Tech & Engineering Essay Examples and Topics. Page 28

5,866 samples

Internet as a Communication Tool

In my form, I have undertaken tests which were both related to the application for writing positions The tests are SDIS and involve speed and critical thinking which if not taken with the care of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 908

Technological Facilities: Computers in Education

The researcher chooses the students who study in the high school stage to investigate the issue of computer usage in high schools Physics classrooms in Saudi Arabia because different computer software is highly beneficial for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 842

Generation Y: Beta Testers for Prestige

It is, therefore, of little surprise that it is this generation and this age range that gave way to the development of 'beta' modes.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 724

System Safety Engineering: Hazard Analysis

According to the authors, FMEA can be utilized in the industry for the purpose of identifying "potential failure modes, and their causes and effects" on the performance of the system in engineering management.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1807

Nuclear Life Cycle: Hazards and Risks

Other processes that includes in the aspect is the subsequent cleaning of the systems that were used in the processes of the plant and which are "contaminated radioactively", the removal of the unused radioactive fuel [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2642

Cyberbullying as a Serious Issue

However, it is easy to postpone the completion of the course work and take a longer time to complete a course.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Wireless Criminal Tracking Devices

The dimensions and parameters may be adjusted by the necessities of the organization that performs tracking, and the aims of the tracking in general.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 819

Computers’ Critical Role in Modern Life

The manner in which the military operates in the modern world has completely been influenced and revolutionized by the use of computers.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2909

The Internet, Globalization and Network Society

The embracing of the internet's usage as a means of communication in the future will depend on the evolvement of people's quality of online relationships and the amount of time people are bound to be [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 836

Communication Process: Mobile Phones as Fashion Statements

In general, the research may be regarded from the perspectives of the communication process development, as the importance of cell phone communication should not be underestimated, and the influence of this communication on other aspects [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 561

Majoring in Fire Engineering: Why to Choose

Some of the reasons I have identified to cause these fatalities are lack of essential skills by the society while fire fighting departments have been found not to have the necessary fire fighting facilities.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 574

Reliance Levels in Web-Based Applications & Offline

For one to succeed in any area of life, one needs to have the self-assurance that you can perform the intended goals and be persuaded that no matter the limitations that may come forth you [...]
  • Subjects: Technology Effect
  • Pages: 25
  • Words: 6985

Information Retrieval System and Its Evaluation

A web is the most place of retrieving information of wide area ranging from scientific to general information, there are variety of search engines available for search, each of the search engine retrieves information different, [...]
  • Subjects: Internet
  • Pages: 9
  • Words: 2479

Phenomenon of the Software Liability

To start with, the universal code of ethics for software programmer calls for the software programmers to ensure that they provide quality services to the users of these software.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1106

Tutorial on How to Use Interactive Video Conference

This technology of video conferencing has been widely utilized by leaders of governments such as United States and Russia as well as other countries in the world to interact without covering thousands of miles for [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1593

Net Neutrality: Freedom of Internet Access

In the principle of Net neutrality, every entity is entitled access and interaction with other internet users at the same cost of access.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1239

John Searle: Can Machines Think?

He says that according to strong AI, the computer is a mind if it is well programmed, that is, it can be said to understand things if it is given the correct programs.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 1001

The Five Developments of the Computers

The motherboard is the main circuitry in the function of a computer machine, each component in a computer is connected with the motherboard.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1652

Networks and Databases and the Overstock.com Company

The firm is also able to effectively identify the factors that motivate customers in the process of making purchase decisions. For instance, the management will be able to know the buying behaviors of their customers [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 521

Safari, Google Chrome, iPad – SWOT Analysis

The preceding edition of Safari for Windows noticeably altered the nature of the browser from something of an incomplete curiosity to a substitute with critically quick chops. The investment has now extended to include the [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1379

