Tech & Engineering Essay Examples and Topics. Page 33

4,308 samples

The Advantages and Disadvantages of PMA

The difference between the licensed and independent PMA is in the character of the cooperation between the companies and the features of producing the PMA parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 553

Cloud Computing in Network Security

In contrast, in cloud computing, the cloud provider encrypts customer's data before it is stored in the cloud. Identity and Access Management is another protocol that can be used to manage users accessing data in [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1393

A Fire That Changed NFPA Codes

This paper will discuss the impact of this event on the code of the National Fire Protection Association. The Southwest Boulevard Fire showed that the storage of inflammable liquids posed a significant threat to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 842

Bioinformatics and Biotechnology

The purpose of this study is to provide an overview of bioinformatics and to illustrate how bioinformatics can be utilised in the design of drugs and the enhancement of agricultural products.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2598

PMA Results on Flight Express Aircrafts

The first one is Check A and it must be carried out before the first flight of the day. In addition, the functionality of the fuel pump has to be inspected during this check.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1088

The Educational Promise of Social Media

The use of social media can only be useful if the students or children are closely watched and guided on how to make use of it for positive development.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 588

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

The influx of wireless technologies in organizations

This implies that wireless and mobile technologies plays a significant role in the expansion of the communication lines within the organization, which in turn increases the capability and the capacity of the organization to respond [...]
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2484

How the technology impact education

It is noted that technology plays a significant role in spheres of life and the field of education is not an exception. Experts in the field of education have acknowledged that technology is another gift [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 593

Strategy And Controls In Information Security

An attack could comprise any of the following categories or a combination of any of them: Fabrications, which means adoption of some deceptions to play a trick on the unaware users of a system; Interruptions, [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1319

From Common Things to the Best Ideas

This was the beginning of the discovery of the concept behind gravitational pull. This is how Newton got the idea that there was something that makes things fall and this thing was a kind of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1013

Data Mining: Concepts and Methods

Speed of data mining process is important as it has a role to play in the relevance of the data mined. The accuracy of data is also another factor that can be used to measure [...]
  • Subjects: Data
  • Pages: 3
  • Words: 891

Learning Process and Incorporating Technology

Kant was among the initial philosophers to recognize the processes of the mind and that the mind was integral of the thinking process and has the capacity to add value to the development of thoughts.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 907

Mobile Technology Advancements

This wide range of customer requirements underpins the fact that mobile system based users require a high level of availability to access IT and IS systems.
  • Subjects: Phones
  • Pages: 7
  • Words: 1977

Will Schools Survive the Internet?

The main aim of this paper is to analyze both sides of the argument and establish the validity of the statement, 'With the rise in modern technology, there will be no need for teachers as [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2264

Audiovisual Technology Application

Under the display individual static images function-type, traditional technologies used to support teaching and learning process comprise of overhead and slide projectors, bulletin board and posters; while the digital-and-other-emerging versions of the same comprise of [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 933

Internal and External Issues in the Airline Industry

The skills and training that the airline staff get is necessary to ensure security and effectiveness of the flight and thus make the operation and management of the airline easier. The preferences and the needs [...]
  • Subjects: Aviation
  • Pages: 11
  • Words: 3036

Cryptography and Privacy Protection

The main ethical issue is the dilemma between the privacy of a group and individuals and their safety and security, for example, on what side the government would want to maintain the privacy of its [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2286

Wireless Sensor Networks

The set up of this topology is very organised in such a way that, every single node in the system has a unique number of nodes, which are interlinked to it, at the lower point [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1618

Goyder on Technology in Society

This phrase indicates how Goyder perceived technology in the context of its importance, relevancy, and connection to humanity in the current world.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 577

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2970

Qualitative Data Analysis Exercise

These include the causes of high mobile phone bills, different customer and sales policies, morality in handling customers, call rates and the age group that uses mobile phones mostly from the opinions expressed by the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 889

Impact of Technology on Teaching

The demographics of the Department of Defense Education Activity schools highlight the nature of students and the expected challenges in both teaching and learning.
  • 5
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2760

Systems and Network Security

In addition to monitoring the users of a system the Windows Server 2003 platform allows the administrator of the system to audit activity on the system by observing the system logs.
  • Subjects: Computer Science
  • Pages: 15
  • Words: 3812

