Tech & Engineering Essay Examples and Topics. Page 22

5,890 samples

System Vulnerabilities and Penetration Testing

It is advisable to change passwords frequently to give formal proof for authentication and to store passwords in the /etc/shadow file that allows programs with system privileges to access the passwords.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1116

Learning Outcomes: Digital Basics

The basic principle in digital basics is that electronic/computer engineers and technicians can be able to use the same design used in a light switch to create an electronic switch with the capacity to produce [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 553

Database and Data Warehousing for Smart Buy

The motivation for this proposal is that a data warehouse will enable Smart Buy to optimally exploit the potential of business intelligence in boosting its sales and on cutting down unnecessary expenditure.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 1686

The Latest Development in EMAT Inspection of Welds

However, the innovation of EMAT technology in 1970s transformed the process of inspection as a noncontact, dry inspection that provided an option to the piezoelectric transducers.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1416

Family Plan For Specific Hazards and Risks

In my community, there is also the risk of xenophobic attacks. The gas has a distinct smell and can be recognized by people in my community.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 812

Google Incorporated: General Information

Under the history section, the article states that the company was created in 1996 through the entrepreneurial attempts of Larry Page and Sergey Brin as a way to improve on the search engines that existed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 558

Compound Bows: Term Definition

Archery: this is the art shooting arrows using a compound bow Cam: this is the pulley of a compound bow The intention of this document is to offer archers with relevant information about compound [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1114

Platform as a Service Solution

Components of the PaaS solutions are service platforms. PaaS solutions are used to develop web applications on the Internet.
  • Subjects: Data
  • Pages: 2
  • Words: 577

The Importance of IP Traffic Classification

One of the major challenges in the development of appropriate and effective QoS is lack of a proper pricing strategy. An effective pricing strategy is central to the classification of the QoS that customers receive.
  • Subjects: Internet
  • Pages: 3
  • Words: 825

Biometrics in Cryptography. Desirable Properties

Because it is the first step, it is a critical step in the scheme because it is used to ensure that the attacker cannot gain access to the key once the system is compromised.
  • Subjects: Cyber Security
  • Pages: 13
  • Words: 3353

WEP (Wired Equivalence Protocol)

Other vulnerabilities include the ability to compromise the WEP by the use of passive attacks, which is a condition where an attacker selects both the cipher text and the plain-text to attack WEP secured data.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2556

The Quality Improvement Plan

This was indicative of a quality failure on the part of the project manager and the various parties involved since it did not adhere to the projected and set cost for the road improvement.
  • Subjects: Project Management
  • Pages: 20
  • Words: 5503

The Coop Program: Resolving Engineering Problems

This programme allows students to have a chance of practical application and work experience in the engineering field of study. The programme also benefits students as they learn to work with a team in a [...]
  • Subjects: Engineering
  • Pages: 8
  • Words: 2192

Electronics on Paper – Is It Better

However, height differences in paper vary up to some micrometers with respect to the fiber dimension and the manner in which the fibers intertwine.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1655

Nursing Research and Evidence: Recommendation and Case Project

Furthermore, the system classifies evidence provided as high, moderate or low, depending on the consistency of the results, the precision of estimates, the risk of bias and the directness of the evidence provided.
  • Subjects: Project Management
  • Pages: 2
  • Words: 609

Word Processing Software Upgrade

The key purpose of this project is; to implement an upgrade of the word program in use at Baderman Island Resort and Smith Systems Consulting.
  • Subjects: Project Management
  • Pages: 2
  • Words: 602

Programming Solution for the Library Reference System

The iterating part of the program code involves the data analysis part, as data matching part of the code will be repeated for several hundred times until the entire data base is scanned. The offered [...]
  • Subjects: Data
  • Pages: 2
  • Words: 539

Computer Components in the Future

It must be noted though that liquid cooling systems utilize more electricity compared to traditional fan cooling systems due to the use of both a pump and a radiator in order to dissipate the heat [...]
  • Subjects: Computer Science
  • Pages: 22
  • Words: 6517

