Tech & Engineering Essay Examples and Topics. Page 24

5,894 samples

Simulation of a Direct Detection Optical Fiber System

Meanwhile, the report will be discussing the procedures initiated during integration processes that includes the device parameters and stating all components required to make the device. Below are the procedures and the components used in [...]
  • Subjects: Programming
  • Pages: 5
  • Words: 1928

The Tactical Throwable Robot

The main technical characteristics of the machine are given below in the table offered by Czupryniak Rafal and Trojnazki Maziej in their article "Throwable tactical robot description of construction and performed tests".
  • Subjects: Robotics
  • Pages: 4
  • Words: 1151

Transnational IT Operations

Additionally, any organization that is planning to go global would best opt for the adoption of "transnational organization" as the model for making enterprises at a multinational level The field of transnational information technology has [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1460

Human-Computer Interaction and Communication

As the person is interacting with the gadgets or the computers, he should be favored by the design in that the system should be in such a way that it supports human usability.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1372

Impact and Types of Networks

The demerit of this kind of network is that if the server is faulty the entire network will be brought to a halt.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 713

The Importance of Web Portals

In some organizations the company portal is used by employees and clients to access important services that are available virtually. Tender's portals are used by bidders to bid for bidding tenders electronically which is much [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 645

The Terms in Online Communication Tools

E-mail client: this is a computer application that helps users to organize their e-mail since it can access the mailbox. It has rich functionality as compared to POP, since users can track the status of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 810

The Credibility of Web Pages

The first thing that justifies the reliability of a web site is the availability of detailed information concerning the person or the organization that created the website.
  • Subjects: Internet
  • Pages: 2
  • Words: 591

Willa Brown: Impact on the Aviation Industry

Through the analysis and perusal of relevant literatures, the study will in detail provide an informative and well thought out discussion as regarding to the various aspects of life as experienced by Willa Brown.
  • Subjects: Aviation
  • Pages: 10
  • Words: 3000

The Mechanics of Hydro Power Plant

Hydroelectricity is the type of electricity which is basically generated by the use of water. Therefore, the more the volume of the water, the higher the amount of electricity can be harnessed from the water.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2464

The Concept of Document Object Model

If the user wishes to add a book, then she must provide the title, first name and surname of all the authors, name of the publisher, and the year of publication.
  • Subjects: Programming
  • Pages: 10
  • Words: 1273

Project Management Knowledge Areas

One of the requirements that I should take care of is to get the timelines and the timeframes for the tasks at hand.
  • Subjects: Project Management
  • Pages: 2
  • Words: 593

Education and Training: Conversation System

The invention of the digital computer is believed to have been the turning point of the 20th century and the facilitator for the move from the Industrial Age to the Information Age.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2582

LAN Design for Return2Fender Company

This necessitates the requirements of ensuring a network is designed to link all the offices without compromising performance for the sake of business enhancement and continuity.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1247

What Is Spatial Database?

Again, modeling has been defined as a primary element to achieve success in the deployment of the project, and this is particularly true for the management of projects based on spatial databases, such as geographical [...]
  • Subjects: Data
  • Pages: 16
  • Words: 4490

ISDN, RIP, IGRP, and OSPF on the Cisco Routers and Switches

ISDN is digitally designed in such a way so that it can allow digital voice transmissions and also data transmission through the ordinary copper wires that are used in ordinary telephone circuits and in the [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1857

Blackberry and iPhone: Exploits of Smartphones

The trends in mobile technology changed the entire concept of mobile phones and different models are entering the market. Unauthorized calls from Blackberry and iPhones have, in many cases, caused threats to the security of [...]
  • Subjects: Phones
  • Pages: 14
  • Words: 3684

Dependability of Computer Systems

In the dependability on computer systems, reliability architects rely a great deal on statistics, probability and the theory of reliability. The purpose of reliability in computer dependability is to come up with a reliability requirement [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3384

Using Robots in the Medical Industry

Third, the robot surgery further has been observed to increase comfort on the part of the patient as the surgery proceeds, and this results from ergonomic position that the robot assumes as the operation proceeds.
  • Subjects: Robotics
  • Pages: 3
  • Words: 990

Software Engineering: Data Modelling and Design

It may be physical e.g.a toy car representing a real car or it can be conceptual, only represented on paper to bring a good description of the operation of the real object."A data model is [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1210

Establishment of a Saudi Car Maker Company

In this case, the project involves the construction of a car maker company in Saudi; the company aims to manufacture different models of cars and sell them within Saudi or even outside the country.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2710