Security on Windows Server 2008

During execution, the process is given an access token that identifies it to the rest of the system and quite often this token will be the same as the user account that started the process.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2319

Stratus and MS .NET

Regardless of the purpose of the server, it is important that the level of availability matches the applications and functions assigned to that server.
  • Subjects: Programming
  • Pages: 9
  • Words: 2772

Business Information System Management

The company has a very large network and through use of cloud technology, the company has been able to make its operations easer, though it still needs to realize strategies of full utilizing the technology.
  • Subjects: Data
  • Pages: 4
  • Words: 1197

“Stalking the Wily Hacker” by Clifford Stoll

According to the provided article, effective communication requires adoption of superior strategies and security elements that hold the potential of enhancing safety of the information relayed.
  • Subjects: Internet
  • Pages: 7
  • Words: 1976

Internet Key Exchange Protocol

On the other hand, a symmetric data encryption, also referred to as conventional data encryption, uses a common key to encrypt and decrypt data.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 828

Home Office: Network Attack Protection

In conclusion I believe that this kind of firewall is the best for small office as it is easy to install, affordable and it has all the security fractures ranging from IP management, to prevention [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 631

Quebec Bridge Construction

Prior the construction of the bridge, the only way to cross the river was by the use of a ferry. While there were no major flaws in the initial design of the bridge, changes to [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 909

Cloud computing in supply chain management

Cloud computing is one of the advancements, which have significantly transformed the manner in which several companies manage and access information within and outside the firm.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 564

Human Resource Database Application

In essence, the DDBMS will serve the interests of the organisation in addition to other physical aspects of the HRIS. For this reason, the design of the HR database should provide appropriate tools and techniques [...]
  • Subjects: Data
  • Pages: 6
  • Words: 1657

Blu-Ray Triumph Over HD-DVD

HD-DVD war, Sony had an upper hand in their Blu-Ray discs that store 25GB on a single layer compared to HD-DVD having a capacity of 15GB on a single layer.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 702

Textile Product Development and Engineering

One of the major uses of cotton material is the production of clothing materials and one of the significant features of a good clothing material is lightness that in most cases is determined by the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2586

Concept and Problem of Cyber Domain in US

For instance, U.S.power grid is one of the most vulnerable spheres for cyber attacks since it belongs to a private sector and it is not governed by the government. Unfortunately, major part of cyberspace belongs [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 579

Aircraft Maintenance Process

Effective aircraft evaluation results in the determination of its existing state and the probability of the failure of its body and engine parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 588

Impact Digitization and Convergence on Internet

The establishment of the web in the year 1989 was a triggered by the massive development of social sciences, as a result of increased urge to share accumulated knowledge among scholars and researchers.
  • Subjects: Internet
  • Pages: 5
  • Words: 1467

The Internet Radio: A Critical Discussion

Through a critical examination of the concept of Internet Radio, the current paper will seek to extrapolate how users of the medium can create and place content over the internet and how users can use [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 982

Computer Forensics Related Ethics

Due to advancement in technology, individual information can be kept in databases, the risk of accessing this data is evident and this necessity the need of such a law so as to ensure security.
  • Subjects: Other Technology
  • Pages: 13
  • Words: 3655

Assistive Technology Outcomes and Benefits

In addition, the improvement in technology has resulted in devices and equipments that can assist the disabled to access facilities and services that other people can access.
  • Subjects: Applications
  • Pages: 8
  • Words: 2336

Contemporary issues in Multimedia and IT

CSEA reduced the thoroughness of privacy and made it easier for the ISP to hand over information to the government whenever the relevant authority suspects unlawful dealing in the local networks.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1602

Ethics in the IT Practice

These are among the issues which have necessitated the governments across the globe to collaborate and develop comprehensive and detailed laws regarding the use of information technology.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1416

Information security in Small Scale Enterprises

With the physical security set-up, the management should now focus on technological aspects of the security plan, this are the process and procedures security maintenance to ensure that the information of a company is secure [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2227

Impacts of Databases and ERPs on the Industry/Military

The ERPs as they are called have both negative and positive impacts on the military and the industry in general and this paper is meant to review some of those effects. This implies that budgetary [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 1592

