Tech & Engineering Essay Examples and Topics. Page 32

4,308 samples

Spatial Data Division of Abu Dhabi Municipality

First the customer goes to the customer service to fill up the request form and inform the office of the request's rationale and the coverage area of the project or study.
  • Subjects: Data
  • Pages: 14
  • Words: 3603

The Future of Software Development

With the kind of efficiency and effectiveness that Scrum has demonstrated in previous projects, it is strengthening the weak lines and minimizing the possibility of errors persisting for a long time.
  • Subjects: Programming
  • Pages: 4
  • Words: 1087

IT Resource Actual Contingency Testing Plan

Another consideration in planning for contingency is the presence of human mistakes in the design and the operation phases of the system.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2989

Quay Cranes Weight Management Problems

In the article called "Quay crane scheduling problem" the authors recognise the problem with quay crane scheduling due to the growth of container traffic.
  • Subjects: Programming
  • Pages: 3
  • Words: 838

Computer Games: Morality in the Virtual World

It is necessary to note that these sets of morals are often employed in the virtual world only as many people create alter egos when playing games.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 585

Attribute-Based Encryption Overview and Benefits

The features of the public-key encryption include cryptography, public, and private key. As a result, the user can secure and authenticate data integrity using the private key.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 831

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Evaluation of the BackTrack Software Suite

According to the reviews, BackTrack can be easily used in the commerce environments because of the open access to the tools, and BackTrack is "good for web application assessment", and it is "perfect for penetration [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 873

The Recommendations of the American Welding Association

One of the recommendations that are common in most of the sources analyzed in this research is that anyone working in an environment where there is a risk of chromium and nickel fumes should make [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1971

The Software Engineering Debate

The second reason the author adduces to his view that software development is not an engineering activity is the lack of standardized approaches to software development.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1148

Physical Disabilities and Assistive Technology

For example, learners with visual impairments can use text-to-speech programs. Learners with physical disabilities can be gathered for with the help of assistive technology devices such as adaptive keyboard and screen reading software for learners [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 663

Cryptology and Data Protection

The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 955

Observance, Privacy and Law

It is important for social media users to realize that social networks are not fully concerned with the probability of misuse of their personal information.
  • Subjects: Internet
  • Pages: 2
  • Words: 540

Internet Filtering: Debating the Positives & Negatives

Moving on to the exposition of the positives, it is clear that uncensored access to the Internet may impact negatively on the teenagers' attitudes, behaviour and safety, hence the need to employ Internet filtering.
  • Subjects: Internet
  • Pages: 4
  • Words: 1104

Internet Use Policy at Fairleigh Dickinson University

In discussing the ethical issues, it is imperative to note that personal use of the Internet broadens the ideological divergence between the employer and the worker, which is further polarized by the contrast between economic [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1163

Data Mining Role in Companies

The increasing adoption of data mining in various sectors illustrates the potential of the technology regarding the analysis of data by entities that seek information crucial to their operations.
  • Subjects: Data
  • Pages: 4
  • Words: 1137

Data Warehouse

In a bid to get to that end, the data has to pass through data acquisition, which refers to retrieval of information from the data sources; that is, "a set of processes and programs that [...]
  • Subjects: Data
  • Pages: 15
  • Words: 4161

Digital Signatures in The Business World

A digital signature is a cryptographically designed code that is attached to an electronic file to verify the authenticity of the sender.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 948

Low-Power Microcontrollers

Power supply from portable batteries has a significantly low voltage component, which affects the efficiency of the supply and the ability of the devices to adapt to the capabilities of the batteries.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 883

Censorship on the Internet

Censorship in the internet can also occur in the traditional sense of the word where material is removed from the internet to prevent public access.
  • Subjects: Internet
  • Pages: 9
  • Words: 2516

Green Computing in Botswana

The primary goal of green computing is to mitigate the use of harmful resources. Section B of the questionnaire focused on assessing how the respondents handle computers.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Procedural Programming Languages

For instance, the development and deployment of the Net Express software package by Micro Focus Ltd has provided an ideal environment for COBOL coders."This makes it easy and fast to build and modernize COBOL enterprise [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 600

Relational Database Management Systems

Relational database management systems improve productivity, speed and flexibility of data management in an organization through a design that encourages a clear boundary between the logical and physical aspect of database management system.
  • Subjects: Data
  • Pages: 2
  • Words: 615