The Overview of Information Assurance

It is necessary to establish the impacts and the degree of the risks in the group and learn which scenarios require the most attention.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 863

Introducing a Financial Company Into the Stock Exchange

The major objective of making the financial company in this case appears in the stock exchange is to; To be able to attract more capital to the company and in the process increase its financial [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2846

Autonomous Mobile Robot: GPS and Compass

The other realization is that in most instances the challenges presented in the motion of the appendages of a particular robot are not only limited to the number of joints but can significantly exceed the [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2538

Defining Data-Data Element Overview

A vendor Tracking ID is one of the specific examples of data elements used in a medical setting for the pre-requisite information that is used to define and format the data elements and validation values.
  • Subjects: Data
  • Pages: 2
  • Words: 632

Information Technology Project Management Standards

Project management involves the management of the scope to be covered, time to be taken in completing the project as well as the total cost of completing the entire project.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1070

Just-in-time Purchases and Extranets

On the other hand just in time purchasing is a new technology that uses information technology infrastructure to control the inventory and also the customers use the same system to make orders and also buy.
  • Subjects: Internet
  • Pages: 1
  • Words: 343

“Mastering IT and Business Metrics” by Cowan

This means that the IT governance needs to be reconsidered in terms of how the infrastructure can assist the business processes to be executed in a manner that will put the business on a competitive [...]
  • Subjects: Project Management
  • Pages: 1
  • Words: 291

The Definition of Ethernet Technology

The device that wants to send a signal incorporates the Mac address of the destination device to the frame to be sent whereas the other devices compare their Mac address with that one on the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 572

Simply Accounting vs. QuickBooks: Comparison of Programs

This paper makes a comparison of the accounting software, Simply Accounting with QuickBooks and Both Simply Accounting and QuickBooks share many common features; but for the selection of a particular accounting software program, it is [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 1461

Security Solutions for MANETs

The main aims and objectives of this research are to provide a solution for MANET networks in order to have secure communication between the source and destination.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 5014

Advantages and Disadvantages of Solid State Drives

In modern technology, the NAND-based flash memory is the standard for many solid-state drives. Solid-state drives are made up of DRAM volatile memory or the NAND flash non-volatile memory.
  • Subjects: Data
  • Pages: 2
  • Words: 715

Data Integrity in Relational Databases

To ensure that there is validity and accuracy of data, a database designer should be able to select the correct primary key that reflects the requirements of the database in regard to information search, updating, [...]
  • Subjects: Data
  • Pages: 2
  • Words: 740

Remote Data Delivery With Border Gateway Protocol

In most cases, the choice of a particular routing protocol depends on the time of scaling and convergence, the mode through which they plump for preferred routes and the ability to thwart routing loops from [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2387

Image Processing and Visual Denoising

Different values of the variables of the Gaussian noise, that is, both the mean and the variance were used and the resultant noisy image was as shown in the following figure.
  • Subjects: Programming
  • Pages: 6
  • Words: 2389

Computer Control System in a Laboratory Setting

In this case the iControl system is designed to control and monitor temperature variables of a hazardous liquid within a laboratory environment as well as other parameters such as smoke and light.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 786

Fault Tolerance of an Information System

In a soft fault tolerance focus is on data security incase an eventuality that hinder general functioning of the system is witnessed.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1777

Encryption as a Key Technological Solution to Corporate Security

This encryption technique ensures confidentiality of information as only the transmitter and the recipient have access to the secret key needed to decrypt the message. According to PGP conventional encryption is both fast as well [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1519

Information Technology Infrastructure

Anything to be communicated like a message starts at the application layer with the top layer and moves down the OSI layers to the bottom layer which is the physical layer.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 1261

Defamation on the Internet

One of the factors that have facilitated the increase of cyberlibel cases is the ever-increasing popularity in the use of computers and the internet.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2200

Impacts of Internet on Children Health and Addiction

Among the worst hit are children, who find themselves addicted to it given that they are in the process of development. To help nurture children's behavior, parents should educate them on the safety and risks [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1105

Internet: Wimax vs. Fiber Optics

5
The research will also seek to identify the level of awareness regarding the viability of both WiMAX and fiber optics technology in the deployment of access networks.
  • Subjects: Internet
  • Pages: 10
  • Words: 3135

Design of a Sar Radar System

The SAR antenna emits intermittent radar signals on the aircraft's path of flight and the reflected echoes- vary due to distance and the nature of the reflecting surface- are recorded and then stored by the [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 3263

