Tech & Engineering Essay Examples and Topics. Page 22

4,325 samples

ISDN, RIP, IGRP, and OSPF on the Cisco Routers and Switches

ISDN is digitally designed in such a way so that it can allow digital voice transmissions and also data transmission through the ordinary copper wires that are used in ordinary telephone circuits and in the [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1857

Blackberry and iPhone: Exploits of Smartphones

The trends in mobile technology changed the entire concept of mobile phones and different models are entering the market. Unauthorized calls from Blackberry and iPhones have, in many cases, caused threats to the security of [...]
  • Subjects: Phones
  • Pages: 14
  • Words: 3684

Using Robots in the Medical Industry

Third, the robot surgery further has been observed to increase comfort on the part of the patient as the surgery proceeds, and this results from ergonomic position that the robot assumes as the operation proceeds.
  • Subjects: Robotics
  • Pages: 3
  • Words: 990

Software Engineering: Data Modelling and Design

It may be physical e.g.a toy car representing a real car or it can be conceptual, only represented on paper to bring a good description of the operation of the real object."A data model is [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1210

The Overview of Information Assurance

It is necessary to establish the impacts and the degree of the risks in the group and learn which scenarios require the most attention.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 863

Defining Data-Data Element Overview

A vendor Tracking ID is one of the specific examples of data elements used in a medical setting for the pre-requisite information that is used to define and format the data elements and validation values.
  • Subjects: Data
  • Pages: 2
  • Words: 632

Just-in-time Purchases and Extranets

On the other hand just in time purchasing is a new technology that uses information technology infrastructure to control the inventory and also the customers use the same system to make orders and also buy.
  • Subjects: Internet
  • Pages: 1
  • Words: 343

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2967

Simply Accounting vs. QuickBooks: Comparison of Programs

This paper makes a comparison of the accounting software, Simply Accounting with QuickBooks and Both Simply Accounting and QuickBooks share many common features; but for the selection of a particular accounting software program, it is [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 1461

Security Solutions for MANETs

The main aims and objectives of this research are to provide a solution for MANET networks in order to have secure communication between the source and destination.
  • Subjects: Cyber Security
  • Pages: 18
  • Words: 5014

Data Integrity in Relational Databases

To ensure that there is validity and accuracy of data, a database designer should be able to select the correct primary key that reflects the requirements of the database in regard to information search, updating, [...]
  • Subjects: Data
  • Pages: 2
  • Words: 740

Computer Control System in a Laboratory Setting

In this case the iControl system is designed to control and monitor temperature variables of a hazardous liquid within a laboratory environment as well as other parameters such as smoke and light.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 786

Fault Tolerance of an Information System

In a soft fault tolerance focus is on data security incase an eventuality that hinder general functioning of the system is witnessed.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1777

Encryption as a Key Technological Solution to Corporate Security

This encryption technique ensures confidentiality of information as only the transmitter and the recipient have access to the secret key needed to decrypt the message. According to PGP conventional encryption is both fast as well [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1519

Defamation on the Internet

One of the factors that have facilitated the increase of cyberlibel cases is the ever-increasing popularity in the use of computers and the internet.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2200

Turkey – National Transmission Grid Project

The group project was designed to investigate the internal and external macro issues in the project; in this case the selected project for analysis was the 'Turkish electricity transmission company project' for the constriction of [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1837

Krakow Energy Efficiency Project (Poland)

This paper describes the Krakow Energy Efficiency Project whose project proponent were the World Bank and the Government of Poland. The first parameter was the satisfaction of the end-user consumer with regard to the standards [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2067

The Unethical Issues That It Auditors’ Participate

When carrying out their work, IT auditors should be concerned in understanding the individual behaviors of the users of the IS and the mode of making decisions in a bid to ensure or ascertain that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1041

The Issue of Poor Data Quality

Many organizations suffer from the problem of poor data quality and the result of this is huge overheads and expenses, which can lead to losses in an organization.
  • Subjects: Data
  • Pages: 2
  • Words: 639

International Software Development Ethical Issues

The major motivation for software development outsourcing has been the ability to reduce the cost of IT projects. The high demand for software applications has led to an increase in the number of software development [...]
  • Subjects: Programming
  • Pages: 7
  • Words: 2043

Universal Serial Bus / FireWire

In hot swapping feature, the USB is directly plugged into the port of the computer and PC automatically detects the presence of the new secondary device and it also configures the required software.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2211

The Technology Today and in Future

The cell phone would be a true communications hub, connecting us all to all we want or need through a central hub, The phones would be very small and they would look like jewelry with [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1247

Mechanical Engineering Lab: Chevrolet Engine Performance

The Objective of the experiment was to determine the fuel consumption of the Chevrolet 4. Several parameters of engine performance can be measured but the main and most important test is the power test.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1865

