Tech & Engineering Essay Examples and Topics. Page 22

4,726 samples

Software Development Effect on Media

The history of media technology starts with the invention of the phonograph in 1877. The effect of the separate developments was a turf war of which is better between the two technologies.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2461

Properly Managed Disk Resources

The size and structure of a disk has a great impact on the performance the computer system. As indicated above, there are two forms of formatting that have to be done on the disk; low [...]
  • Subjects: Other Technology
  • Pages: 20
  • Words: 5648

Making Informed User Decisions: Windows v. Linux

Security is one of the most critical differentiating components between Linux and Windows considered in the discussion as user programs and data at corporate and individual levels get majorly concerned about the safety of their [...]
  • Subjects: Programming
  • Pages: 20
  • Words: 5667

Federal Aviation Authority

The following report explains the various aircraft -noise control measures that are taken by the Federal Aviation Authority in controlling the noise problem.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2189

Computer Forensics and Audio Data Retrieval

Advanced technology in the modern society has contributed to the increase in computer and computer supported criminal activities due to the soaring increases in the number of internet users across the world and computerization of [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 850

Database Structures, Languages and Architectures

The main disadvantage of having this form of setup lies in the need to have various objects linked to the database instead of having consistency between the database and the programming model.
  • Subjects: Data
  • Pages: 3
  • Words: 980

Definition of 3D Television Technology

The first one of course is to wear eyeglasses, which will do the work of filtering offset images before they reach the eye, and secondly, we can use a light source to divide the images [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1117

Modern Touchscreen Technologies

In this setup, a thin film that stores charge is placed on the display plane. Display in this type of touchscreen is clearer and sharper than that of the resistive touchscreen.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1089

GNS3 and Explaining How to Work With It

GNS3 is a graphical network simulator, which provides a platform for the simulation of a complex network. It is a powerful tool for real labs and is used by network engineers as well as other [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 588

Cyber Security: Security Audit

On the issue of computers and laptops, I learned from the administration that each laptop was specifically assigned to a single person who was entrusted with a password known to him and the organization's administration [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 735

Tech: Database Forensics

Brinkmann & Carracedo observes that one argument in which the outcome of database forensic can be of greater importance to a company is the fact that a company can be able to determine whether the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 1021

Speech and Voice Recognition

Voice recognition is the use of software and additional apparatus to capture voice-based commands from a user and transfer these to a computer.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 210

Virtual World: Second Life

If the user is interested in the virtual environment for business purposes the orientation island is the destination of choice. One disadvantage of this use is the need to have several users that are conversant [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 567

IP Addresses Running Out Problem

In response to the growing concerns regarding the exhaustion of numeric addresses in IP version 4, internet designers have sought to establish a long term solution to the problem by launching a new addressing format [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 826

Software Piracy: Windows

In addition to this the vendor has a high incentive to increase the product security when the level of piracy is high owing to poor implementation of anti piracy legislation.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 639

Assessment of Firewall Security

In general given that a firewall is aimed at providing security to the system and user data it is important that the software is capable of preventing attacks.
  • Subjects: Computer Security
  • Pages: 7
  • Words: 2463

Computer Forensics: Data Acquisition

Data acquisition is a branch of computer forensics concerned with the retrieval of data originally located on a suspect medium such as a hard drive.
  • Subjects: Data
  • Pages: 3
  • Words: 862

Om Limited Company’s New IT Infrastructure

In the process of adaptation cooperates have met several challenges that have seen some of these cooperates fall to the bottom of the value chain.
  • Subjects: Technology Effect
  • Pages: 11
  • Words: 3139

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1233

Various File Systems Used by The Different Versions Of Windows

File systems used by various versions of windows fall into two broad categories, namely, File Allocation Table file systems and New Technology File Systems. FAT and NTFS file systems also contrast in terms of their [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 864

Incident Response Team Overview

The team has the responsibility of identifying and handling incidents in a systematic way to precisely investigate, lessen and report it to the concerned individuals in an organization.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 325

Network Security. Profound Use of the Internet

The major purpose of the Defense in-depth approach to computer security is to delay the onset of the potential threat rather than prevent the hacker from breaking into the system.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 961