Cloud Computing and Amazon Web Services

Amazon EC2, Amazon S3 and RightScale are designed with capability to adapt with the size and amount of data and the number of users.
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 819

Augmented Reality Technology

The cost effectiveness of this technology arises from its ability to keep a project on track, and this is the cost benefit of augmented reality.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1291

Pipeline Installation Elements

This must take into account the line size of the pipeline and the length of the barrel. Design Pressure The design pressure must serve as a basis for determining the thickness of the wall of [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2790

Programming Logic and Design – Program Change

In the online processing method, processing of data takes place as it is input into the program, that is, unlike in batch processing it does not wait for the data to be organized into a [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 605

Value of Smartphone Security

The security standards include the use keystroke dynamics, monitoring the time of key holding, the flight time, multiplayer access regulations, priority regarding the application accessibility.
  • Subjects: Phones
  • Pages: 6
  • Words: 1678

Is Thunderbolt the Real Deal?

The Thunderbolt technology storage devices provide an opportunity for manufacturers to continue in the process of providing both professionals and consumers with quality devices.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 759

People Attitude about Green Computing

The first category is composed of the direct effects of the information technology products on the environment. The country leads in terms of the wide use of computers and other information technology devices.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 837

Technology and University Culture

In an interesting correlation between technology and university culture, Stephen Marshall presents the notion that it is the very culture within universities that ascribe to a set of strict fundamentals and organizational practices that limits [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 613

History of Cyber Terrorism

Terrorism on the cyberspace is one of the biggest challenges that came with the invention of the internet. The nature of the environment used in internet communication and socialization makes it hard for people to [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1204

Can the Internet Provide a Forum for Rational Political Debate?

The comparisons drawn between the Internet and its usage, on the one hand, and the radio and television, on the other hand, help to develop constructive discussions and arguments concerning the possibility of the Internet [...]
  • 5
  • Subjects: Internet
  • Pages: 16
  • Words: 4330

Addressing Information Technology Access Challenges for Students

The main purpose of the proposed study is to critically evaluate viable ways modern distance teaching universities can employ to deal with the challenge of lack of access to information and communication technologies that are [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2269

The Effectiveness of Using Podcast Lectures

The research seeks to indentify if learning using podcasts is more effective and beneficial to the students as compared to the traditional classroom lectures.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 868

IT Security in Google

The Google's New Privacy Policy is just an attempt to ensure high-level security of an individual's data and improvement in the search field.
  • Subjects: Internet
  • Pages: 2
  • Words: 585

Cyber Attacks: The UK and China

Reflection on the advantages of the strategy adopted by the two governments The above analysis shows that the UK is more effective in dealing with cyber crime as compared to China.
  • Subjects: Internet
  • Pages: 2
  • Words: 615

Fire Safety in the Health Care System

Automatic fire alarm systems have either smoke or heat detectors that sense the presence of the smoke and heat respectively and sound the alarm to alert occupants to evacuate.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1999

Analysis: Domain Name System (DNS) and DNS tunneling

In addition, it requires an MX record in DS for the domain of the mail sender Ptr This character is the reverse map query on the PTR of the on-source RR Include:isp.com This is the [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2917

Ways of Strengthening Reinforced Concretes

As such, steel or RFP are some of the most commonly used concrete reinforcement materials to increase the strength of the structure and the ability to resist tension.
  • Subjects: Engineering
  • Pages: 5
  • Words: 896

Security in the Information Communication Technology

These include adapting the users to the system and getting the involvement of users through soliciting their input on ways of advancing the system. The corporate governance of the information security ought to begin from [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3185

Ethical Issues Surrounding Social Networking Sites

Social media can also be used to track the activities of users. It is important that measures be taken to control some of the ethical issues associated with social media, especially issues of privacy.
  • Subjects: Internet
  • Pages: 3
  • Words: 922

The Key Features and Objectives of an Incident Command System

In response to the disaster that occurred, the framework involved executing the activities that fell under the responsibilities of the incident commander, one of them being to establish the incident response program.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 828

Webinars in Education

When it is night-time, some participants may be very exhausted and will not have the enthusiasm required to actively participate in the seminar sessions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 265

Quality and Rapid Application Development

One of the main concerns that arose from the use of RAD was that the quality of the software produced did not always meet the quality standards for software projects.
  • Subjects: Programming
  • Pages: 14
  • Words: 3741