Turkey – National Transmission Grid Project

The group project was designed to investigate the internal and external macro issues in the project; in this case the selected project for analysis was the 'Turkish electricity transmission company project' for the constriction of [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1837

Krakow Energy Efficiency Project (Poland)

This paper describes the Krakow Energy Efficiency Project whose project proponent were the World Bank and the Government of Poland. The first parameter was the satisfaction of the end-user consumer with regard to the standards [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2067

The Unethical Issues That It Auditors’ Participate

When carrying out their work, IT auditors should be concerned in understanding the individual behaviors of the users of the IS and the mode of making decisions in a bid to ensure or ascertain that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1214

Understanding Planned Change: What Not to Do and Why

The reason behind the failure of the project was that we never clearly documented the old project processes and procedures and how they were to be changed to the new ones were employing in the [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 825

Concepts of Technology; Good or Bad

Since the advent of industrial revolution, technological innovations have been the primary determinant of the quality of life, a fact that every individuals can attest, because of the human dependence on technology in everything they [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1182

The Issue of Poor Data Quality

Many organizations suffer from the problem of poor data quality and the result of this is huge overheads and expenses, which can lead to losses in an organization.
  • Subjects: Data
  • Pages: 2
  • Words: 754

International Software Development Ethical Issues

The major motivation for software development outsourcing has been the ability to reduce the cost of IT projects. The high demand for software applications has led to an increase in the number of software development [...]
  • Subjects: Programming
  • Pages: 7
  • Words: 2043

Universal Serial Bus / FireWire

In hot swapping feature, the USB is directly plugged into the port of the computer and PC automatically detects the presence of the new secondary device and it also configures the required software.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2211

Earned Value of Project Measurement

Following are the phases of a successful implementation of Earned Value Technique in the construction of High Rise Building: The earned values techniques are more effective if the large project is divided into small workable [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1138

Hubs and L2 Switches in IEEE 802.3 Based Network

But there are some differences in the behavior of hubs and switches in the network of such kind. They transfer data and frames between nodes on the local network segments, and in some cases correct [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 923

The Critical Operational and Strategic Need for ERP IT Project

An expert in ERP should therefore be the person to prepare the budget proposal professionally and be able to address effectively, accurately and timely the concerns and recommendations from all concerned stakeholders.
  • Subjects: Project Management
  • Pages: 2
  • Words: 645

The John F. Kennedy International Airport

The airport links the United States with the rest of the world being the main entry and exit point from the U.S.the JKF airport got its name from the 35th U.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1304

The Technology Today and in Future

The cell phone would be a true communications hub, connecting us all to all we want or need through a central hub, The phones would be very small and they would look like jewelry with [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1247

DSL Technologies and Other Internet Networks

Identifiers are placed on the headers of the packets and this enables the switches on the network to correctly recognize the packet and be able to foreword it to the correct switch within the network.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 804

Mechanical Engineering Lab: Chevrolet Engine Performance

The Objective of the experiment was to determine the fuel consumption of the Chevrolet 4. Several parameters of engine performance can be measured but the main and most important test is the power test.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1865

Socio-Technical Issues and IT Project

When the developers stick to the limits of the project, they will deliver a working project within the set project duration.
  • Subjects: Project Management
  • Pages: 2
  • Words: 659

Going Online: Pornography in the Online Era

Beyond the obvious quibble that, five years after the article in question was published, much has changed in the public's experience of the Internet, Patterson is afflicted by a lot of misconceptions about the nature [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 516

Dulles Corridor Extension-Deed Research

Based on the functional organizational chart, various stakeholders' participatory roles included the Project Sponsor and Grantee a role by the Airports Authority which was the "federal grant applicant and recipient and will have direct responsibility [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 1701

Registration of Partner Webpage

This project has been done in order to provide new web page on the company website where the potential partner can participate in a questionnaire which will indicate whether they have the necessary qualifications to [...]
  • Subjects: Project Management
  • Pages: 15
  • Words: 4201

Sakht Hamandishan Aran Company: Work Experience

In essence this report will be the summation of all that I have done in my practicum The company which I spent my three months with is called Sakht Hamandishan Aran Company, A contractor which [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1024

The Internet and Freedom of Speech: Ethics and Restrictions

Because of a lack of security technology, across the board prohibition is justified under the law, a concept that is in itself considered unlawful by a strict definition of the First Amendment of the Constitution [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1159