Ethical and Legal Constraints Affecting Engineers

For instance, before the construction of a building or any other structure commences the engineers are the ones who are responsible of verifying the plan of the building and they act as the project managers [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 751

Concept Drifts and Machine Learning

The main theory that is used in explaining machine learning is referred to as the computational learning theory where the learning theory is focused on the probabilistic performance bounds of the learning algorithm because the [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2774

The Incident of the Distributed Denial of Service Attack

In that regard, Turley had the option of pulling the plug, but nevertheless, he evaluated such a decision between the risks at stake and the identification of the type and the source of the attack, [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 816

Network Caching Overview and Analysis

The second importance of the application of caching in networking is a productivity increase in the end-users. This request is subject to the rules of filtering traffic that are employed by the server.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2659

Using the Internet for Master’s Programmes

First, the benefits of the Internet will be introduced at the beginning of the next section; secondly, we will focus on the risks of the Internet and the ideas on how to avoid plagiarism.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 930

Wave and Tidal Power Analysis

The purpose of this report is to study the use of waves and tides to generate power. The source of the energy stored by ocean waves is different from the source of the energy stored [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1517

Temperature Chamber: Projection and Creation

As for the implementation stage, the report is focused on analyzing the results of the research and calibration as well as assessing the technical parameters of the chamber, such as the output channels and their [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 986

ABC Corporation’s Security System

Negligence of the security is mostly by the security guards who fail to check and deal with employees violating the policy appropriately.
  • Subjects: Applications
  • Pages: 4
  • Words: 549

Ground-Source Heat Pump System and Its Sustainability

Their operation is based on a renewable energy technology utilized in heating or cooling spaces."This technology is dependent on the fact that the earth has the most stable temperatures, warmer than the air during winter [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2345

Software Development and Design Patterns

The iterator also has the advantage of providing a common interface to the user through the technique of returning only the elements of importance to the client.
  • Subjects: Programming
  • Pages: 2
  • Words: 628

Face Biometrics in a School: Pros and Cons

As such, the only way to gauge the efficiency and effectiveness of face biometrics in our school is by conducting a SWOT analysis of these systems.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1295

Nanophotonics and Its Applications

The fiber and the couplers are believe in charge of the conveyance of the light wave to the system optical switches.
  • Subjects: Robotics
  • Pages: 3
  • Words: 852

Why Southwest Airlines Is the Best Place to Work

In addition, the airline "is known for its record levels of safety" The employees at Southwest are carefully selected and taken care of because, "its culture is unique and fiercely protected".
  • Subjects: Aviation
  • Pages: 2
  • Words: 605

Network Attack Signature and Intrusion Analysis

Unlike other automated signature generation strings that try to find a payload of continuous substring sufficient in length so as to only match the worm, polygraph tries to deviate from the weak assumption of the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 587

IPad, JooJoo, or Android: What Tablet to Choose?

The launching of Apple's Ipad led to a rush by the personal and the business users to have the gadget. It appears that the impact that the Ipad will have is nothing in comparison to [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 644

Road Safety in the Middle East and Gulf Countries

In this paper, we will look at road safety in the Middle East and Gulf countries, global statistics, types of road crashes, causes of road accidents and solutions to road crashes.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2789

Wind Turbine Blade Airfoil Design

The airfoil design of the blades affects the aerodynamic pressure on the blades. Airfoil design shows varying features from the top of the blade to the bottom while holding the structural needs of the blade.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1256

Evaluation of Software: Oracle

On the other, hand, it can be stated that for the other part of the company's business, i.e, standard production, the functionality of the suite will be sufficient to perform satisfy all the needs of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 704

Token-Based MAC Protocols: Wireless Networks

In the case of the wireless networks, the radio frequency in which the network is tuned is the only medium. The key difficulties of wireless data transmission are the encoding of the data, speed of [...]
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2448