Sakht Hamandishan Aran Company: Work Experience

In essence this report will be the summation of all that I have done in my practicum The company which I spent my three months with is called Sakht Hamandishan Aran Company, A contractor which [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1024

The Internet and Freedom of Speech: Ethics and Restrictions

Because of a lack of security technology, across the board prohibition is justified under the law, a concept that is in itself considered unlawful by a strict definition of the First Amendment of the Constitution [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1159

Current Laws and Acts That Pertain to Computer Security

Since the advent of networking of computer systems through the intranet and internet, security of data and information has always been threatened by unauthorized access, use and modification of data.
  • Subjects: Computer Security
  • Pages: 20
  • Words: 5452

Computer Network: Electronic Mail Server

In practice, the major problem of sending messages to various different email addresses is typically solved by entering a list of multiple addresses separated by comma within the "To", "BCC", or "CC" fields of the [...]
  • Subjects: Computer Science
  • Pages: 20
  • Words: 5456

Global Corporation Inc.: Data Protection Policy Statement

The most primary vulnerability that the company is subjected to is the fragility of security barriers that comes with every member of the company carrying confidential data on their laptops. However, all individuals are expected [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 965

The Slick Jim’s Used Cars: Three-Phase Spreadsheet Calculator

Jim has also seized on the chance offered by the presence of RMIT students to provide the company a system that will more reliably generate reports around gross revenues, advertising costs, a schedule of insurance [...]
  • Subjects: Computer Science
  • Pages: 28
  • Words: 1540

Self Assure Company: Quality Systems

Reliability of the software is one key concern; the software should be able to perform the tasks that have been formulated in the feasibility study and analysis stage. If the users of the system are [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 2858

Tenerife Plane Crash

The whole chain of events contributed into this disaster; they ranged from bad weather, human errors, fatigue, and impatience to the lack of communication between the captain and the crewmembers in the case with KLM [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 638

Civil Engineering Assessment: Fire Safety in Buildings

According to the 'Review of the Building Regulations 2004: Section 2 Fire,' fire safety main aims are to ensure the protection of life, achievement of sustainable development, and assist the fire and rescue services.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2053

Security of E-Mails

As stated in the paper being analyzed, this is the latest version of S/MIME and has a number of Enhanced Security Services such as secure mailing lists that allow just one digital certificate to be [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1155

Image Based Human Pose Estimation the Survey

The methods being used for posing human inference is done with high clarity and ability to separate the subject of interests to the background in which they are.
  • Subjects: Computer Science
  • Pages: 15
  • Words: 4172

Membrane Filtration Technology

The paper is organized into subsections including how the technology works, alternative technologies, effectiveness of the technology, management of the technology, and application of the technology.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1896

The Development Process of Web Sites

The aim of this paper is to analyze the process of web development with the assistance of Dreamweaver software, as well as analyze the technical characteristics of the equipment, which will be used for the [...]
  • Subjects: Programming
  • Pages: 6
  • Words: 1623

The Multimodal Theme of Information Technology

This report compares the integration of the multimodal theme of information technology in the strategic, learning process and belief system of an organization in order to determine the feasibility of information technology integration in organizational [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 2005

Comparison Ontology Modeling With Other Data-Based Model

This is the organized representation of the information that the database requires including the information objects, the linkages in between the information objects and the guidelines that are used in the running of the relevant [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2172

Viruses and Worms in Computers

To prevent the spread of viruses and worms, there are certain precautionary measures that can be taken. With the correct measures and prevention, the spread of online viruses and worms can be controlled to a [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 521

Employee IT User Acceptable Policy

That is why the policy of the company is according to the usage of informational technologies and assets which they encompass.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1119

Multi-Touch Touch Screen Controls in Military Aircraft

The attitude indicator is in the centre of the top row, the Airspeed indicator is to the left, the altimeter on the right, and the gyrocompass or heading indicator in the centre of the second [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1338

How to Use Speech Recognition Program

The objective of the paper is to provide insightful research on how to make use of the Microsoft speech recognition engine.
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Implementing Management Software System Using SDLC

The feasibility will involve the identification of the expected costs that will be needed to complete the project. Planning: At this phase, we will need to develop a planning phase for the project.
  • Subjects: Applications
  • Pages: 2
  • Words: 673

Life, Achievement, and Legacy to Computer Systems of Alan Turing

Turing was quite influential in computer science development, in addition to setting the framework for the formalization of the algorithm concept, in addition to the use of the Turing machine that he developed, for computation.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 536

WorkShop Report: Client-Server Technology Bco-5502

However, on the framework of TCP/IP configuration, it is possible to locate the IP name resolution under the parameters of the NetBIOS resolution and with the use of the Windows NT 4.0.
  • Subjects: Programming
  • Pages: 8
  • Words: 2212

