Tech & Engineering Essay Examples and Topics. Page 21

4,356 samples

Wave and Tidal Power Analysis

The purpose of this report is to study the use of waves and tides to generate power. The source of the energy stored by ocean waves is different from the source of the energy stored [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1517

ABC Corporation’s Security System

Negligence of the security is mostly by the security guards who fail to check and deal with employees violating the policy appropriately.
  • Subjects: Applications
  • Pages: 4
  • Words: 549

Ground-Source Heat Pump System and Its Sustainability

Their operation is based on a renewable energy technology utilized in heating or cooling spaces."This technology is dependent on the fact that the earth has the most stable temperatures, warmer than the air during winter [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2345

Software Development and Design Patterns

The iterator also has the advantage of providing a common interface to the user through the technique of returning only the elements of importance to the client.
  • Subjects: Programming
  • Pages: 2
  • Words: 628

Face Biometrics in a School: Pros and Cons

As such, the only way to gauge the efficiency and effectiveness of face biometrics in our school is by conducting a SWOT analysis of these systems.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1295

Nanophotonics and Its Applications

The fiber and the couplers are believe in charge of the conveyance of the light wave to the system optical switches.
  • Subjects: Robotics
  • Pages: 3
  • Words: 852

IPad, JooJoo, or Android: What Tablet to Choose?

The launching of Apple's Ipad led to a rush by the personal and the business users to have the gadget. It appears that the impact that the Ipad will have is nothing in comparison to [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 644

Lighting Techniques in 3D Animation

In distinction with 2D animation where every frame should be painstakingly painted and filled in with the required tints, lights, and shadows, lighting in 3D animation is performed by pointing the source of light, while [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1122

Evaluation of Software: Oracle

On the other, hand, it can be stated that for the other part of the company's business, i.e, standard production, the functionality of the suite will be sufficient to perform satisfy all the needs of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 704

Token-Based MAC Protocols: Wireless Networks

In the case of the wireless networks, the radio frequency in which the network is tuned is the only medium. The key difficulties of wireless data transmission are the encoding of the data, speed of [...]
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2448

Enterprise Resource Planning: Types and Importance

The modules include Inventory, Bill of materials, Sales orders, Manufacturing Resource Planning-MRP, Jobs, Purchasing and Accounting as in the print screen below; In the area of labour and machine requirements planning, the main functional objective [...]
  • Subjects: Applications
  • Pages: 9
  • Words: 2591

Types of the Information Systems

A company can use information system to gain competitive advantage via better organisation of data and its storage; for instance, data can be stored in the way that allows direct access to it from inside [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1380

Simulation of a Direct Detection Optical Fiber System

Meanwhile, the report will be discussing the procedures initiated during integration processes that includes the device parameters and stating all components required to make the device. Below are the procedures and the components used in [...]
  • Subjects: Programming
  • Pages: 7
  • Words: 1928

Computer Sciences Technology: Smart Clothes

In this paper we find that the smart clothes are dated back to the early 20th century and they can be attributed to the works of artists and scientists.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2648

The Tactical Throwable Robot

The main technical characteristics of the machine are given below in the table offered by Czupryniak Rafal and Trojnazki Maziej in their article "Throwable tactical robot description of construction and performed tests".
  • Subjects: Robotics
  • Pages: 4
  • Words: 1151

Transnational IT Operations

Additionally, any organization that is planning to go global would best opt for the adoption of "transnational organization" as the model for making enterprises at a multinational level The field of transnational information technology has [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1460

Impact and Types of Networks

The demerit of this kind of network is that if the server is faulty the entire network will be brought to a halt.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 713

The Terms in Online Communication Tools

E-mail client: this is a computer application that helps users to organize their e-mail since it can access the mailbox. It has rich functionality as compared to POP, since users can track the status of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 810

The Credibility of Web Pages

The first thing that justifies the reliability of a web site is the availability of detailed information concerning the person or the organization that created the website.
  • Subjects: Internet
  • Pages: 2
  • Words: 591

Willa Brown: Impact on the Aviation Industry

Through the analysis and perusal of relevant literatures, the study will in detail provide an informative and well thought out discussion as regarding to the various aspects of life as experienced by Willa Brown.
  • Subjects: Aviation
  • Pages: 10
  • Words: 3000

The Concept of Document Object Model

If the user wishes to add a book, then she must provide the title, first name and surname of all the authors, name of the publisher, and the year of publication.
  • Subjects: Programming
  • Pages: 10
  • Words: 1273

Education and Training: Conversation System

The invention of the digital computer is believed to have been the turning point of the 20th century and the facilitator for the move from the Industrial Age to the Information Age.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2582

LAN Design for Return2Fender Company

This necessitates the requirements of ensuring a network is designed to link all the offices without compromising performance for the sake of business enhancement and continuity.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1247

What Is Spatial Database?