Fire Safety Strategy for Multi-Storey Buildings

In serious fire outbreaks, the consequences can be very bad and often result in, business closure, the destruction of property worth lots of money, loss of livelihood, displacement, and damage of property, causality in human [...]
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2571

History of the Personal Computer: From 1804 to Nowadays

The Analytical engine was a far more sophisticated general purpose computing device which included five of the key components that performed the basic of modern computers. A processor/Calculator/Mill-this is where all the calculations were performed.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1346

Business Proposal Project and Macroeconomics Policy

The purpose of this paper will be to come up with a unique technological innovation that the company can invest in order to meet the needs of the clients and the suppliers.
  • Subjects: Project Management
  • Pages: 6
  • Words: 1707

Software: Product or Knowledge?

The software however is the product of the knowledge. Likewise software is a product of knowledge in programming but it is not the knowledge itself.
  • Subjects: Programming
  • Pages: 3
  • Words: 952

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Expansion of Optus Mobile

It is for this reason that I have chosen to write a report including a case study of the working of the mobile industry in Kenya, so that Optus, the company I am working for [...]
  • Subjects: Internet
  • Pages: 11
  • Words: 3860

Reconstructing for Handicapped Students: Project Time Management

Originally, the reconstruction process requires the adaptation of various facilities for increasing the comfort of using them for the students with disabilities, nevertheless, the reconstruction process itself requires detailed preparation and creation of the required [...]
  • Subjects: Project Management
  • Pages: 7
  • Words: 2194

The Nature of Avatars

Although the avatars are representatives, they have to be controlled by users who are in charge of the games, web discussions, and online communities.
  • Subjects: Internet
  • Pages: 4
  • Words: 1204

Cultural Industry: Changing Nature of Technology

However the cultural industries tend to vary from one country to the other. Irrespective of the cultural industry, all of them depend on new technologies and innovation to survive in the market.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1702

The Different Sides of Hacking

In a general sense, computer hacking involves the intrusion of the computing privacy of other people, damage of the computing property of other people like files, software etc.or the theft of private information by unauthorized [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 575

Ways to Improve Google Performance

According to the philosophy that inspires the work of Google, its strategy of work is formed on the basis of its two main objectives: its priority is the organization of the information around the world [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 899

The Review of xDSL Technologies

The transceivers usually installed at telephone exchanges or central offices must be able to separate the voice and data traffic, the voice traffic is usually sent over the PSTNs while the data traffic may be [...]
  • Subjects: Phones
  • Pages: 11
  • Words: 3098

Comparison of Apple Versus Windows Based Laptops

Windows 98 was released in 1998 and the second version of it was released in 1999. A more developed version of windows called windows vista was released in 2006 and its server was released in [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1706

Conceptualising Cultural Environments

The youth consumption in the modern economies of developed cities and nations has massively grown; as a result of the development of the world's technological advancement, which has occurred in most developed cities and nations.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 796

Technology and Type of Powers on the Workplace

Surfing the internet can also be said to reduce stress as it offers a form of interaction with people in the outside world On the other hand, technology can be said to increase stress due [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 774

The Researching the Matters of the Internet

Originally, digital democracy is regarded as the process of governing local communities, and for the strict control of the moods and processes within the society, thus, e-democracy and digital democracy may be the effective control [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1401

GIS Project: Global Warming and Its Causes

For the GIS project, it is necessary to study the main aspects and problems of global warming and the way it affects the geographic presentation of the planet.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 585

Geographic Information Systems and Science

Geographic information systems can provide doctors and scientists with the pandemic spread of disease by modeling geographical conditions in the given area and thus giving the idea of the impact of the disease on the [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2111

Geographical Information System: United States Project

One of these scales that are used in the preparation of the maps is the representative fraction or the RF scale and it indicates the number of units on the earth's surface that are equal [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2222

“Shrinking the World” by John Freeman

The text that has been chosen for the discourse analysis of meanings is the review of the book called Shrinking the World: The 4000-year Story of How Email Came to Rule Our Lives that is [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2125

Kiboko Technology INC: Marketing Strategy

Enhancing product awareness in the market will help the company reach potential customers who may be willing to use the product but are not aware of how to use it. Informing the target market about [...]
  • Subjects: Phones
  • Pages: 4
  • Words: 1151

Hardware and Operating Systems

All the computer systems in a given campus will be connected to a server in the campus using Ethernet via a hub.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 2056

Malware: Code Red Computer Worm

The worm used the vulnerability by running a long string of the repeated character 'N' to get entry to the computer.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 840

Should Parents Use Monitoring Software?