Emerging Technologies: Augmented Reality and iPhone Technology

Although this technological innovation has not been used in any learning environment, because it is partly real and virtual; hence, its ability to show required information at the required time and place using a special [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 718

Data Warehousing and Its Benefits for Organizations

The report defines what data warehousing is and explains in details the importance of data warehousing in an organization. The implementation of the SAP in Lenovo has brought more benefits to the Company.
  • Subjects: Data
  • Pages: 5
  • Words: 1372

Technology Plan for a Private Security Firm

Networking system The LAN mainly serves the employees of the company and it is accessible through a regulated password authentication system.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 1007

Ethical Industrial Engineering Ethics

Failure to embrace this by past engineers led to the establishment of code of ethics that guide all engineers in their day to day execution of services.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1872

Current and Past Technology

Technology and marketing are inseparable in that marketing have to keep pace with the developing technology to ensure they use the most modern technology of the time.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 788

Technological impact of the Samsung NC215S Netbook

While many netbooks and laptops have been launched with great technological features, the thing that sets this Netbook apart from others is that its lid carries a solar panel on the top that allows the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 601

Microsoft in the Web Browser Business

Different browsers give the impression to have diverse degrees of utility reliant on the materials to be gained access to and the use to be made of the material by the recipient.
  • Subjects: Internet
  • Pages: 2
  • Words: 723

The Formation of the TSA and the Effect on Air Travel

The famous terrorist attack on the Twin Towers on September 11 of the year 2001 in the US was a key event that heighted the security awareness concerning the susceptibility of the transport modes especially [...]
  • Subjects: Aviation
  • Pages: 15
  • Words: 4164

Evolution of Fire Protection Codes

With regards to the findings in this research paper, the following hypothesis seems relevant: despite the gradual improvements made to fire protection codes, noncompliance and the challenge of dynamic nature of fire disasters continue to [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3864

Screw and Lobe Compressors

There is no oil lubrication in the oil free compressors; thus, the movement of the screws compresses the air without necessarily depending on the oil seal.
  • Subjects: Engineering
  • Pages: 3
  • Words: 852

System Administrator Duties

Some of the core issues that the system administrator needs to keep users abreast of include: security of the systems and networks in use, user policies on the acceptable conduct, policy on the system backup [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1370

The Cyber Security Act of 2009 Analysis

This would contribute to enormous benefits to both the government and private stakeholders by ensuring a cyber security strategy that serves the interests of all.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 948

Application of Technology in Education

Therefore, it is vital for educators to use the above spheres of learning in the application of technology in education. However, the spheres of learning are in constant conflict with each other in the lives [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1107

Debate about Real ID in the New Media

Certainly, the urgency of the debate of anonymity versus real ID is on the current agenda because, on the one hand, introducing real names online makes users more responsible for posting comments and photos.
  • Subjects: Internet
  • Pages: 2
  • Words: 562

Development of Technology in Education

The use of the Second Life can help enhance students' learning by engaging them in the new experiences and a new way of interaction. One of the major benefits of the use of Virtual Worlds [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 582

Threat to Civil Aviation-Hijacking

The 9/11 attacks on the United States' civil aviation industry demonstrated the extent to which terrorism can cause damage to the economy of a country and mass murder of innocent individuals. On the other hand, [...]
  • 1
  • Subjects: Aviation
  • Pages: 8
  • Words: 2192

Information Security and Controls in an Organization

According to Hawker, IT Security and Control include physical, logical, and administrative measures organizations put in place to ensure data integrity, confidentiality, and availability to authorized users.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 531

Advantages of Anonymity in New Media World

The assumption that anonymity does not contribute to the reliability and credibility of the content is false because posting information online is strictly regulated by cyber law.
  • Subjects: Internet
  • Pages: 2
  • Words: 564

Institutional Implementation of Technology

With most forms of technology, reliability and stability is heavily dependent on the expertise of the handler and the frequency of use.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 546

Software System Implementation Process

The document will cover installation strategies of the licensed software, and the loading of the application with user test data. The training will be objectively based on system security and user problems.
  • Subjects: Programming
  • Pages: 4
  • Words: 1049