Again, modeling has been defined as a primary element to achieve success in the deployment of the project, and this is particularly true for the management of projects based on spatial databases, such as geographical [...]
  • Subjects: Data
  • Pages: 16
  • Words: 4490

ISDN, RIP, IGRP, and OSPF on the Cisco Routers and Switches

ISDN is digitally designed in such a way so that it can allow digital voice transmissions and also data transmission through the ordinary copper wires that are used in ordinary telephone circuits and in the [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1857

Blackberry and iPhone: Exploits of Smartphones

The trends in mobile technology changed the entire concept of mobile phones and different models are entering the market. Unauthorized calls from Blackberry and iPhones have, in many cases, caused threats to the security of [...]
  • Subjects: Phones
  • Pages: 14
  • Words: 3684

Growing Use of 3D Technology in Theatres and at Home

One of the major beneficiaries of technological advances that have been made by man over the cause of the last century has been the entertainment industry which as grown exponentially through the years.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4446

Software Engineering: Data Modelling and Design

It may be physical e.g.a toy car representing a real car or it can be conceptual, only represented on paper to bring a good description of the operation of the real object."A data model is [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1210

The Overview of Information Assurance

It is necessary to establish the impacts and the degree of the risks in the group and learn which scenarios require the most attention.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 863

Autonomous Mobile Robot: GPS and Compass

The other realization is that in most instances the challenges presented in the motion of the appendages of a particular robot are not only limited to the number of joints but can significantly exceed the [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2538

Defining Data-Data Element Overview

A vendor Tracking ID is one of the specific examples of data elements used in a medical setting for the pre-requisite information that is used to define and format the data elements and validation values.
  • Subjects: Data
  • Pages: 2
  • Words: 632

Just-in-time Purchases and Extranets

On the other hand just in time purchasing is a new technology that uses information technology infrastructure to control the inventory and also the customers use the same system to make orders and also buy.
  • Subjects: Internet
  • Pages: 1
  • Words: 343

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2967

Data Integrity in Relational Databases

To ensure that there is validity and accuracy of data, a database designer should be able to select the correct primary key that reflects the requirements of the database in regard to information search, updating, [...]
  • Subjects: Data
  • Pages: 2
  • Words: 740

Fault Tolerance of an Information System

In a soft fault tolerance focus is on data security incase an eventuality that hinder general functioning of the system is witnessed.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1777

Encryption as a Key Technological Solution to Corporate Security

This encryption technique ensures confidentiality of information as only the transmitter and the recipient have access to the secret key needed to decrypt the message. According to PGP conventional encryption is both fast as well [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1519

Defamation on the Internet

One of the factors that have facilitated the increase of cyberlibel cases is the ever-increasing popularity in the use of computers and the internet.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2200

Turkey – National Transmission Grid Project

The group project was designed to investigate the internal and external macro issues in the project; in this case the selected project for analysis was the 'Turkish electricity transmission company project' for the constriction of [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1837

Krakow Energy Efficiency Project (Poland)

This paper describes the Krakow Energy Efficiency Project whose project proponent were the World Bank and the Government of Poland. The first parameter was the satisfaction of the end-user consumer with regard to the standards [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2067

The Unethical Issues That It Auditors’ Participate

When carrying out their work, IT auditors should be concerned in understanding the individual behaviors of the users of the IS and the mode of making decisions in a bid to ensure or ascertain that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1041

International Software Development Ethical Issues

The major motivation for software development outsourcing has been the ability to reduce the cost of IT projects. The high demand for software applications has led to an increase in the number of software development [...]
  • Subjects: Programming
  • Pages: 7
  • Words: 2043

Universal Serial Bus / FireWire

In hot swapping feature, the USB is directly plugged into the port of the computer and PC automatically detects the presence of the new secondary device and it also configures the required software.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2211

The Technology Today and in Future

The cell phone would be a true communications hub, connecting us all to all we want or need through a central hub, The phones would be very small and they would look like jewelry with [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1247

