Tech & Engineering Essay Examples and Topics. Page 33

5,909 samples

JP Phentar: Construction Project Management Tools

Due to the unique nature of the project, there is a need for the establishment of an effective managerial framework. One of the most crucial aspects of the construction project is the quality of work.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1134

Aaron Swartz’s Crusade for Information Commons

The film The Internet's Own Boy tells about Aaron Schwarz's participation in the development of the World Wide Web and the subsequent harassment by the US government agencies, which led to the tragedy.
  • Subjects: Internet
  • Pages: 4
  • Words: 1152

How Has Technology Impacted Your Life?

Despite the fact that technology has made communication easier and faster, it is worrying that I talk to my relatives and friends less when I e-mail or SMS them.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 579

Channel Tunnel (Eurotunnel) Failure Project

In 1983 banks and contractors from the 2 countries recommended the commencement of the tunnel project just before the two countries agreed on the environmental and security effects of the project and its corresponding impacts.
  • Subjects: Project Management
  • Pages: 8
  • Words: 757

Information Security Concepts and Policies

In addition, she argues that there has been an increase in the complexity of computers attached to these large networks; therefore, this has become a serious challenge because it is not easy to analyze, secure, [...]
  • Subjects: Computer Security
  • Pages: 20
  • Words: 336

Christmas Tree Trimming Project Analysis

In project management, it is important to accurately evaluate the budget earned on different steps of work proceeding to analyze the schedule variance and the stage of the project completion.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1135

Vector vs. Raster Images: What’s the Difference?

A raster image, unlike a vector image, is capable of transmitting a realistic image with a lot of small details. The Adobe Illustrator and CorelDraw programs are more appropriate for working with vector images.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 456

Entertainment City Project in Saudi Arabia

One of the reviewed projects is about the intention of Saudi Arabia to build an entertainment city. The project is a part of Vision 2030 provided by the Kingdom.
  • Subjects: Project Management
  • Pages: 2
  • Words: 549

Computer Forensics and Cyber Crime

Due to age characteristics, the insufficient educational activity of parents, the provision of unlimited opportunities in the online environment, and also due to the low media literacy of the population, people can become victims of [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 832

Cloud-Based Security and Business Continuity

Centralized security system: Cloud infrastructure can be centralized to secure firewall and security protocols. The security disadvantage of cloud-based solutions can be summarized below.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 627

Network Technologies Analysis

With the help of the Constrained Based Routing Algorithm, Multiprotocol Label Switching TE can set a series of Label Switch Paths connecting the head-end node of the network to the tail-end node of the network.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 555

PMP Consultants Pty Ltd.’s Automated Public Transport System

The incorporation of an automated information system into the transport system ensures the integration of technologies, hence providing a synergetic change in the commuter world. The automated system will ensure effective transport management and real-time [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 550

Human Behavior in Fire: Petersburg Hospital

There is a large car park provided to take care of the staff and visitors' needs both on the front and exterior location of the building.
  • Subjects: Accidents & Protection
  • Pages: 28
  • Words: 6695

Gender Sensitivity in Disaster or Humanitarian Crises

The reasons for this decision are numerous, and they are connected to the outcomes of incorporating gender sensitivity in the management of disaster or humanitarian crises.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1011

Humanitarian Crises Evaluation and Barriers

This fact may be connected to the barriers that prevent the improvement of the quality of evidence and evaluation, and the present paper will consider some of these barriers, as well as solutions to them.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1001

Cyber Security: Shadow Brokers Hacker Group

A concealed group of hackers stole several disks containing secret data belonging to the National Security Agency in 2013; In 2016, they announced an auction to sell off the data they had obtained illegally; [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 567

Rise of the Machines

Nevertheless, the author does not try to persuade the readers to choose any of the sides and rather demonstrates the ambiguity associated with the technology's current position and states that it may become clearer in [...]
  • Subjects: AI
  • Pages: 2
  • Words: 296

Online, Hybrid, and On-Campus Courses

The study of Dziuban & Moskal in particular indicates that while online courses are a more convenient method of learning, this does not mean that they can be considered as effective as compared to physically [...]
  • Subjects: Technology in Education
  • Pages: 15
  • Words: 4476

File Systems and Their Inner Workings

The system kernel is the brain box of the FAT file. The metadata of the NTFS file system is the operating system kernel.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 836