The Web-Enabled Technology: Key Aspects

For data conveyance there is a protocol in place that enables the transfer of data without a snag."Hyper text transfer protocol" is the foundation of data conveyance on web.
  • Subjects: Internet
  • Pages: 8
  • Words: 2304

Majoring in Computer Science: Key Aspects

Computer Science, abbreviated as CS, is the study of the fundamentals of information and computation procedures and of the hands-on methods for the execution and application in computer systems.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 854

The Entity Relationship Diagrams

For each entity there's a specific primary key and these are all unique as shown below; For Event requests the primary key is the unique event number, For Event plans the primary key is the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 852

Aviation Industry: New Technologies

The reason behind this is due to the fact that the researcher believes that as a student attempting to attain a Bachelor of Science in Aeronautics with a Minor in Safety and Human Factors his [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 1928

Web Service Security: SAML and XACML

One reason for the development of this language can be traced to the need for a standard, generic and powerful access control and specification language.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 457

Enterprise Service Bus Overview

According to Footen and Faust, "ESB is a term used to describe a wide variety of products whose primary goal is to extend the simple messaging capabilities of an application server to allow the inclusion [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1017

Comparison Between WiMax and LTE

The traditional mobile networks use the TDM and combination of the packet infrastructure that is partial, but with LTE and the WiMAX, they have simplified the network standards to the application of all- IP networks.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1957

Two VOIP Call Admission Control Methods

The other components include a soft phone, which runs on a computer, the analog telephone that connects to the public switched telephone networks, and the analog telephone adapter that contains the logic to communicate with [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1098

Digital Information Technology

The nature of the configuration of the data path is also an important element in the design of data path and controller design.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2653

Southwest 737 Jet Forces Emergency Landing

The article gives all the actions that the company has been taken to establish the cause of the problem. This can add to the problem that is already in the company of delaying customers as [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 353

What Doesn’t Like Hardware Engineer

Among the things that may make a computer hardware engineer dislike his/her job is the fact that it is sometimes difficult to identify a problem in a computer system.
  • Subjects: Engineering
  • Pages: 2
  • Words: 566

Energy and Nanotechnologies: Australia’s Future

Given the concerns about the sustainability and the security of the energy supply, the fast pace of economic development, the connection between global warming and fossil fuels, the author seeks to investigate alternative energy efficient [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 599

Management Systems in Company, Lan Technologies

LAN is the type of network architecture and technology to be used because of the smaller size of the networking area. The topology of the network describes the entire arrangement of the elements on the [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1417

Energy Trust: Technology and Innovation

Similarly, the Energy Trust demonstrates commercial and pre-commercial renewable energy technologies and builds market for renewable energy. Besides, renewable energy is cost effective than other sources of energy in the long run.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Groupware and Ordinary Databases

The database design is necessary in groupware because it helps to identify the data elements, type of data, and the file options.
  • Subjects: Data
  • Pages: 3
  • Words: 963

Hydraulic Pumps: Review

There are several types and a majority of them are adjustable in order to regulate the amount of pressure delivered by the pump few are not; depending on whether the pumps are hydrostatic or hydrodynamic.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1095

Networking Environments File System Security

Typically, the Linux command line uses the "chmod" command where the user is able to apply the change the mode typically defined in the syntax descriptive of the user account as "u", use of the [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2184

Types of Crime in Cyberspace

While there are numerous advantages that accrue from progress of the ICT like improving the speed at which information, news and ideas are transferred from one part of the globe to another and efficiency in [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2220

Social Needs: Inventions and Innovations

The Pony Express was birthed in 1861 in the US with the primary goal of delivering mail and in the same breath, Coleman Sellers invented a Kinematoscope.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1342

“Agile Project Management” by Gary Chin

5
In addition, a blend of both agile project management and classic project management is valuable to the project environment of the product development process.
  • Subjects: Project Management
  • Pages: 12
  • Words: 3505