Mechanical Engineering Lab: Chevrolet Engine Performance

The Objective of the experiment was to determine the fuel consumption of the Chevrolet 4. Several parameters of engine performance can be measured but the main and most important test is the power test.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1865

Sakht Hamandishan Aran Company: Work Experience

In essence this report will be the summation of all that I have done in my practicum The company which I spent my three months with is called Sakht Hamandishan Aran Company, A contractor which [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1024

The Internet and Freedom of Speech: Ethics and Restrictions

Because of a lack of security technology, across the board prohibition is justified under the law, a concept that is in itself considered unlawful by a strict definition of the First Amendment of the Constitution [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1159

Mobile and PDA Technologies Use in Education

It is a fact that things have become easy with the use of technology such as the Internet or the Worldwide Web and other Information Technology features, for example, software that make it easy for [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2970

Information Security and Privacy

At the dawn of the new technology and especially in this information age, protecting the same information is very crucial to it.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2546

Current Laws and Acts That Pertain to Computer Security

Since the advent of networking of computer systems through the intranet and internet, security of data and information has always been threatened by unauthorized access, use and modification of data.
  • Subjects: Computer Security
  • Pages: 20
  • Words: 5452

Computer Network: Electronic Mail Server

In practice, the major problem of sending messages to various different email addresses is typically solved by entering a list of multiple addresses separated by comma within the "To", "BCC", or "CC" fields of the [...]
  • Subjects: Computer Science
  • Pages: 20
  • Words: 5456

The Application of a Decision Support System at Tehran University

The University of Tehran, otherwise called "Mother University", is the largest and oldest educational center of Iran. The historical data that the university needed to support the analyses, managing, and make forecasting had been buried [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 940

Global Corporation Inc.: Data Protection Policy Statement

The most primary vulnerability that the company is subjected to is the fragility of security barriers that comes with every member of the company carrying confidential data on their laptops. However, all individuals are expected [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 965

The Slick Jim’s Used Cars: Three-Phase Spreadsheet Calculator

Jim has also seized on the chance offered by the presence of RMIT students to provide the company a system that will more reliably generate reports around gross revenues, advertising costs, a schedule of insurance [...]
  • Subjects: Computer Science
  • Pages: 28
  • Words: 1540

The Technology Behind Bing Maps

Bing Maps was developed by Microsoft in response to the business threat posed by Google who also offers Google Earth Pro, for the visualization and mapping of much of the world using satellite imaging from [...]
  • Subjects: Data
  • Pages: 2
  • Words: 681

Self Assure Company: Quality Systems

Reliability of the software is one key concern; the software should be able to perform the tasks that have been formulated in the feasibility study and analysis stage. If the users of the system are [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 2858

Civil Engineering Assessment: Fire Safety in Buildings

According to the 'Review of the Building Regulations 2004: Section 2 Fire,' fire safety main aims are to ensure the protection of life, achievement of sustainable development, and assist the fire and rescue services.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2053

Security of E-Mails

As stated in the paper being analyzed, this is the latest version of S/MIME and has a number of Enhanced Security Services such as secure mailing lists that allow just one digital certificate to be [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1155

Image Based Human Pose Estimation the Survey

The methods being used for posing human inference is done with high clarity and ability to separate the subject of interests to the background in which they are.
  • Subjects: Computer Science
  • Pages: 15
  • Words: 4172

Honeypots and Honeynets in Network Security

Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of the internet.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1968

Cyber Crimes: Court – United States vs. Ancheta

Reasoning: The jury argued that the defendant conspired to violate the Computer Fraud Abuse Act as well as the CAN-SPAM Act, caused havoc to computer networks of the national defense department of the federal government, [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 548

Membrane Filtration Technology

The paper is organized into subsections including how the technology works, alternative technologies, effectiveness of the technology, management of the technology, and application of the technology.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1896

Adopting RFID Technology in Supermarkets

They occupy the central place in our framework because RFID is the tool for arrangement of successful SCM and the SC is the central issue of concern in the whole production process of any supermarket [...]
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4202

The Development Process of Web Sites

The aim of this paper is to analyze the process of web development with the assistance of Dreamweaver software, as well as analyze the technical characteristics of the equipment, which will be used for the [...]
  • Subjects: Programming
  • Pages: 6
  • Words: 1623

The Development of the Vanguard Web

After sometime, during the use of the Vanguard website, the managing director noted a problem with the employees web interface and proposed the employees use the same web interface with the customers.
  • Subjects: Programming
  • Pages: 2
  • Words: 594