Supercomputer Design, Hardware and Software

The advantage of shared memory is that it implies the existence of a unified space from which all the necessary data can be retrieved; however, different processors usually need access to certain kinds of data [...]
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1960

The Boston Molasses Disaster of 1919

Moreover, the steel used to build the walls of the tank was too thin and brittle to hold the required weight.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 294

National Transportation Safety Board Accident

The specified repercussions would imply legal responsibilities for both the pilot and the controller, as well as the rest of the staff that will ostensibly be involved in the accident.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 557

Wireless Networks for Enterprises

Agrawal, Chari, and Sankar claim, "A wireless network refers to a system of communication that uses radio waves to connect devices such as laptops to the internet and the business network and its applications".
  • Subjects: Internet
  • Pages: 2
  • Words: 598

Technology and Causes of Using It

In this way, to a large extent, information sharing supported by contemporary technologies helped change the view of the world and make it more integrated.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 565

Rugia Bridge Project: Conduct Procurement

Max Bogl, a steel engineering and construction company, is in need of corrosion protection and hazard analysis for the Rugia Bridge project and is accepting proposals in response to this RFP.
  • Subjects: Project Management
  • Pages: 2
  • Words: 617

Carbon Trading for Aviation and Regulations

Explain what the "Stop the Clock" EU ETS Regulation involved and explain the current scope of the EU ETS system for aircraft operators.'Stop the Clock' EU ETS regulation is needed for deferring the surrendering of [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 317

Project Management: Budgeting and Risk Analysis

The top and middle managers assess the cost of the project and the main subprojects constituting it. The data connected with the project is marked by unpredictability, and therefore it is suitable for the utilization [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 536

Cyber Theft and Internet Security Measures

This research paper will address the usage of the internet and how internet theft has continued to thrive as technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 595

Food Recommender Systems and Their Types

In the article "Knowledge-based recommender system," it is stated that the cognitive element is expected to be sufficient to dwell upon the similarity of the constituents.
  • Subjects: Applications
  • Pages: 3
  • Words: 942

Project Management: Resources and Earned Values

If the amount of scarce resources is not enough to provide accomplishing of both projects, the one which is started first receives a prerogative. The CV is the variation between the money planned for the [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 548

Cybercrime and Law Enforcement Strategies

The analyzed literature reveals a problem in the sphere of cybercrime research the lack of statistical information and analysis of interventions in the field of personal data theft.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1016

Ethical Analysis of Nuclear Engineering

Too low pressure in the cooling system leads to uncovering and overheating of the core to the melting point. In my line of work, I have a duty to keep my boss informed on matters [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1198

Senior Management: Soccer Tournament

It is chosen as the central deliverable because the successful organization of the tournament is the most desirable outcome of the project.
  • Subjects: Project Management
  • Pages: 3
  • Words: 802

Cybercrimes Impact Personal Data Safety

Although the severity of data theft may have various repercussions on economics and politics, the current approach to laws and regulations does not provide a sufficient way to disrupt the chain of breaches.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2841

Information Security and White-Collar Criminals

The application of IT security measures is expected to prevent unauthorized entry and the protection of information related to the company's financial transactions.
  • Subjects: Cyber Security
  • Pages: 27
  • Words: 7527

Executive Dashboard Selection for Multinationals

Provide information technology systems that will make it possible for the information providers to provide information to the buyers. The management of online sales is possible through the use of Google software.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 585

Effective Power Transmission Systems

After accentuating the necessity of the new transmission system and the associated planning, the authors focused on the benefits of transmission systems in general.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1677

Information About Network Devices

A solid router capable of managing the network of a small business, in case the four ports it is equipped with will be enough.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 560

Data Mining Techniques and Applications

The use of data mining to detect disturbances in the ecosystem can help to avert problems that are destructive to the environment and to society.
  • Subjects: Data
  • Pages: 2
  • Words: 758

Moleskine Social Data Analysis

The Facebook data includes engagement statistics, Moleskine's posts, users' posts about the brand, and comments by both users and the company. The uniqueness of this information is in the disclosure of the way Moleskine communicates [...]
  • Subjects: Data
  • Pages: 3
  • Words: 500

Electronic Commerce and the Social Enterprise

The first security measure that is available for protecting the customer is the encryption of the online store. The third measure is the use of a password manager.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 574

Education and Political System in the US

As Alexander notes, the starting point of policy analysis may be a complicated one since it does not presuppose the investigation of the existing approach but, rather, it involves the recognition of the need for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 829