Continuous Auditing Software Applications

There are several continuous auditing software applications available to increase the coverage of computer transactions audit some of which the company can effectively use.
  • Subjects: Applications
  • Pages: 3
  • Words: 880

Type I Certification at an Online Institution

To ensure that the new system is efficient in addressing the security requirements of the institution, I will use the waterfall model to undertake the system life cycle management analysis.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 765

Information Systems at WASS Film and Media

It is important for the business to asses the risks involved in new technologies and new ways of using information system for such will prepare managers and the owners of WASS Film and Media to [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 566

Personal Protective Equipment for Firefighters

It is for the serious impact of the fire that the department of fire fighting was initiated within every country to respond to fire incidences.
  • Subjects: Accidents & Protection
  • Pages: 45
  • Words: 14095

The Skydive Chicago Center’s Information System

The majority of the skydiving individuals congregate at the center with their skydiving gears including systems for taking images, capturing and storing videos showing the various movements performed by the experts, and the learning students [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 931

How to Build a Desktop Personal Computer

The processor will determine the speed of the system but the choice between the two major types-Intel and AMD- remains a matter of taste.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1259

Doping Characteristics of Gallium Nitride (GaN)

The design of the device is done in a form that provides for diffusion in the emitter, is a quassi-neutral base with the doping densities in the emitter and the base.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 597

Networking Concepts for Computer Science Students

The firewall, on the other hand, is a hardware or software that secures a network against external threats. Based on these a single subnet mask is sufficient for the whole network.
  • Subjects: Computer Science
  • Pages: 25
  • Words: 6911

Data Mining and Machine Learning Algorithms

The shortest distance of string between two instances defines the distance of measure. However, this is also not very clear as to which transformations are summed, and thus it aims to a probability with the [...]
  • Subjects: AI
  • Pages: 6
  • Words: 1723

Trusted Computer System Evaluation Criteria

The paper provides an overview of the concepts of security assurance and trusted systems, an evaluation of the ways of providing security assurance throughout the life cycle, an overview of the validation and verification, and [...]
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1399

Stress-Strain Relation of Stainless Steel After Exposure to Fire

To study the behavior of stainless steel at elevated temperatures, the material data of the steel obtained through testing is important.ca Steady-state tensile tests and transient-state procedures determine the stress-strain relationships of stainless steel at [...]
  • Subjects: Engineering
  • Pages: 15
  • Words: 4453

Policing Internet Fraud in Saudi Arabia

However, the criminals get the opportunity to use personal information in order to undermine the credibility and to destroy the image of the innocent person to be benefited economically or for other purpose.
  • Subjects: Cyber Security
  • Pages: 60
  • Words: 16625

Advanced Data & Computer Architecture

Solid knowledge and understanding of the information architecture, access, storage mechanisms and technologies, internet mechanisms, and systems administration contribute to the complete knowledge of the whole system architecture.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2275

Administering a UNIX User Environment

One of the reasons why I had to make this a priority was the fact that a friend had requested me to help him understand the workings of UNIX. In fact, I knew Root account [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1252

Aviation Safety: Controlled Flight Into Terrain (CFIT)

These errors range from drug and alcohol use by the pilots, homebuilt aircraft, use of student pilots, improper fuel management, on ground and in-flight judgment, unsterilized approach, inadequate flying skills, the inability of the flight [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2209

Basic Network Technology SLP 1

The introductory and general tutorial comprises of Client-server, internet communication, the internet protocol model, the internet Resiliency, the OSI reference model and the Regional Internet registries.
  • Subjects: Internet
  • Pages: 2
  • Words: 555

Computer Hardware: Structure, Purpose, Pros and Cons

The main focus of the post is with respect to the security issues of web 2. 0 technologies is susceptible to is SQL injection attacks, which primarily entail the use of a code injection technique [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 961

