Tech & Engineering Essay Examples and Topics. Page 24

5,369 samples

DSL Technologies and Other Internet Networks

Identifiers are placed on the headers of the packets and this enables the switches on the network to correctly recognize the packet and be able to foreword it to the correct switch within the network.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 804

Mechanical Engineering Lab: Chevrolet Engine Performance

The Objective of the experiment was to determine the fuel consumption of the Chevrolet 4. Several parameters of engine performance can be measured but the main and most important test is the power test.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1865

Socio-Technical Issues and IT Project

When the developers stick to the limits of the project, they will deliver a working project within the set project duration.
  • Subjects: Project Management
  • Pages: 2
  • Words: 659

Going Online: Pornography in the Online Era

Beyond the obvious quibble that, five years after the article in question was published, much has changed in the public's experience of the Internet, Patterson is afflicted by a lot of misconceptions about the nature [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 516

Dulles Corridor Extension-Deed Research

Based on the functional organizational chart, various stakeholders' participatory roles included the Project Sponsor and Grantee a role by the Airports Authority which was the "federal grant applicant and recipient and will have direct responsibility [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 1701

Registration of Partner Webpage

This project has been done in order to provide new web page on the company website where the potential partner can participate in a questionnaire which will indicate whether they have the necessary qualifications to [...]
  • Subjects: Project Management
  • Pages: 15
  • Words: 4201

Sakht Hamandishan Aran Company: Work Experience

In essence this report will be the summation of all that I have done in my practicum The company which I spent my three months with is called Sakht Hamandishan Aran Company, A contractor which [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1024

The Internet and Freedom of Speech: Ethics and Restrictions

Because of a lack of security technology, across the board prohibition is justified under the law, a concept that is in itself considered unlawful by a strict definition of the First Amendment of the Constitution [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1159

Sawtel Defender: Network Security

Integrated with the Microsoft Windows operating system it provides both the boost and control of Internet usage and policy-based of the company.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1640

Mobile and PDA Technologies Use in Education

It is a fact that things have become easy with the use of technology such as the Internet or the Worldwide Web and other Information Technology features, for example, software that make it easy for [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2970

Information Security and Privacy

At the dawn of the new technology and especially in this information age, protecting the same information is very crucial to it.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2546

Current Laws and Acts That Pertain to Computer Security

Since the advent of networking of computer systems through the intranet and internet, security of data and information has always been threatened by unauthorized access, use and modification of data.
  • Subjects: Computer Security
  • Pages: 18
  • Words: 5452

Computer Network: Electronic Mail Server

In practice, the major problem of sending messages to various different email addresses is typically solved by entering a list of multiple addresses separated by comma within the "To", "BCC", or "CC" fields of the [...]
  • Subjects: Computer Science
  • Pages: 20
  • Words: 5456

The Application of a Decision Support System at Tehran University

The University of Tehran, otherwise called "Mother University", is the largest and oldest educational center of Iran. The historical data that the university needed to support the analyses, managing, and make forecasting had been buried [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 940

Global Corporation Inc.: Data Protection Policy Statement

The most primary vulnerability that the company is subjected to is the fragility of security barriers that comes with every member of the company carrying confidential data on their laptops. However, all individuals are expected [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 965

GPS Chipset Manufacturing: Project Management

Since the company is already in the business of manufacturing chipsets, the objectives of this RFP are consistent and strategically aligned with the business objectives of the company. During the initiating process a Project manager [...]
  • Subjects: Project Management
  • Pages: 7
  • Words: 2603

The Slick Jim’s Used Cars: Three-Phase Spreadsheet Calculator

Jim has also seized on the chance offered by the presence of RMIT students to provide the company a system that will more reliably generate reports around gross revenues, advertising costs, a schedule of insurance [...]
  • Subjects: Computer Science
  • Pages: 28
  • Words: 1540