Cloud Computing Security Issues in Enterprise Organizations

This paper will set out to show that while there are significant security threats that an enterprise faces when it migrates to the cloud, there are solutions that can be implemented to mitigate these threats [...]
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2908

Construction Safety in Latino Community

The study seeks to: Examine the prevailing status of construction safety and accidents among male workers in the Latino community, especially in the construction industry.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3914

Business Continuity and Crisis Management

The biggest challenge for an organisation operating in a disaster-prone business environment is the development of mechanisms of predicting risks and ways of protecting their brands from collapsing in the event of organisational crisis.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2827

Company Conceptual and Logical Data Views

On the one hand, the American Express keeps in pace with the time, employing the latest technologies to satisfy the clientele; on the other hand, some of the customers' complaints concerning the quality of services [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1156

Integrating Technology Into the Classroom

The types of quantitative information that would be helpful for evaluating the effectiveness of the imposed measures include the results of students' standardized tests and statistics data as to the rate of students' dropouts after [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 831

Integrated Safety Management System

However, ISO 14001 is biased towards the protection of the environment and while there are many constraints as a result of the merger of these two systems, the addition of ISO 9001 further complicates the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 939

Adrian Lamo’s Hacking: Is It Right?

The example of Galileo introduces a theory about the construction of the Solar System that was the target of interest of the well-known scientist.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 602

The Samsung Galaxy Tab

It should be noted that the Galaxy Tab is based on the successes of the Galaxy S.whereas Apple's iPad was the first of such gadgets into the market; Samsung already had Galaxy S in the [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 868

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1864

Concept of Bonded Wire Strain Gauges

The first type is referred to as fine wire strain gauge, the second type is known as metal foil wire strain gauge while the third one is known as semi-conductor bonded wire strain gauge.
  • Subjects: Engineering
  • Pages: 2
  • Words: 666

The British Aerospace Company: Tornado Aircraft

The kingdom of Saudi Arabia is one of the most important countries not only in the Middle East, but also in the globe. Fuel is usually stored in the fuselage which is located in the [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2638

Fire Plan Design and Prevention System

The formula for calculating the need fire flow is: The need fire flow for 25% involvement will be 1333. The water aids the fire departments when the building is on fire.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 585

How podcasts differ from radio

The internet is less subjected to the limitations on the scope of coverage that are radio experiences. The role of content creation is also easy for podcasts in comparison to radio broadcasts.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 557

Legal and Ethical Issues in IT

The fact that technology keeps changing adds to the complexity of the ethical and legal issues surrounding information technology. One of the most significant ethical issues in information technology is that of appropriate use.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Information and Data Value

As far as the success of Return on Information metrics application is determined by the objective setting; it is logical to suppose that ROI is to be managed by the strategy marketing department likely to [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 604

Fabrics of the New Millennium

As for the potential novelties, the clothes that adjust to the environmental settings or the accessories of the customer might be one of them as the desire and passion for ergonomics and development do not [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 616

DATA and Information Security

According to Smyth, the consequences related to the loss of data that was in the custody of the organization demonstrate the vulnerability of the organization's information systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 604

Monopolistic Competition of Smart Phones

In the flurry of the responses that followed, there was concern whether the smart phone market was becoming monopolistic. This was a clear indication that the competition in the smart phone market was becoming monopolistic.
  • 4
  • Subjects: Phones
  • Pages: 3
  • Words: 863

The Infrastructure of Cloud Computing as a Service

Typically, the entire system of cloud computing drawing from its definition provides the infrastructure for organizations to offer clients services dynamically responding to their needs based on the pay-as-use basis, and the economic benefits which [...]
  • 5
  • Subjects: Cloud Computing
  • Pages: 15
  • Words: 4383

Human Computer Interface: Evolution and Changes

The conferences will not require members to be there in person as the events can be transmitted to people in their homes and they can make suggestions too.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 568

Unleashing web 2.0 for African learning

In order to attain a higher degree of student perception of learning as well as engage students in the process of learning in Africa, a constructivist approach ought to be put in place.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2821

Miniature Camera on Soccer Shirt

The issue is that some of the motions and rapid movements may lead to confusion, and it is paramount to take all the necessary measures to make sure that the level of stability of is [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1664

Integrating Technology into the Classroom Research Method

As far as the present research on the impact of technology on the students' progress is concerned it is necessary to use the mixed approach which will reveal adequate and valid data and thorough analysis [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 871

Video Game Effects: Good or Bad?