The Measure technological Progress

For example, during the savagery era the discovery of fire, the use of the bow, and the development of pottery can be seen as some of the indicators of advancement and these inventions can then [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1404

SAP Software Solutions Systems

The role of a Basis Administrator in an organization implementing an R/3 system is crucial as it is the Basis Administrator who runs the system, introduces it to the organization and all its employees, provides [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2318

Information Security in Company’s Financial Operations

According to findings of a research published by Symantec "2009 Storage and Security in SMBs survey", despite the awareness of small and medium businesses of cyber risks and the existence of firm goals regarding security [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1204

Identifying a Power Plant Problem

Having carried out the requested inspection of the power plant of the Baldur Agricultural Chemicals Company in Gordontown, 1450 Disraeli Crescent, I have found out the following issues that might cause the issues of the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1089

A Unique Bag with the Sun Inside

So, the unique sun bag is the best variant of power during the traveling to the uninhabited places, moreover, it is going to be not so expensive, small, easy to fix and very useful.
  • Subjects: Engineering
  • Pages: 2
  • Words: 552

Information Security for “Astra-World”

In that regard, our company -"IS Consulting", provides a full complex of services of information protection and a wide spectrum of solutions for the provision of the security of the information systems of any difficulty.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2224

Clubs’ Relationship With Fans and Internet

Despite this great implication of the internet on the sports industry, some critics in the football world have argued that the contribution of the internet in the formation of a strong relationship between clubs and [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2966

Industrial Communication Protocol

To give response to the users the suppliers are using the processors for improving the functions. It is a communication network planned for industrial environment and time critical applications.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2642

Characteristics of the Web 3.0

Additionally, it might be argued whether the new addition, in terms of metadata, is worthy of a new number in the web 3.
  • Subjects: Internet
  • Pages: 2
  • Words: 621

Gas Turbine Engines’ Principles of Work

The same principle is used in aircraft but the major difference is the thrust is used to turn the blades of a propeller which pushes the plane forward. The ignition of the air-fuel mixture is [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 624

Data Communication and Management Issues

Because it operates at the data-link and network layers, it can be implemented as a basis network that offers services to a standard that has a network layer.3.
  • Subjects: Data
  • Pages: 2
  • Words: 890

Analogue to Digital Sound Effect Processor

Nonetheless, unlike analog documentation that is importantly dependent on the long term durability of the fidelity of waveforms documented on the standard, the tangible standard stockpiling digital samples is fundamentally immaterial in replaying of the [...]
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5052

Extensible Business Reporting Language (XBRL)

The important factors using XBRL as the efficiency of the process, simplicity of information and the important cost savings come together with distribution and analysis.
  • Subjects: Data
  • Pages: 6
  • Words: 1579

MilkChurn Firm’s Security Policy

The objective of this policy is to provide the management of the firm a sense of direction to help the smooth performance of essential information security.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4212

Global System for Mobile Communication

According to the International Engineering Consortium, the three functional components or systems that constitute the GSM architecture are: the network and switching system, the base station system, and the operation and support system.
  • Subjects: Phones
  • Pages: 2
  • Words: 634

Fixed-Base Operators in the Aviation Industry

Most of the business conducted within the airdrome environs as well as those that require a straight linkage to an airdrome in order to subsist yet their chief commerce is not associated to aviation.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2216

Network Admission Control

The factors over which the networks can be categorized include the size of a network, the complexity of a network, a distance of a network, security of a network, access of a network and how [...]
  • Subjects: Computer Security
  • Pages: 14
  • Words: 3623

Moral Issues Surrounding the Hacking of Emails

The devises to enter into another people's email and steal information in the email is called Email Hacking. It should noted that stealing of valuable information through email hacking has become a phenomenon in both [...]
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 2896

Provide Energy From Fusion Analysis

Energy conversion, for instance, is a foundational activity that is very critical in mechanical engineering now and even in the past."At first it was the steam engines, then a graduation to internal combustion systems of [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1580

Introduction to Legal Technology

According to the facts presented in this case, Paul Jones was the first person to make contact with the attorney concerning his intention to divorce his wife.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1106

Information Technology System

Some important reasons for the IT projects failure in United Kingdom are From the above illustrated diagram it is clear that for the failure of an IT Project there are many reasons. Lack of skilled [...]
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2961

Analog to Digital Sound Processor

Variations in human voice pitch and tone affect a lot in the functionality of Analogue to digital converter. Generally, analog to the digital processor is used to convert the analog voltage or current in to [...]
  • Subjects: Other Technology
  • Pages: 25
  • Words: 6090

Computer Problems

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1056

IT Security: The Problems Analysis

A major problem like Hacking for IT and its related fields is hazardous to the security of organizational secrets since if a person can gain access to confidential information, that information can be used for [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 666