The Technology Behind Bing Maps

Bing Maps was developed by Microsoft in response to the business threat posed by Google who also offers Google Earth Pro, for the visualization and mapping of much of the world using satellite imaging from [...]
  • Subjects: Data
  • Pages: 2
  • Words: 681

Self Assure Company: Quality Systems

Reliability of the software is one key concern; the software should be able to perform the tasks that have been formulated in the feasibility study and analysis stage. If the users of the system are [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 2858

Digital Systems Virtual Local Area Network

A VLAN saves the situation of the user when the network gets so large and is encountering much traffic. Frame tagging is the criteria used to determine the logical grouping of nodes into a VLAN.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 827

Civil Engineering Assessment: Fire Safety in Buildings

According to the 'Review of the Building Regulations 2004: Section 2 Fire,' fire safety main aims are to ensure the protection of life, achievement of sustainable development, and assist the fire and rescue services.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2053

Image Based Human Pose Estimation the Survey

The methods being used for posing human inference is done with high clarity and ability to separate the subject of interests to the background in which they are.
  • Subjects: Computer Science
  • Pages: 15
  • Words: 4172

Nanotechnology: The Technology for the Twenty-First Century

Applications used in the field of nanotechnology are based on the physical properties of the material used within the sub atomic range. In the field of chemistry, nanotechnology is used in the catalysis of chemicals [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Java Engagement for Teacher Training Workshop

Advanced Placement is one year course in which the college board gives two exams in computer science to students in high school9namely.the division between computer science A and AB, A is part of the content [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 629

Airports and Ground Handling

Put simply de-icing is the removal of the ice and frost that already adheres to the framework of the aircraft and anti-icing is the taking of preventive measures to see that ice does not form [...]
  • Subjects: Aviation
  • Pages: 5
  • Words: 1582

Membrane Filtration Technology

The paper is organized into subsections including how the technology works, alternative technologies, effectiveness of the technology, management of the technology, and application of the technology.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1896

Adopting RFID Technology in Supermarkets

They occupy the central place in our framework because RFID is the tool for arrangement of successful SCM and the SC is the central issue of concern in the whole production process of any supermarket [...]
  • Subjects: Technology Effect
  • Pages: 13
  • Words: 4202

Dealing With Spam

The term spam is used to refer to the unwanted email messages that are passed over to the receiver through the internet.
  • Subjects: Internet
  • Pages: 2
  • Words: 751

The Development Process of Web Sites

The aim of this paper is to analyze the process of web development with the assistance of Dreamweaver software, as well as analyze the technical characteristics of the equipment, which will be used for the [...]
  • Subjects: Programming
  • Pages: 6
  • Words: 1623

Miami-Dade’s Web Services Transformation

The only solution is the development of mainframe that will have the capacity to provide county law enforcement's access to a criminal records database.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 701

The Development of the Vanguard Web

After sometime, during the use of the Vanguard website, the managing director noted a problem with the employees web interface and proposed the employees use the same web interface with the customers.
  • Subjects: Programming
  • Pages: 2
  • Words: 594

The Multimodal Theme of Information Technology

This report compares the integration of the multimodal theme of information technology in the strategic, learning process and belief system of an organization in order to determine the feasibility of information technology integration in organizational [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 2005

Comparison Ontology Modeling With Other Data-Based Model

This is the organized representation of the information that the database requires including the information objects, the linkages in between the information objects and the guidelines that are used in the running of the relevant [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2172

Upgrades Using Project Management Techniques

To begin with, it should be stated that the concepts of network security and information security are similar, and they are often used interchangeably.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 516

Viruses and Worms in Computers

To prevent the spread of viruses and worms, there are certain precautionary measures that can be taken. With the correct measures and prevention, the spread of online viruses and worms can be controlled to a [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 521

Employee IT User Acceptable Policy

That is why the policy of the company is according to the usage of informational technologies and assets which they encompass.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1119