Central heating systems

The main components of a central heating system include the source of heat and appliances for heating, medium of conveying the heat to the area where heating is required, and spaces for releasing heat.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2743

Engineering Ethics and Industrial Accidents

In the business world, the creation involves the definition of new products and services availed in the market. The engineer should ensure that the components chosen for the various processes in the plant are able [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1965

Technology – Security Policy, Ethics, and the Legal Environment

Title III of the E-Government Act of 2002, and the federal Information Security Management Act of 2002, obliges federal government agencies to present information security protections for economy and business information and information systems.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 832

Ethical Responsibilities in Engineering

Typically, the engineer needs lifelong learning ethical responsibilities to protect the public health, improve the safety and welfare of others, and the ability to address emerging problems and challenges in engineering.
  • Subjects: Engineering
  • Pages: 2
  • Words: 544

Media Power and Post Modernity

There is a written text on the top of the photo with the name and model of the car. The written text on top of the people in the advert is similar to that of [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2275

The Replica Data Security

The users and owners of the data have to be sure that the information is not vulnerable to hacking. This necessitated the development of data security software that is capable of limiting the total loss [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1082

Wireless Technology in IKEA

In case with wireless power, the focus is made on efficiency because it influences the extent by which the energy is sent to the receivers of the power.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 1910

Wireless Headphones from H2pro Company

The sales team will also be trained on the usability of the wireless headphones H2pro have produced so that they can be able to explain it to customers.
  • Subjects: Phones
  • Pages: 4
  • Words: 1093

Between Discipline and Profession

He begins with emergence of electrical engineering to that of computer engineering. In essence, computer engineering is a distinct disciplinary and professional domain.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1689

Acceptable Use Policy

Owners have the authority to change the policies regarding the use of the internet or intranet. Acceptable Use Policy covers the provisions for network etiquette, which is the limitation to the users of network and [...]
  • 5
  • Subjects: Data
  • Pages: 2
  • Words: 655

Technology and Its Future Development

It is clear that technology is starting to become smaller but it is to the benefit of people and with careful control will not evolve into a great evil.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 559

American Calling: Technology Impact on Human Life

The book talks about the technological role of the telephone in the American society. In the second chapter, the author discusses the impacts of the telephone on the American society.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1628

Click, and Facebook revises privacy by Tim Dick

The article discusses the issue of privacy on the Internet taking Facebook as a bright example of how your interests and activity can be revealed to other users of this global social network.
  • Subjects: Internet
  • Pages: 2
  • Words: 648

Effects of Technology on Tertiary Education

By referring to the technology, they seek to ensure that their students have the necessary technological expertise required in the job market.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1415

Business Data Analysis: Etisalat

Examples of information obtainable from data mining are transaction data, text report and memos, relational data, World Wide Web repositories, and multimedia data.
  • Subjects: Data
  • Pages: 3
  • Words: 812

Business Data Analysis: Abu Dhabi Municipality

Some the databases used in the functioning of the business are; Databases resources management-This is the managerial activity applied to information system that helps in the management of organization resources.
  • Subjects: Data
  • Pages: 3
  • Words: 771

Johntech Website and Acceptable Usage Policy

Purpose The purpose of this AUP is to specify the acceptable behaviors for visitors of the interactive Johntech website hosted by John a technical computer expert with extensive experience in the field of computer technology.
  • Subjects: Data
  • Pages: 2
  • Words: 574

The Role of Computer Forensics in Criminology

In fact, since the development of the virtual machine monitors, the live-state analysis in digital forensics has become common and easy to understand.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1947

Fall Accidents in Construction Industry

It should be noted that a piece of pipe fell from the ceiling and it jerked the lift; as a result, the worker collapsed on the pavement and the injuries that he sustained proved to [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1339

Technology Fails to Deliver Happiness

With the advancements in information technology and the massive use of the internet, communication has become quite effective as people can connect when they are in different countries around the world, at any time.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1359

Privacy on the Internet: A Critical Analysis

The present paper looks into the issues of privacy on the Internet by analyzing literature on how to protect your computer and confidential information from such vulnerabilities.
  • Subjects: Internet
  • Pages: 5
  • Words: 1439