Sawtel Defender: Network Security

Integrated with the Microsoft Windows operating system it provides both the boost and control of Internet usage and policy-based of the company.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1640

Mobile and PDA Technologies Use in Education

It is a fact that things have become easy with the use of technology such as the Internet or the Worldwide Web and other Information Technology features, for example, software that make it easy for [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2970

Information Security and Privacy

At the dawn of the new technology and especially in this information age, protecting the same information is very crucial to it.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2546

Current Laws and Acts That Pertain to Computer Security

Since the advent of networking of computer systems through the intranet and internet, security of data and information has always been threatened by unauthorized access, use and modification of data.
  • Subjects: Computer Security
  • Pages: 18
  • Words: 5452

Computer Network: Electronic Mail Server

In practice, the major problem of sending messages to various different email addresses is typically solved by entering a list of multiple addresses separated by comma within the "To", "BCC", or "CC" fields of the [...]
  • Subjects: Computer Science
  • Pages: 20
  • Words: 5456

The Application of a Decision Support System at Tehran University

The University of Tehran, otherwise called "Mother University", is the largest and oldest educational center of Iran. The historical data that the university needed to support the analyses, managing, and make forecasting had been buried [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 940

Global Corporation Inc.: Data Protection Policy Statement

The most primary vulnerability that the company is subjected to is the fragility of security barriers that comes with every member of the company carrying confidential data on their laptops. However, all individuals are expected [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 965

The Slick Jim’s Used Cars: Three-Phase Spreadsheet Calculator

Jim has also seized on the chance offered by the presence of RMIT students to provide the company a system that will more reliably generate reports around gross revenues, advertising costs, a schedule of insurance [...]
  • Subjects: Computer Science
  • Pages: 28
  • Words: 1540

The Technology Behind Bing Maps

Bing Maps was developed by Microsoft in response to the business threat posed by Google who also offers Google Earth Pro, for the visualization and mapping of much of the world using satellite imaging from [...]
  • Subjects: Data
  • Pages: 2
  • Words: 681

Self Assure Company: Quality Systems

Reliability of the software is one key concern; the software should be able to perform the tasks that have been formulated in the feasibility study and analysis stage. If the users of the system are [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 2858

Digital Systems Virtual Local Area Network

A VLAN saves the situation of the user when the network gets so large and is encountering much traffic. Frame tagging is the criteria used to determine the logical grouping of nodes into a VLAN.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 827

Tenerife Plane Crash

The whole chain of events contributed into this disaster; they ranged from bad weather, human errors, fatigue, and impatience to the lack of communication between the captain and the crewmembers in the case with KLM [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 638

Civil Engineering Assessment: Fire Safety in Buildings

According to the 'Review of the Building Regulations 2004: Section 2 Fire,' fire safety main aims are to ensure the protection of life, achievement of sustainable development, and assist the fire and rescue services.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2053

Eastern Flight 40: Reasons of Crashing

This shows that communication in the cockpit was practically absent, that the crew resource management was not successful at a,ll and that the members of the crew were not sufficiently trained before the flight.
  • Subjects: Aviation
  • Pages: 2
  • Words: 608

Security of E-Mails

As stated in the paper being analyzed, this is the latest version of S/MIME and has a number of Enhanced Security Services such as secure mailing lists that allow just one digital certificate to be [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1155

Image Based Human Pose Estimation the Survey

The methods being used for posing human inference is done with high clarity and ability to separate the subject of interests to the background in which they are.
  • Subjects: Computer Science
  • Pages: 15
  • Words: 4172

Nanotechnology: The Technology for the Twenty-First Century

Applications used in the field of nanotechnology are based on the physical properties of the material used within the sub atomic range. In the field of chemistry, nanotechnology is used in the catalysis of chemicals [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Java Engagement for Teacher Training Workshop

Advanced Placement is one year course in which the college board gives two exams in computer science to students in high school9namely.the division between computer science A and AB, A is part of the content [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 629

Airports and Ground Handling

Put simply de-icing is the removal of the ice and frost that already adheres to the framework of the aircraft and anti-icing is the taking of preventive measures to see that ice does not form [...]
  • Subjects: Aviation
  • Pages: 5
  • Words: 1582

Honeypots and Honeynets in Network Security

Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of the internet.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1968

Cyber Crimes: Court – United States vs. Ancheta

Reasoning: The jury argued that the defendant conspired to violate the Computer Fraud Abuse Act as well as the CAN-SPAM Act, caused havoc to computer networks of the national defense department of the federal government, [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 548