The Branch of Well Engineering

Lawndirt illustrates that "In a June 4th, article, reported "that Petroleum Engineering was the 24th best paying job in the United States" Well engineering is on the other hand is the profession in petroleum engineering [...]
  • Subjects: Engineering
  • Pages: 5
  • Words: 1346

Multi-Touch Touch Screen Controls in Military Aircraft

The attitude indicator is in the centre of the top row, the Airspeed indicator is to the left, the altimeter on the right, and the gyrocompass or heading indicator in the centre of the second [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1338

The Internet is a Democratic Technology

As opposed to what in the media channels of communication where the information let out to the public is filtered and influenced by what the government want the people to know, the Internet is free [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 890

Computational Knowledge in Wikipedia

The paper employs the articles of Wu and Weld "Automatically Refining the Wikipedia Infobox Ontology" and article of Syed, Finin and Joshi "Wikipedia as an Ontology for Describing Documents" in providing better knowledge for Wikipedia [...]
  • Subjects: Data
  • Pages: 3
  • Words: 855

Open Search Standard in Windows

A standard definition for OpenSearch as given by its website, opensearch.org, says that "OpenSearch is a collection of simple formats for the sharing of search results".
  • Subjects: Data
  • Pages: 6
  • Words: 1432

Design of Object-Oriented Programming

The objective of this paper is to design a network that will be appropriate for the Wembley and Harrow sites, which are approximately 3 miles apart and are within line of sight of each other.
  • Subjects: Programming
  • Pages: 2
  • Words: 605

How to Use Speech Recognition Program

The objective of the paper is to provide insightful research on how to make use of the Microsoft speech recognition engine.
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Implementing Management Software System Using SDLC

The feasibility will involve the identification of the expected costs that will be needed to complete the project. Planning: At this phase, we will need to develop a planning phase for the project.
  • Subjects: Applications
  • Pages: 2
  • Words: 673

Context-Aware Applications

In particular it is necessary to discuss the peculiarities of the solutions which are able to respond to the changes in environment and show how the emergence of such programs impacts the process of design [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 622

Life, Achievement, and Legacy to Computer Systems of Alan Turing

Turing was quite influential in computer science development, in addition to setting the framework for the formalization of the algorithm concept, in addition to the use of the Turing machine that he developed, for computation.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 536

Information systems tools

The first step is to add the Person Specification in the sheet named "Essential & Desirable Criteria". Add all the Essential Criteria in column C and Desirable Criteria in column E.
  • Subjects: Project Management
  • Pages: 8
  • Words: 761

Best Buy Enterprise Network Design

Analysis of the existing network technology of Best Buy reveals that its network infrastructure cannot connect to all the locations that the company is operating.
  • Subjects: Project Management
  • Pages: 6
  • Words: 2098

WorkShop Report: Client-Server Technology Bco-5502

However, on the framework of TCP/IP configuration, it is possible to locate the IP name resolution under the parameters of the NetBIOS resolution and with the use of the Windows NT 4.0.
  • Subjects: Programming
  • Pages: 3
  • Words: 2212

The Measure technological Progress

For example, during the savagery era the discovery of fire, the use of the bow, and the development of pottery can be seen as some of the indicators of advancement and these inventions can then [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1404

Product Break Down Structure

The Product Breakdown Structure, based on the principle of dividing the products by their origin, is aimed at highlighting this type of product as the basis of the business activity, and the result of the [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 368

SAP Software Solutions Systems

The role of a Basis Administrator in an organization implementing an R/3 system is crucial as it is the Basis Administrator who runs the system, introduces it to the organization and all its employees, provides [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2318

Information Security in Company’s Financial Operations

According to findings of a research published by Symantec "2009 Storage and Security in SMBs survey", despite the awareness of small and medium businesses of cyber risks and the existence of firm goals regarding security [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1204

Video Distribution: MPEG-4, Multicasting, Encoding

MPEG-2 is a version which incorporated the ability to transmit and compress files with the speed of 6 to 40 megabit per second range; this format is appropriate even for HDTV and DBS and is [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 616