Given the fact that there is indeed a logically sound rationale to such a suggestion, throughout the course of conducting my study, I remained thoroughly observant of the article's classification-related suggestions, in regards to the [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1290

The changing role of technology in higher education

However, the history of technological usage in modern education began with the application of educational films in learning during the 1900s and the Presseys mechanical-teaching machines during the 1920s.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1416

The Charleston Sofa Super Store Fire

The crew around the back side of the building noticed that the fire was in the loading dock area and was threatening the showroom".
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 846

Content Analysis Method

The unit of analysis is the smallest meaningful unit analyzed by the researcher. This type of analysis can be implemented with the help of software.
  • Subjects: Applications
  • Pages: 2
  • Words: 565

Future for mobile handsets in UK

The purpose of the project is to identify the following Mobile Phone Gadgets and their use in the United Kingdom Technological advancement of the mobile phone Gadgets in the U.
  • Subjects: Phones
  • Pages: 10
  • Words: 2830

Instruments to Collect Data

The representation of data should be done in a way such that the purpose of the research will be evident from the data displayed on the graphs and charts.
  • Subjects: Data
  • Pages: 2
  • Words: 585

Cyber Security Threat Posed by a Terrorist Group

These among other features of the internet have been identified to form the basis of the cyber terrorism attacks. A comprehensive international collaboration among investigators and prosecution teams in cases of cyber attacks have also [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1940

Phone Manufacturing Industry

In the next five years, the industry is expected to be affected by macro-economic factors as follows: With increase in population, the industry is likely to have an increased number of people with varying needs [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 631

Theft of Information and Unauthorized Computer Access

Such people might attempt to steal information with a motive of using it to exploit the company by selling confidential information to the competitors or to leverage on the same to get a new job.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 779

Who Should Be Allowed to Filter the Internet?

In this study, I shall discuss several issues pertaining filtering and censoring among them being: countries rights or needs to filter the internet, internet, how the Great Firewall of China reflects a particular form of [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1708

ArchiMate Architecture, ArchiMate Series, and Related

The research carried out by Iacob and Jonkers sought to define the process of model integration for ArchiMate, and found that the language uses integration of detailed designs to visualize, and analyze enterprise architectures.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 2055

Tablet PC Product Analysis

Rutenbeck opines that "Tablet PC is cost effective, a mini- laptop device, and is designed with pen drive that makes it more useful especially to university students".
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1662

The Computer-Mediated Learning Module

A runtime data model will be used to encode the information received into a standard format of programming, and a standard metadata will also be used to identify a particular activity in the performance criterion [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1656

Network management: principles and practice

The success of the network or interface that will be put in place will greatly depend on the bandwidth that will define the data rate of the network connection.
  • Subjects: Internet
  • Pages: 2
  • Words: 678

Computer Security and Its Main Goals

Confidentiality is an aspect of security that ensures that access to data and other computer assets is limited to the authorized parties.
  • 5
  • Subjects: Computer Security
  • Pages: 2
  • Words: 668

Effects of the Internet

The dawn of the internet phenomenon has completely changed the way people conduct their daily activities. The above statements exemplify and amplify the benefits of the internet revolution.
  • Subjects: Phones
  • Pages: 3
  • Words: 746

Welcome Robotic for Abu Dhabi Women College

In the year 2009, the college opened a second banch in the city of khalifa to cater for the students who encounter problems relocating to the capital city.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2686

Management Technology Operation Based

The mission of the company is to use progressive technologies in the field of electronics to create a new product in the electronic engineering industry.
  • Subjects: Engineering
  • Pages: 2
  • Words: 519

Engineering Professionalism and Ethics

On the other hand, the professors apply the several elements and aspire to develop the lives of different individuals. It determines the way a professional handles the issues that are to be engaged with learners [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1140

Google Cloud Products in Khan Academy

The study will mainly focus on a number of challenges experienced by the institution at the initial stage, the ways the Google Cloud Platform or a specific Google App Engine was presented as a solution, [...]
  • Subjects: Programming
  • Pages: 8
  • Words: 2179

The Evolution of the Car Engine

France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2226

Lean Burn Engine Technology

First, the excess air used in lean burn technology reduces the temperature of the combustion process and this lowers the amount of oxides of nitrogen produced by nearly half, compared to a conventional gasoline engine.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2773

Cyber Theft and Its Consequences

This research paper will address the usage of internet and how internet theft has continued to thrive as the technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3150