Windows Vista vs. Windows XP

The new Windows Vista is highly recommended and it is mainly useful for a medium-sized information-service company and it rates higher than the current Windows XP for a number of reasons.
  • Subjects: Internet
  • Pages: 3
  • Words: 837

Advantages of Voice Over IP Technology

This can be transferred to the information technology staff that is more skilled in using it. The company will also be able to intensify its business activities in the internet through this technology that allows [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1152

Comparison of Privacy and Security Policies

Beth permits occasional and limited personal use of information technology resources subject to the condition that such use does not interfere with the user's or any other user's work performance and result in the violation [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 505

Information Needs and Data Inputs, Processes and Outputs

In order to improve the communication among the healthcare team members, it is imperative that the processes are converted into value-added processes so that the information inputs can be converted into valuable outputs that help [...]
  • Subjects: Data
  • Pages: 2
  • Words: 623

The Fire Protection Services

Occupational safety of buildings is one of the most challenging phenomena in the modern world take for example the recent fire at twin world center caused by a terrorist act of hijacking airplanes and destroyed [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2737

China and the Internet: Assessment of the Situation

The Chinese government is posing problems in terms of privacy and secrecy for the people of China in terms of internet access. The form of government in China is of communist nature and people are [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 555

The Pros and Cons of Implementing the Main GCP Principles

The purpose of the principles of GCP is to ensure that these trials remain with the required ethical standards and the results come from the scientific inquiry that upholds the standards of quality, irrespective of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 841

PGP Encryption System as a Good Idea

It is of great significance to the organizations because PGP allows the sender to send a single encrypted message to various recipients.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 1020

Microsoft Power Point: Program Review

The latest version of the Microsoft Office system program is a 32-bit application and can run on a Windows 64-bit platform.
  • Subjects: Programming
  • Pages: 2
  • Words: 749

Advent of Information Technology in Business

This article also talks about the need to tie together the bonds of a business manager and an IT manager. Based on this article and the analysis I have made, I personally believe that each [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Cybercrime and Legislation Margin

Originally, there are several types of cybercrimes: Against persons Against Business and Non-business organizations Crime targeting the government The fact is that all the three types are described in the legislation, nevertheless, it should be [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 512

Hackers’ Role as Information Security Guardians

This article points out the fact that information technology has enabled increased efficiency, increased effectiveness, and an increased amount of IT-enabled processes within the personal and industrial fields.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1966

XO Laptop Version 2.0 Analysis

The main consideration, represented in the article is associated with the fact, that the new model of laptops for children is a very successful and highly potential solution of the educational issues, and the maters [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1063

Engineering: Engineering Disaster Analysis

The collapse of Schoharie Creek Bridge in 1987 was as a result of error in the engineering design, and one of the major causes of the collapse of the Schoharie Creek Bridge was the excessive [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2454

Telecommunications Design Project: From 1G to 3G

The initial activity for this communication system is the installation of a suitable number of base stations to be put up into operation to form a network The report covers the different aspects in location [...]
  • Subjects: Other Technology
  • Pages: 27
  • Words: 7185

Video Distribution Systems

The decoding of the various distributions of streams is accomplished through the use of a Windows media player, thereby enabling the users to not only watch these streams, but also listen to them.
  • Subjects: Programming
  • Pages: 2
  • Words: 691

Social Media Within Academic Library Environment

The main focus of these web pages is interactive information sharing among users, user centered design of the page that can be modified and edited by the user and whatever changes are made to the [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 3102

Comparison UML and Modelscope

The main objective of library system implementation is to support the readers as well as the management in the process of borrowing and reserving books.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1043

The Monitor Convergence and the Television Consumption

Explain what those are used for, history on what development on TV and monitor and how the 2 have in common and how they are different The monitor and the television are both viewing devices [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1366

Kinds of IP-Servers and Their Characteristics

The IP addresses allocation in the new IT infrastructure model for Acme is based on the guidelines and policies of the IANA and ARIN in relation to IP addresses allocation as well as the routing [...]
  • Subjects: Internet
  • Pages: 20
  • Words: 1751

Automation of Accounting and Monitoring Procedures

Therefore, the integration of IT into auditing functions contributes to the promptness in transactions' ascertainment processes and the validation of the accounting and financial information prepared from relevant records.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 913

Are Internet and Google Making Us Stupid?

In the past, people used to do their research in libraries and labs, but nowadays, with the advent of the internet, Google has become an easy source of information for almost all questions.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 391

Daily Workouts App Evaluation

I will be discussing the free version in terms of the features which it has to offer, the functions of the app, and its overall convenience.
  • Subjects: Applications
  • Pages: 3
  • Words: 873

Certification Related to Electrical Engineering

In addition, in the future, the license will be an advantage in earning the clients' trust and the ability to take a superior level of responsibility for the employer.
  • Subjects: Engineering
  • Pages: 2
  • Words: 638