Rapid Product Development Technology

In the 21st century this is not the case because today, one of the major goals of businesses is cost-efficiency and the need to reduce time-to-market.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2128

Embedded Blue Wireless Serial Port

The main features of the embedded blue are that its easy connection establishment is very simple and its FHSS technology with 2.
  • Subjects: Engineering
  • Pages: 2
  • Words: 576

Identifying a Power Plant Problem

Having carried out the requested inspection of the power plant of the Baldur Agricultural Chemicals Company in Gordontown, 1450 Disraeli Crescent, I have found out the following issues that might cause the issues of the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1089

A Unique Bag with the Sun Inside

So, the unique sun bag is the best variant of power during the traveling to the uninhabited places, moreover, it is going to be not so expensive, small, easy to fix and very useful.
  • Subjects: Engineering
  • Pages: 2
  • Words: 552

Information Security for “Astra-World”

In that regard, our company -"IS Consulting", provides a full complex of services of information protection and a wide spectrum of solutions for the provision of the security of the information systems of any difficulty.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2224

Clubs’ Relationship With Fans and Internet

Despite this great implication of the internet on the sports industry, some critics in the football world have argued that the contribution of the internet in the formation of a strong relationship between clubs and [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2966

Internet Streams Types: General Analysis

In order to demonstrate the work of a sniffer to identify streams, the example of the program Ethereal will be used. Additionally, other equipment, such as routers, can be configured to simulate the work of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 555

Industrial Communication Protocol

To give response to the users the suppliers are using the processors for improving the functions. It is a communication network planned for industrial environment and time critical applications.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2642

International Uses of Relational Technology

To begin with, it should be stated that the development of the IT sphere and the spread of communication technologies have changed the image of business management essentially.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 534

Characteristics of the Web 3.0

Additionally, it might be argued whether the new addition, in terms of metadata, is worthy of a new number in the web 3.
  • Subjects: Internet
  • Pages: 2
  • Words: 621

Untangle Software: A Firewall and Virus Blocker

Untangle uses protocols and IP addresses to filter traffic allowing the administrators to execute NAT and produce DMZs, designate the services and systems that are publicly accessible and complement hardware by running as transparent bridges.
  • Subjects: Applications
  • Pages: 4
  • Words: 1122

Fiber Optics Laboratory Experiments

The aim of this report is to introduce the process and the results of the laboratory experiments on fiber optics. The choice of the fiber cable and the waves will define the theoretical optical loss.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1349

Gas Turbine Engines’ Principles of Work

The same principle is used in aircraft but the major difference is the thrust is used to turn the blades of a propeller which pushes the plane forward. The ignition of the air-fuel mixture is [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 624

Data Communication and Management Issues

Because it operates at the data-link and network layers, it can be implemented as a basis network that offers services to a standard that has a network layer.3.
  • Subjects: Data
  • Pages: 2
  • Words: 890

Analogue to Digital Sound Effect Processor

Nonetheless, unlike analog documentation that is importantly dependent on the long term durability of the fidelity of waveforms documented on the standard, the tangible standard stockpiling digital samples is fundamentally immaterial in replaying of the [...]
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5052

Extensible Business Reporting Language (XBRL)

The important factors using XBRL as the efficiency of the process, simplicity of information and the important cost savings come together with distribution and analysis.
  • Subjects: Data
  • Pages: 4
  • Words: 1579

MilkChurn Firm’s Security Policy

The objective of this policy is to provide the management of the firm a sense of direction to help the smooth performance of essential information security.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4212

Global System for Mobile Communication

According to the International Engineering Consortium, the three functional components or systems that constitute the GSM architecture are: the network and switching system, the base station system, and the operation and support system.
  • Subjects: Phones
  • Pages: 2
  • Words: 634