The Concept of Cyber Warfare

In the international arena, laws have been enacted, such as the Geneva Convention, to ensure that sovereignty of a country is respected.
  • Subjects: Cyber Security
  • Pages: 48
  • Words: 13196

IPhone 5S Instructional Manual

As indicated in appendix 1, the phone has a total of 12 features. In point form, the features are as follows: A face time camera.
  • Subjects: Phones
  • Pages: 5
  • Words: 956

Effectiveness of Technologies and WEB Tools

Consequently, the research design and findings will not offer permanent solutions to the problem of the lack of experience and knowledge reported among students in pedagogical and teaching practices in the current era of Internet [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 641

Information Technology Project Management

I aspire to join this Master's degree program since it will help me develop the expertise in various areas of project management and real estate.
  • Subjects: Project Management
  • Pages: 2
  • Words: 566

Powered Exoskeleton in Military & Space Industries

The use of exoskeletons by the military will lead to a reduction in the need for heavy-lift machinery on the battlefield since the soldiers will be able to lift heavy objects with the help of [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 587

The Power of Connection: Personal Learning Network Building

Secondly, I value privacy and have learned through a few of my friends that social media involves spilling personal data to the public, which is, of course, a security risk. In such a way, I [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 526

The Webster School District Technology Plan

In order to evaluate the technology plan, it is necessary to assess the effectiveness of the technology plan according to the range of criteria, including the correlation of the plan with the school district's goals; [...]
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 1393

The Utilization of iPads in Education

In the context of the presented case study, that the primary goal of the research is to determine whether the utilization of iPads with Smartboards remains adequate investment concerning motivation and achievement.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 653

Questionable Future of Robotics

In this case, the lecture, which was focusing on the flow of robotics' development, influenced my perception about the future, robotics' impact on our lives, and the ability of robots to destroy the humanity.
  • Subjects: AI
  • Pages: 2
  • Words: 551

How to Create a Spreadsheet in Google Docs?

One of the columns was to carry the walker's name, while the second was for recording the amount the walker raised, and the third to fill in the organization with which the walker was affiliated.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1094

Australian Defence Forces’ Project Organization

The following is a description of the parts of the external interfaces of the project. The other major part of this project is that of the implementation of the project.
  • Subjects: Project Management
  • Pages: 10
  • Words: 1842

Information Technology and Security

However, it needs to be said that current system is in need of improvement because data is not as secure as it should be, and it is evident that numerous issues are present.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 553

Linear Programming and Network Models

In this petroleum model, the question asked was: by using the refining equipment and raw materials that were available then, what would be the product mix alternatives between the output of JP-4 jet fuel and [...]
  • Subjects: Programming
  • Pages: 6
  • Words: 1653

Iron Mountain Server Backup

Referring to the services provided by the Iron Mountain, it is possible to determine that Iron Mountain Server Backup which is powered by LiveVault is the effective option to back up the company's 20 physical [...]
  • Subjects: Data
  • Pages: 2
  • Words: 553

The Play Pump Project

According to the inventor of the play pump, the pump and storage tank was to be connected to a merry-go-round. Therefore, Play Pumps International should have designed other alternative sources of energy to pump the [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 540

The Usage of Broadband Access Networks

The density of the ports in a switch determines the number of servers that can be linked to a certain switch. In addition, inter-datacenter communications are costly due to the nature of work and volumes [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 626

WiMax Technology Specific Aspects

Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of computer networks.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2020

Digital X-Rays: Recent Development in Radiography

The developments in digital x-ray technology have mostly taken place in digital detection technology, where images are created, scanned, archived, or stored in digital archives to allow for the easy retrieval of the images.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1456

Libraries as Quality Sources of Information

Libraries remain to be imperative repositories despite the fact that the internet is rich with information because most of the credible academic sources require purchasing.
  • Subjects: Data
  • Pages: 2
  • Words: 585

Online UAE Consumer Protection and Threats

Before engaging in an online purchase in the UAE, it is vital for the customer to access its merits and demerits, security of the transaction, and regulative organs that directly provide protection from unpredictable and [...]
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 316

Online Learning Design Specifications

The rapid rise of technologies and the evolution of communication means resulted in the appearance of new approaches to the learning process.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 585