Enterprise Resource Planning: Types and Importance

The modules include Inventory, Bill of materials, Sales orders, Manufacturing Resource Planning-MRP, Jobs, Purchasing and Accounting as in the print screen below; In the area of labour and machine requirements planning, the main functional objective [...]
  • Subjects: Applications
  • Pages: 9
  • Words: 2591

Types of the Information Systems

A company can use information system to gain competitive advantage via better organisation of data and its storage; for instance, data can be stored in the way that allows direct access to it from inside [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1380

Simulation of a Direct Detection Optical Fiber System

Meanwhile, the report will be discussing the procedures initiated during integration processes that includes the device parameters and stating all components required to make the device. Below are the procedures and the components used in [...]
  • Subjects: Programming
  • Pages: 5
  • Words: 1928

The Tactical Throwable Robot

The main technical characteristics of the machine are given below in the table offered by Czupryniak Rafal and Trojnazki Maziej in their article "Throwable tactical robot description of construction and performed tests".
  • Subjects: Robotics
  • Pages: 4
  • Words: 1151

Transnational IT Operations

Additionally, any organization that is planning to go global would best opt for the adoption of "transnational organization" as the model for making enterprises at a multinational level The field of transnational information technology has [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1460

Human-Computer Interaction and Communication

As the person is interacting with the gadgets or the computers, he should be favored by the design in that the system should be in such a way that it supports human usability.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1372

Impact and Types of Networks

The demerit of this kind of network is that if the server is faulty the entire network will be brought to a halt.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 713

The Terms in Online Communication Tools

E-mail client: this is a computer application that helps users to organize their e-mail since it can access the mailbox. It has rich functionality as compared to POP, since users can track the status of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 810

The Credibility of Web Pages

The first thing that justifies the reliability of a web site is the availability of detailed information concerning the person or the organization that created the website.
  • Subjects: Internet
  • Pages: 2
  • Words: 591

Willa Brown: Impact on the Aviation Industry

Through the analysis and perusal of relevant literatures, the study will in detail provide an informative and well thought out discussion as regarding to the various aspects of life as experienced by Willa Brown.
  • Subjects: Aviation
  • Pages: 10
  • Words: 3000

The Concept of Document Object Model

If the user wishes to add a book, then she must provide the title, first name and surname of all the authors, name of the publisher, and the year of publication.
  • Subjects: Programming
  • Pages: 10
  • Words: 1273

Education and Training: Conversation System

The invention of the digital computer is believed to have been the turning point of the 20th century and the facilitator for the move from the Industrial Age to the Information Age.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2582

LAN Design for Return2Fender Company

This necessitates the requirements of ensuring a network is designed to link all the offices without compromising performance for the sake of business enhancement and continuity.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1247

ISDN, RIP, IGRP, and OSPF on the Cisco Routers and Switches

ISDN is digitally designed in such a way so that it can allow digital voice transmissions and also data transmission through the ordinary copper wires that are used in ordinary telephone circuits and in the [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1857

Blackberry and iPhone: Exploits of Smartphones

The trends in mobile technology changed the entire concept of mobile phones and different models are entering the market. Unauthorized calls from Blackberry and iPhones have, in many cases, caused threats to the security of [...]
  • Subjects: Phones
  • Pages: 14
  • Words: 3684

Growing Use of 3D Technology in Theatres and at Home

One of the major beneficiaries of technological advances that have been made by man over the cause of the last century has been the entertainment industry which as grown exponentially through the years.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4446

Software Engineering: Data Modelling and Design

It may be physical e.g.a toy car representing a real car or it can be conceptual, only represented on paper to bring a good description of the operation of the real object."A data model is [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1210

The Overview of Information Assurance

It is necessary to establish the impacts and the degree of the risks in the group and learn which scenarios require the most attention.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 863

Autonomous Mobile Robot: GPS and Compass

The other realization is that in most instances the challenges presented in the motion of the appendages of a particular robot are not only limited to the number of joints but can significantly exceed the [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2538

Defining Data-Data Element Overview

A vendor Tracking ID is one of the specific examples of data elements used in a medical setting for the pre-requisite information that is used to define and format the data elements and validation values.
  • Subjects: Data
  • Pages: 2
  • Words: 632