Fixed-Base Operators in the Aviation Industry

Most of the business conducted within the airdrome environs as well as those that require a straight linkage to an airdrome in order to subsist yet their chief commerce is not associated to aviation.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2216

Risks Related to Tunnel Engineering

Engineers should be apprehensive that tunneling is rather a challenging phenomenon, owing to the sensitivity of the railway haulers above, in addition to the fill substance the conduit would require while constructing.
  • Subjects: Engineering
  • Pages: 3
  • Words: 856

Modern Engeneering Tichnologies: Fiberglass

This resulted in marking the dawn of a new era, where use of a crude spinneret in processing of glass gave birth to man-made fibers and fiberglass, as a result.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1583

Network Admission Control

The factors over which the networks can be categorized include the size of a network, the complexity of a network, a distance of a network, security of a network, access of a network and how [...]
  • Subjects: Computer Security
  • Pages: 14
  • Words: 3623

Moral Issues Surrounding the Hacking of Emails

The devises to enter into another people's email and steal information in the email is called Email Hacking. It should noted that stealing of valuable information through email hacking has become a phenomenon in both [...]
  • Subjects: Cyber Security
  • Pages: 9
  • Words: 2896

Research Critique of Management of the Difficult Airway

The reasons for this reading were to broadly assess a large legion of patients experiencing prehospital endotracheal intubation with and without rapid sequence intubation, and especially illustrate the incidence, presentation, and management of the difficult [...]
  • Subjects: Aviation
  • Pages: 9
  • Words: 2813

Provide Energy From Fusion Analysis

Energy conversion, for instance, is a foundational activity that is very critical in mechanical engineering now and even in the past."At first it was the steam engines, then a graduation to internal combustion systems of [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1580

Hf Rfid Electromagnetic Emissions and Performance

The research methods used in this work include the combination of the quantitative and qualitative methods with the study of the relevant previous research on the topic of HF proximity RFID systems.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 660

Introduction to Legal Technology

According to the facts presented in this case, Paul Jones was the first person to make contact with the attorney concerning his intention to divorce his wife.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1106

Simulink Broadens Video, Runs Simulations for Real-Time

Simulink broadens video as well as image processing with a wide range of provisions that are able to offer rich, customizable structure for swift authentication, execution, replication as well as the blueprint of video and [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1343

Information Technology System

Some important reasons for the IT projects failure in United Kingdom are From the above illustrated diagram it is clear that for the failure of an IT Project there are many reasons. Lack of skilled [...]
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2961

Analog to Digital Sound Processor

Variations in human voice pitch and tone affect a lot in the functionality of Analogue to digital converter. Generally, analog to the digital processor is used to convert the analog voltage or current in to [...]
  • Subjects: Other Technology
  • Pages: 25
  • Words: 6090

Computer Problems

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1056

IT Security: The Problems Analysis

A major problem like Hacking for IT and its related fields is hazardous to the security of organizational secrets since if a person can gain access to confidential information, that information can be used for [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 666

Linux OS: Review and Analysis

The Linux Operating System is a general term that refers to a Unix-like Operating System and it is based on Linux kernel.
  • Subjects: Internet
  • Pages: 2
  • Words: 557

Windows Vista vs. Windows XP

The new Windows Vista is highly recommended and it is mainly useful for a medium-sized information-service company and it rates higher than the current Windows XP for a number of reasons.
  • Subjects: Internet
  • Pages: 3
  • Words: 837

Advantages of Voice Over IP Technology

This can be transferred to the information technology staff that is more skilled in using it. The company will also be able to intensify its business activities in the internet through this technology that allows [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1152

Effective Project Management

Leadership and effective management help the project manager to direct and guide human resources and establish a positive culture and morale inside the organization The core of effective project management is effective control of all [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 868

Comparison of Privacy and Security Policies

Beth permits occasional and limited personal use of information technology resources subject to the condition that such use does not interfere with the user's or any other user's work performance and result in the violation [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 505