Some of the strangers may be pedophiles and sexually assault the children; others may be kidnappers and try to keep the children for a ransom.
  • Subjects: Internet
  • Pages: 2
  • Words: 588

Flight Physiology and Human Factors Principles

In the situation where a pilot breathes in the air at high altitudes, there is usually insufficient oxygen pressure to allow ample quantities of oxygen into the casing of the lungs.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2485

Technology and Lifestyle in the United States

The people of America has made well use of it and extracted the cream of these blessings to produce energy and speedy transport; all of which led to the building up of capital that has [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1449

High-Tech Harvest and Technology of Destruction

In the beginning of the article, the author provides a history of military innovations and the way they sophisticated the war action thus increasing the scales of weapon application and the number of victims.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 652

Co-Branding Effects on Product Attribute Preferences

It should be noted that the wide recognition of the partner in co-branding is seen as one of the aspects, where the importance of other elements such as the attributes of the product and the [...]
  • Subjects: Phones
  • Pages: 5
  • Words: 2501

Problem of Service Carrier AT&T Study

At the time, however, palpable excitement about the iPhone being a category killer because of its numerous innovations managed to sidestep the questions of whether the sign-on glitches were due to the new hardware/firmware, the [...]
  • Subjects: Phones
  • Pages: 3
  • Words: 536

Psycho-Cybernetics Breakdown

The negative feedback is meant to tell the mechanism to correct the course and move in the right direction like in the case of a torpedo.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1390

Multimedia Elements in the Website of the Maya Hotel

Please refer to picture 1 to see to get a better idea of this multimedia element: The combination of yellow and pink colors helps to draw the viewers attention to the name of the hotel.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1617

The United Airlines Flight 232 Accident

Such factors as crew's strategy, their interpersonal communication, and cooperation, as well as the involvement of the crew members and flight attendants in the communication process, prove the efficiency of the CRM in this particular [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 862

Seat Belts And Seat Belt Laws

Some factors that may affect fatality regardless of the use of the seat belts or not include the speed of collisions, the number of passengers in the vehicles that are involved in an accident, the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2967

Mobile Texting and Chatting Negative Effects

Linguists and communication experts often argue that close to ninety percent of one's conversation is not what is said it is actually how one says it and the body language that the person uses.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1313

Incident Command System in a Disaster Situation

The silver is the one who devises the tactics to be deployed in the operations of the team while the bronze roles are to control and ensure the resources at hand are distributed equitably to [...]
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2565

Texting Phenomenon: Practical Usage

Text message is a term used to refer to individual messages because in most cases, the messages are exchanged between individuals.
  • Subjects: Phones
  • Pages: 10
  • Words: 2748

Implementation of the RFID at Edith Cowan University

This paper will focus on the application and implementation of the RFID technology in the libraries, giving a case study of the Perth-based Edith Cowan University, which has successfully implemented the RFID technology to manage [...]
  • Subjects: Technology in Education
  • Pages: 12
  • Words: 3660

Pricing Strategy for www.three.co.uk

Additionally, one of the other objectives is to assist the controller for realizing the necessary functions for emphasizing the potential growth variables of mobile future as what are the capabilities and lacking of handset internet [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2736

Ethics of New Technologies

On the other hand, the right and duties act is of the opinion that ethical acts are the ones which acknowledges other individuals rights and duties imposed by such rights.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 826