The Multimodal Theme of Information Technology

This report compares the integration of the multimodal theme of information technology in the strategic, learning process and belief system of an organization in order to determine the feasibility of information technology integration in organizational [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 2005

Comparison Ontology Modeling With Other Data-Based Model

This is the organized representation of the information that the database requires including the information objects, the linkages in between the information objects and the guidelines that are used in the running of the relevant [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2172

Upgrades Using Project Management Techniques

To begin with, it should be stated that the concepts of network security and information security are similar, and they are often used interchangeably.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 516

Employee IT User Acceptable Policy

That is why the policy of the company is according to the usage of informational technologies and assets which they encompass.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1119

The Branch of Well Engineering

Lawndirt illustrates that "In a June 4th, article, reported "that Petroleum Engineering was the 24th best paying job in the United States" Well engineering is on the other hand is the profession in petroleum engineering [...]
  • Subjects: Engineering
  • Pages: 5
  • Words: 1346

Multi-Touch Touch Screen Controls in Military Aircraft

The attitude indicator is in the centre of the top row, the Airspeed indicator is to the left, the altimeter on the right, and the gyrocompass or heading indicator in the centre of the second [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1338

The Internet is a Democratic Technology

As opposed to what in the media channels of communication where the information let out to the public is filtered and influenced by what the government want the people to know, the Internet is free [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 890

Low-Cost Carriers and Secondary Airports

LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
  • Subjects: Aviation
  • Pages: 2
  • Words: 929

How to Use Speech Recognition Program

The objective of the paper is to provide insightful research on how to make use of the Microsoft speech recognition engine.
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Implementing Management Software System Using SDLC

The feasibility will involve the identification of the expected costs that will be needed to complete the project. Planning: At this phase, we will need to develop a planning phase for the project.
  • Subjects: Applications
  • Pages: 2
  • Words: 673

WorkShop Report: Client-Server Technology Bco-5502

However, on the framework of TCP/IP configuration, it is possible to locate the IP name resolution under the parameters of the NetBIOS resolution and with the use of the Windows NT 4.0.
  • Subjects: Programming
  • Pages: 8
  • Words: 2212

The Measure technological Progress

For example, during the savagery era the discovery of fire, the use of the bow, and the development of pottery can be seen as some of the indicators of advancement and these inventions can then [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1404

Information Security in Company’s Financial Operations

According to findings of a research published by Symantec "2009 Storage and Security in SMBs survey", despite the awareness of small and medium businesses of cyber risks and the existence of firm goals regarding security [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1204

Identifying a Power Plant Problem

Having carried out the requested inspection of the power plant of the Baldur Agricultural Chemicals Company in Gordontown, 1450 Disraeli Crescent, I have found out the following issues that might cause the issues of the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1089

A Unique Bag with the Sun Inside

So, the unique sun bag is the best variant of power during the traveling to the uninhabited places, moreover, it is going to be not so expensive, small, easy to fix and very useful.
  • Subjects: Engineering
  • Pages: 2
  • Words: 552

Information Security for “Astra-World”

In that regard, our company -"IS Consulting", provides a full complex of services of information protection and a wide spectrum of solutions for the provision of the security of the information systems of any difficulty.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2224

Clubs’ Relationship With Fans and Internet

Despite this great implication of the internet on the sports industry, some critics in the football world have argued that the contribution of the internet in the formation of a strong relationship between clubs and [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2966

Industrial Communication Protocol

To give response to the users the suppliers are using the processors for improving the functions. It is a communication network planned for industrial environment and time critical applications.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2642

Characteristics of the Web 3.0

Additionally, it might be argued whether the new addition, in terms of metadata, is worthy of a new number in the web 3.
  • Subjects: Internet
  • Pages: 2
  • Words: 621

Data Communication and Management Issues

Because it operates at the data-link and network layers, it can be implemented as a basis network that offers services to a standard that has a network layer.3.
  • Subjects: Data
  • Pages: 2
  • Words: 890

Analogue to Digital Sound Effect Processor

Nonetheless, unlike analog documentation that is importantly dependent on the long term durability of the fidelity of waveforms documented on the standard, the tangible standard stockpiling digital samples is fundamentally immaterial in replaying of the [...]
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5052

MilkChurn Firm’s Security Policy

The objective of this policy is to provide the management of the firm a sense of direction to help the smooth performance of essential information security.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4212