Ethical Considerations in Information Technology

Some of these rules of ethics in security information include respect to matters of privacy and anonymity, taking responsibility, respect to intellectual property, and provision of diligent and professional services to principals and even acting [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 482

System Test and Evaluation Plan and Procedure

The concept of security assurance in the National Bank of America's security system revolves around the assurances of the company that the company's security system is completely secure.
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1490

Cascading Style Sheet (CSS)

CSS removes the styling from the HTML to ensure that the HTML only handles the content while the CSS takes care of the styling of the web page.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 565

Background Chernobyl Nuclear Disaster

The aim of the research was to address engineering associated issues that could lead to a nuclear disaster, such as the Chernobyl nuclear disaster in Russia.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1587

HTML GUI vs. Text Editors

The demand for access to the Internet has only continued to rise and this is because the Internet has been able to bring the whole world together.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1252

Computer Technology: Databases

Databases are components of Information Systems that are used when the Information Systems have large amounts of a, especially when the interfaces in the Information System are interactive, and when users can access the system [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 576

The Sociotechnical Systems: Toyota

A lean management system and the just-in-time system can be considered a sociotechnical system because it enhances the work efficiency of the employees.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 582

Threats to Information Security in Business Settings

In the course of the 1990s, there was the prevalence of DOS attacks and hackers. The spread of these Trojans is carried out by the viruses, and this can in turn bring about blended threats.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2214

Engineering and Technology Management

Engineering and technology management group is aimed at encouraging the coordination of engineering and technology to management technicalities which has divisions for national and international conference participation.
  • Subjects: Engineering
  • Pages: 3
  • Words: 875

Security Threats in Mobile Ad Hoc Network

The security vulnerabilities of the MANET are a principal concern with respect to the provision of secure communication among the mobile nodes in a hostile environment.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4270

4G Interference Management

Power management in 4G is also autonomous as opposed to the others, which are continuous. Among the main solutions raised for interference management is management of radio resource, which helps to mitigate interference.
  • Subjects: Internet
  • Pages: 2
  • Words: 618

Failure Modes and Effect Analysis (FMEA)

Planning risks are the risks associated with the activities and processes of the planning stage of a project. In addition the components of the system are to be tested together and not in groups.
  • Subjects: Programming
  • Pages: 12
  • Words: 3373

“Inmates Are Running the Asylum” by Allan Cooper

The main ideas that Cooper tries to pin point in this context is that design of a product is more important. This system elevated the standard of in-flight entertainment to a state of art that [...]
  • Subjects: Project Management
  • Pages: 9
  • Words: 2532

The Sports Report Information System (TSRIS)

The Sports Report Information System is designed for the AllSports Sport Club specifically with the goal of ensuring that the club's newsletter is prepared and distributed in time, information access is done with efficiency and [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2141

Virtual Environment “Second Life”

It is as a result of these developments that Second Life was created in which the user is centered compared to the other applications.
  • Subjects: Applications
  • Pages: 2
  • Words: 597

Requirements Elicitation in the Software Projects

Christel, GM & Kang provide a short outline of the process of requirements elicitation and divide the problems of requirements elicitation into 3 groups from the point of view of the scope, understanding, and volatility.
  • Subjects: Project Management
  • Pages: 3
  • Words: 831

Hashing Algorithms in the Security of Information

In other terms, the hash value is a fingerprint for the messages in use for the algorithm. There are three different attacks on hash functions, which include: The main objective of this attack is to [...]
  • Subjects: Programming
  • Pages: 6
  • Words: 1642

Incident and Accident Investigation

These people are very important because they have full knowledge on the operating mechanism of the aircraft and hence they will be in a position to analyze the remains of the aircraft to determine the [...]
  • Subjects: Accidents & Protection
  • Pages: 11
  • Words: 3068

The Development of the Java 2 Enterprise Architecture (J2EE)

Two significant components that have led to the fast adoption of distributed component architectures and their associated tools and platforms are the emergence of the Web and the rising awareness of object and component development [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 654