Corporate Welfare Public Policy

In that regard, it can be stated that the rationale of TIP can be seen in addressing the controversial aspects of ATP, which can be seen in the program's provisions, such as the restriction to [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 548

Shaping and Profiting From the Computer Revolution: Bill Gates

The story of how Bill Gates helped lay the foundation for the desktop personal computer revolution first by cooperating with Steve Ballmer to "port" the mainframe language BASIC for microcomputers right in their Harvard dorm [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 627

TUI University: Computer Capacity Evaluation

Evaluation of the computer capacity and the system, in general, will help the institution plan for the system so that at any given time, the needs of a user will be met.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 613

Why Internet Filters Should Be Used?

Internet filters give parents a sense of control over their children in the only area of their lives where parents cannot get in, that is the internet.
  • Subjects: Internet
  • Pages: 2
  • Words: 723

How to Light a Fire in a Fireplace

The latter paper is an instruction manual on how to light a fire in a fireplace. Additionally, it is intended for holiday makers who are susceptible to cold temperatures.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 817

“The Real Transformers” by Robin Marantz Henig

The addition of "Real" in the title clearly indicates the theme of the article, in which the gap between the progress in the fields of robots and science fiction predictions casts doubt on whether we [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 572

Internet Security: Why It Is So Important Nowadays

This indicates that while safeguards are in place, they are not yet effective enough to completely prevent this type of crime."But to keep things in perspective, bear in mind that the value of online transactions [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1620

The American Registry of Radiologic Technologist

The American Registry of Radiologic Technologists is the body charged with the certification and registration of all the radiologic technicians in the United States of America.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 858

Mapquest : Mapping Project

5
The maps provide a point-to-point instruction for driving and all one has to do is to enter the address of the starting location and the ending location.
  • Subjects: Applications
  • Pages: 4
  • Words: 1160

Antique 2000: Project Plan for the Development of a Web-Based System

The reason is simple: modern-web based business solutions are capable of increasing profitability by exposing the enterprise to a world-wide market, and by transforming the nature of the enterprise relationships with its key stakeholders the [...]
  • Subjects: Applications
  • Pages: 14
  • Words: 4185

The Effectiveness of the Computer

The modern computer is the product of close to a century of sequential inventions. We are in the information age, and the computer has become a central determinant of our performance.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1225

Issues With Data Mining

It is necessary to note that the usage of data mining helps FBI to have access to the necessary information for terrorism and crime tracking.
  • Subjects: Data
  • Pages: 2
  • Words: 558

NSPE and SFPE Code of Ethics: Comparing the Provisions

Claiming credit for the work of another individual is a violation in accordance with the code of ethics which directs engineers to "not falsify their qualifications or permit misrepresentation of their or their associates' qualifications.
  • Subjects: Engineering
  • Pages: 2
  • Words: 612

Networking for 100 Users

The next device, which we have used, is a router, which sends the user's message over the WAN created, to its destination point.
  • Subjects: Internet
  • Pages: 2
  • Words: 549

IBM WebSphere Model and Products

Certain WebSphere products allow modeling of corporate business processes, connecting with the systems of customers and business partners, direct monitoring of business processes, applications integration, and management of effectiveness and optimization of business processes.
  • Subjects: Applications
  • Pages: 4
  • Words: 1126

Importance of Help Desk

As the word indicates, help desk is for helping the public for the smooth running of their activities. I sent an e-mail to the helpdesk.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 706

Why Are Passwords Compromised by People Who Use Them?