Just-in-time Purchases and Extranets

On the other hand just in time purchasing is a new technology that uses information technology infrastructure to control the inventory and also the customers use the same system to make orders and also buy.
  • Subjects: Internet
  • Pages: 1
  • Words: 343

The Definition of Ethernet Technology

The device that wants to send a signal incorporates the Mac address of the destination device to the frame to be sent whereas the other devices compare their Mac address with that one on the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 572

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2967

Data Integrity in Relational Databases

To ensure that there is validity and accuracy of data, a database designer should be able to select the correct primary key that reflects the requirements of the database in regard to information search, updating, [...]
  • Subjects: Data
  • Pages: 2
  • Words: 740

Remote Data Delivery With Border Gateway Protocol

In most cases, the choice of a particular routing protocol depends on the time of scaling and convergence, the mode through which they plump for preferred routes and the ability to thwart routing loops from [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2387

Image Processing and Visual Denoising

Different values of the variables of the Gaussian noise, that is, both the mean and the variance were used and the resultant noisy image was as shown in the following figure.
  • Subjects: Programming
  • Pages: 6
  • Words: 2389

Fault Tolerance of an Information System

In a soft fault tolerance focus is on data security incase an eventuality that hinder general functioning of the system is witnessed.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1777

Encryption as a Key Technological Solution to Corporate Security

This encryption technique ensures confidentiality of information as only the transmitter and the recipient have access to the secret key needed to decrypt the message. According to PGP conventional encryption is both fast as well [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1519

Information Technology Infrastructure

Anything to be communicated like a message starts at the application layer with the top layer and moves down the OSI layers to the bottom layer which is the physical layer.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 1261

Defamation on the Internet

One of the factors that have facilitated the increase of cyberlibel cases is the ever-increasing popularity in the use of computers and the internet.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2200

Turkey – National Transmission Grid Project

The group project was designed to investigate the internal and external macro issues in the project; in this case the selected project for analysis was the 'Turkish electricity transmission company project' for the constriction of [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1837

Krakow Energy Efficiency Project (Poland)

This paper describes the Krakow Energy Efficiency Project whose project proponent were the World Bank and the Government of Poland. The first parameter was the satisfaction of the end-user consumer with regard to the standards [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2067

The Unethical Issues That It Auditors’ Participate

When carrying out their work, IT auditors should be concerned in understanding the individual behaviors of the users of the IS and the mode of making decisions in a bid to ensure or ascertain that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1214

The Issue of Poor Data Quality

Many organizations suffer from the problem of poor data quality and the result of this is huge overheads and expenses, which can lead to losses in an organization.
  • Subjects: Data
  • Pages: 2
  • Words: 754

Universal Serial Bus / FireWire

In hot swapping feature, the USB is directly plugged into the port of the computer and PC automatically detects the presence of the new secondary device and it also configures the required software.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2211

Hubs and L2 Switches in IEEE 802.3 Based Network

But there are some differences in the behavior of hubs and switches in the network of such kind. They transfer data and frames between nodes on the local network segments, and in some cases correct [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 923

The Technology Today and in Future

The cell phone would be a true communications hub, connecting us all to all we want or need through a central hub, The phones would be very small and they would look like jewelry with [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1247

Mechanical Engineering Lab: Chevrolet Engine Performance

The Objective of the experiment was to determine the fuel consumption of the Chevrolet 4. Several parameters of engine performance can be measured but the main and most important test is the power test.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1865

Going Online: Pornography in the Online Era

Beyond the obvious quibble that, five years after the article in question was published, much has changed in the public's experience of the Internet, Patterson is afflicted by a lot of misconceptions about the nature [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 516

Sakht Hamandishan Aran Company: Work Experience

In essence this report will be the summation of all that I have done in my practicum The company which I spent my three months with is called Sakht Hamandishan Aran Company, A contractor which [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1024

The Internet and Freedom of Speech: Ethics and Restrictions

Because of a lack of security technology, across the board prohibition is justified under the law, a concept that is in itself considered unlawful by a strict definition of the First Amendment of the Constitution [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1159