory, and its financial records using RDMS.
As the research states, telecommuting generally allows people to work from home, which reduces office space and, as a result, the expenses associated with the operating costs and the amount of energy use.
It is important to have a disaster preparedness program for your family. This will reduce the impact on your family’s lives and ensure faster recovery.
Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
Therefore, the study is meant to determine and evaluate consumer susceptibility to e-banking victimization through phishing attacks. Subsequently, the study will be designed to evaluate the effectiveness of phishing victimization training to E-banking consumers.
The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
The following are the dangers of logic and artificial intelligence when applied in various areas. The last danger of logic and artificial intelligence relates to autonomous weapons.
When computers were new, very few people were conversant with them, and their use was limited to a few organizations which could afford them.
The content will be piloted in one of the high schools, in order to use the teachers as trainers for a reaching more schools with the same methodology.
The impacts on these organisations vary considerably depending on the type of crisis, the severity of the crisis and the way in which the organisation has planned for, and responded to the crisis.
Of course, there are cons associated with deep fake technology; its core concept is to create a fake so good that it can be considered authentic.
Nevertheless, some of the technologies used by police and other agencies have raised concerns of the public over the threat to citizens' rights and freedoms.
The major function of community resources is informing the people living in New Orleans about upcoming storms and hurricanes.
Architecture Reference for Cooperative & Intelligent Transportation terms the protocol stacks as solutions and consists of a collection of standards to regulate the communication process.
The problem of the possible rejection of human labor in a number of jobs is complicated by the fact that the field of robotics does not stand still and is constantly being improved.
Many people have gained access to computer systems, the Internet, and related products and services, leading to the emergence of cyber-related threats. Cybersecurity improvements are vital to the continuous developments in information technology, national security, [...]
Therefore, the increasing number of attacks during the pandemic could be handled with the help of machine learning and have the numerous human workers assigned to less crucial tasks that actually require human judgment.
This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
Daily and globally, there are many aviation operations affected by weather including incidents and accidents Kenya has its own share of aviation accidents.
The criteria of selection for the literature will be the relevance to the research topic as well as the year of publication.
However, considering the bending stress of the RHS element, and the sizes of CHS, the loads will be mainly concentrated in the place of RHS and CHS contact, and the square of the contiguity will [...]
The SolarWinds cyber-raid is described as the most sophisticated and the most significant assault in the world. The vulnerabilities in SolarWind and its customers, such as Microsoft can lead to the loss of millions to [...]
The report has produced the following problem statement: Improving mobile and Internet coverage in the remote territories of the Cape York region.
The innovativeness of the company ensured that it improved its performance and would survive any eventuality, from the 2008 financial crisis to the COVID-19 pandemic crisis. In conclusion, proper management of organizational change is critical [...]
One of the tools for reducing the level of greenhouse gas emissions is the development of nuclear energy, which is characterized by a high degree of environmental efficiency and the absence of a significant impact [...]
The purpose of this undeniably ambitious project is to make major changes to the social and technological environment of Dubai.
During the database design, it is not possible to delete the primary key fields in the datasheet view until one changes to the design view, since the primary key represents a unique identification field of [...]
The purpose of this paper is to develop a set of strategies that would enable a fire service to reduce the number of accidents involving its vehicles.
The discourse in strategic culture can be traced back to over four decades ago where it incited a renewed thinking of both the origins of the concept of strategy and the strategic choices in politics.
The gaming industry overpowers both the music and cinema industries and is considered one of the fastest-growing economic sectors globally video games are becoming a predominant human activity.
E-learning is the use of electronic technologies to create learning experiences (Horton, 2012). It is a broad definition of the field of using technology to deliver learning.
The topic of this research proposal is investigating the strategies used by organizations to combat identity theft by hackers and enhance cybersecurity in critical infrastructure.
Conversely, if the application's ability to perform specific tasks is limited, the attacker's objectives may not be fulfilled, and the scope of the damage can be minimized. As a result, it is inadvisable to remain [...]
It is the cyber defense specialist's task to remain aware of the latest threats and issues in security so that they can prepare for potential attacks and be ready to respond to them.
Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
Relative to this fact, Mukhopadhyay et al.say that the uptake of technology and the prominence of the Internet of Things, which is a network of objects that communicate with each other, has increasingly exposed companies [...]
The 2% of large businesses in Vancouver offer minimal growth prospects for front-end web development entry-level graduates because the experienced staff have a competitive advantage and satisfy the demand.
This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
According to Blecker et al, the prevalence of heart failure has been on the rise despite the few reported cases of admissions and readmissions in hospitals.
The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
At that point, the association retrained a portion of the laborers as experts, software engineers, and support workforce for the robots.
As shown below, the first step in the project was the development of a plan on how the system was to be developed.
Even though people are aware of the problem and consider it to be serious, almost nothing is done to prevent the appearance of the problem.
The size of the population is what might affect the ability of the local emergency agencies to respond to an incident.
Otherwise, cognitively complex tasks and those demanding emotional intelligence will be performed by humans, with the support of robotics and AI. Therefore, this study speaks of the importance of employee trust in AI and organization.
The catastrophic consequences of the devastation in Central Texas and, in particular, in the city of Austin, were caused by flooding.
Richards highlights the government's leading role in the context of cyber threats while stating that the number of attacks is still on the increase.
The iPad's project management reveals how the attention to the details and high level of requirements helped a company build a revolutionary product.
Finally, the two properties which are of the most relevance to the presented research: the extent to which history is directly tied to an object or recorded separately and whether history is tied to an [...]
In order to ensure that no shortfall from the individual and collective ends of the personnel involved, the British Computer Society has developed a code of conduct as a criteria for membership that defines the [...]
The paper uses decision tree calculation to do a financial analysis of the using IP phones and Skype, and then we provide an argument for using IP phones over Skype.
This is mostly the norm for recording of TV programs but the author argues that Blu-Ray offers a higher resolution of 1080p which improves the quality of the media.
The sink and the source act as radio antennae where the electromagnetic waves emanating from the source crosses the open space and is received by the sink, McFee, S and Giannacopoulos, D.
In common with other providers of multimedia conferencing, WebEx services can be used for any number of participants from a 1:1 to a full event conference linking many thousands of people.
The reason foe switching off of the pumps was that the pump drew water from the sea and had long pipes with blowers to such in the seawater.
Particle swarm optimization (PSO) is an artificial intelligence (AI) or a computational method for getting solutions to problems through maximization and minimization of numeric.