So the tendency is for that person to use the same username and password for a majority of his accounts. As a person who relies heavily on the internet for my daily activities and tasks, [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 1025

Application and System Software

Enterprise software is built according to the buyer choices and requirements and the opinions of actual users of the software are not taken into consideration.
  • Subjects: Applications
  • Pages: 2
  • Words: 630

Shelfware: SAP’s myCRM Issues

The problem is that due to this the effectiveness of the CRM software can be questioned since the organizations boast of CRM as one, which helps companies increase customer loyalty and save money.
  • Subjects: Applications
  • Pages: 3
  • Words: 846

Intelligent Surveillance System

The creation, as well as deployment of automated or intelligent surveillance systems, is due to the fact that there is increased importance associated with closer scrutiny as far as the military, public as well as [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2204

Fire Protection and Fire Alarm Systems

These are chlorides, which define the density of the foam, and the extent of oxygen isolation. The designs of the nozzles, and the fire suppression systems that should be used in hangars generally depend on [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 539

Basic Principles and Functions of Electrical Machines

The difference in the mode of operation between these two machines is that in the induction machine, alternating current is relayed to the stator and induced in the rotor by the action of the transformer [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1713

Web Analytic Tools Overview

Calculation is done on the basis on the potentiality of the web site to attract web surfers. Unique Visitors: This refers to the number of different uses that could be visiting the site.
  • Subjects: Internet
  • Pages: 11
  • Words: 3455

Script Kiddies: Strategic Information Management

The programs available also allow the script kiddies to prompt the programs to conduct operations in the background where the users are not aware of the multiple operations that are taking place in the computers.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2230

Script Kiddies and the Threat They Pose

In many countries, hacking is not allowed but the penalties that are placed when one is found to have broken into a system are not sufficient.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2361

The Monopoly of Google in Digital Library

The launch of Digital Library shows that when the conditions for monopoly are prevalent, that is, no barriers to entry and exit, perfect information for business decision-makers and consumers, perfect rationality on the part of [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1419

Evaluation of Macbook Laptop

The level can be as high as 160 GB hard disk which is double the original in the case of the black Mac Book.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 644

Resource Description and Access (RDA) in Library

It is printed together by the Canadian Library, The American Library Association, Association as well as the Information Professionals along with the Chartered Institute of Library within the UK.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2396

United Kingdom Building Fires

According to the report, the number of deaths as a result of fire incidence across the United Kingdom was reported to be five hundred and eight in 2004 representing a slight reduction in the number [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2496

Phase Gate Methodology: Project Management

Phase gate methodology as the name suggests, one ought to construct gates at the end of main phases in the project which of course will be the entry point of the major phase.
  • Subjects: Project Management
  • Pages: 5
  • Words: 1544

The Industrial Buses Comparison

The target market of Foundation fieldbus and DeviceNet are close to each other, in terms of their common specification for the industrial network.
  • Subjects: Engineering
  • Pages: 2
  • Words: 620

Macintosh vs. IBM for Personal Usage

The perpendicular incorporation technique is used in the manufacture of Mac into which the entire Apple hardware parts are integrated and also the personal operating system of the Mac is preinstalled.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1685

Emerging Trends in Information Sharing

The popularization of the use of social networking sites as a means of establishing contacts with friends and making new ones, has significantly contributed to the manner in which information is shared amongst individuals and [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 1121

Interactive Smartboard: Advantages & Disadvantages

But the interactive Smartboard is not just a way to entertain teachers and students or avoid using the chalk, it is not "a new toy for the teacher to relieve the boredom of delivering the [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 580

Open-Source Software and Its Benefits

The initiative informs and promotes the advantages of open source in linking assorted divisions of the open-source society. Controlling the movement of technology in the software industry is possible by using the open source database [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 812

Next-Generation Software for Organizations

The next-generation database software should be such that it fulfills all the needs of the next-generation organizations. The next generation database software overcomes the problems of the current database software.
  • Subjects: Applications
  • Pages: 3
  • Words: 853

Target Audience for PS3 Console

They would be in the range of our target group, and they are the most likely ones to buy a more advanced console-PS3 also for the same reason.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 619

Analogical Reasoning in Computer Ethics

This aspect of reasoning enables the application of what is deemed to be morally wrong in society and relates it to computer technology.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 555