The Reduction in Computer Performance

The Check Disk utility available in Windows XP enables one to monitor the health of the hard disk. This utility will analyze the disk and display actions that can be undertaken to recover disk space.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 404

The RAD Tutorials Under the Network Layer

In addition, the paper provides an evaluation of the tutorial and experience of the tutorials. There are various protocols and network architectures that can be used in the implementation of VPN, with the most common [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 583

The Principle in Net-Centric Computing

The invention of the computer and the subsequent creation of computer networks are arguably the biggest achievements of the 21st century.
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 887

Drawbacks and Disadvantages of Distributed Computing

However, in any distributed system, there is a need to either have a coordination mechanism that will ensure that all the computers in the system are synchronized or work towards the reduction of processing time [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 869

The FMEA-Quality Risk Register Analysis

For each domain, its purpose is described, its importance in the test is explained and the link between the business requirements and the FMEA /QRR items is shown.
  • Subjects: Project Management
  • Pages: 6
  • Words: 1771

Developments in the Field of Machine Learning

The environment of learning consists of a machine input, or a piece of information that a machine can respond to. One of the best ways that we can think of in solving the problem of [...]
  • Subjects: Engineering
  • Pages: 30
  • Words: 7349

The Professional Computing Ethics

Nonetheless, the submission of students' term papers to the Turnitin system for plagiarism detection, along with retention of the same in the archives of the Turnitin database for use in comparing term papers submitted in [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1507

The Strategic Advantage of Cloud Computing

To explain the position of the present system, this report will perform a SWOT analysis, which discusses the difference between the current and desired data storage status of the selected organization and it will suggest [...]
  • Subjects: Cloud Computing
  • Pages: 12
  • Words: 3304

Cloud Computing Adoption by the CU-IT Services

This paper will therefore be designed to inform the company's CIO of the evidence-based clarification of cloud computing; the evidence-based evaluation of the general benefits and pitfalls of cloud computing; the formulation of a framework [...]
  • Subjects: Cloud Computing
  • Pages: 9
  • Words: 2443

Current State of Online Security

The Rich Internet Applications are described as a number of applications that are operational in the normal browsers that customers use on daily basis on the computers and those that interact with web applications.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1586

Image Processing: The Fourier Analysis

The color of the map is another quality that can be exposed to control mechanisms to show the 3D plot, in which the matrix z height data is in direct proportion to the color of [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 628

Artificial Limbs and Organs Future of Application

Further complexities in the matter of organs and transplants are due to the position of the law on property and a body. Due to these limitations, it would appear that the best solution lies in [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2493

Animal Biotechnology: Ethical and Health Evaluation

The aim of this paper is to present an overview of modern biotechnology in the breeding of poultry and to look at the possible side effects on both the consumer and the chicken.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1880

Communication and IT Infrastructure in London, New York, Paris and Tokyo

London New York Paris Tokyo Technological History London’s history of telecommunications remarkably starts with the development of telephony and telegraphy. Famous inventor Alexander Bell introduced his devices enabling people to communicate at distance (Huurdeman 159). Telegraph technologies started the invasion in 1868 and were marked with the creation of the Indo-European Telegraph Company. (Huuderman 127). […]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1146

Organic-Led Technology Application

The wavelength of the photons emitted depends on the type of the element used in the boundary. In response to the looming change of technology from the use of LED to make TV display panels [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1726

Online Testing in Freelance Learning

There is a fee payable to the domain registry for the domain name known as the hosting fee. The browser requests for a page from the internet that is then delivered to the webserver.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 1009

Systems Engineering Advances and Competition

One of the radical changes that occurred in different areas of human activity is the growth of automation which influenced the employment and level of qualification and training.
  • Subjects: Engineering
  • Pages: 2
  • Words: 549

Data Carving and Data Hiding Concepts

The phenomenon of data hiding is urgent for current practices in computer forensics and involves information storage in places where this information is not expected.
  • Subjects: Data
  • Pages: 3
  • Words: 849