Driving Injury Statistics on Saudi Arabia’s Roads

There are a lot of deaths caused by road accidents in the Kingdom of Saudi Arabia. Defensive driving is being introduced in Saudi Arabia so that the expertise of drivers on the roads can be [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 679

Kai-Fu Lee Restores China’s Technology Leadership

A recent reconsideration of the role of China in the evolution of technology has revealed, though, that the Chinese organizations still deliver innovative products; however, because of the competition with the Western brands of a [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1145

Internet and Its Consequences for Society

In his book, Siegel clearly states that the Internet can be viewed in the same way as the invention of the automobile, as it revolutionizes the concepts of self-identity while being developed to satisfy the [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1409

Britain Data Privacy Confusion After Brexit

The article "Data regulation: Britain faces data privacy confusion after Brexit" studies the implications of the United Kingdom's decision to leave the European Union on data protection and the difficult decisions the government will have [...]
  • Subjects: Data
  • Pages: 2
  • Words: 493

Digital Readers: The Next Chapter in E-Book

The girls were given the opportunity to use all the features of the device such as the built-in dictionary, the text-to-speech feature, the changing of the font size.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 596

Technology Improving Educational Benefits in Learners

With the problems in mind, there is the need for stakeholders to collaborate in designing effective strategies for the adoption of technology to the learning process, which would in term benefits everyone in the system [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 874

Cybercrime and Digital Evidence

When a user searches for a music file by title or a musician's name, the user's request is sent out to all computers in the network, and a response list is generated to the user [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1234

Baxter Robots and Company Performance

This technology will impact the performance of companies by reducing the time spent on repetitive duties such as packing. In case my employers buy this robot, I will not be affected personally, but the performance [...]
  • Subjects: Robotics
  • Pages: 1
  • Words: 145

The Enable Talk Gloves: Invention’s Pros & Cons

The gloves have special sensors that turn the signs into texts on a smartphone that also turns the texts into speech. This invention will impact the participation of people with speech problems in the activities [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 205

Privacy Markets in 2014 and the Future

The period in twenty years did not change the persons' vision of the privacy market significantly because the marketers' use of personal data is still discussed as a provocative question.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 658

Innovative Social Networking in Online High School

The preparedness of the school is also critical towards the success of this innovative technology. The school should also examine the benefits and bottlenecks of the new technology.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 615

Project Management Aspects and Needed Skills

The absence of the needed skills and inability to predict the evolution of the market might result in the appearance of numerous problems related to the various aspects of the project.
  • Subjects: Project Management
  • Pages: 3
  • Words: 852

ATN Corporation’s Cloud Computing Mechanisms

The second mechanism expected to be a part of the described solution is the virtual server. Finally, the third mechanism likely to be leveraged as a part of the described solution is a cloud usage [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 828

Cloud-Based Services and Their Quality

In order to proceed to the development of a viable solution, it is first necessary to identify the issues responsible for the disruption of performance.
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 897

Cloud Computing-Related Attacks and Risks

The most common solution to remediating the eavesdropping attack is to use encryption for data sent to the cloud. At this point, it is important to note that the majority of cloud-based services are dynamically [...]
  • Subjects: Cloud Computing
  • Pages: 9
  • Words: 812

Security Breach in Cloud Services

For instance, the fact that the malicious software was established to originate from a message sent by cloud service Y, it is apparent that the source of threat is definitely on the cloud.
  • Subjects: Cloud Computing
  • Pages: 9
  • Words: 861

Assistive Technology for Paraplegic Patients

In general, the device could be described as a certain system of blocks and levers that guarantee the transition of a patient from his/her wheelchair into a Jacuzzi.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 598

Learning Second Language in Kindergarten Online

Storyland is a section of the Reading Eggs program that allows it to be used with a small group. The program allows teachers to choose from 44 available lesson plans that include student worksheets for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 292

Database Normalization: Minimization of Data Redundancy

Since the table in the first normal form has composite primary keys, which cause partial dependencies of students' data and lecturers' data, their removal will create a table in the second normal form.
  • Subjects: Data
  • Pages: 2
  • Words: 664

Smart Tech Company’s Workplace Safety Rules

First and foremost, it considers critical to ensure consistent safety communication - otherwise stated, the company sees to the fact that all the employees are aware of the safety requirements and standards.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 561

Greendale Stadium Project Time Estimation

This illustration of the major milestones which have to be achieved for the project to be completed in time is referred to as the project's critical path.
  • Subjects: Project Management
  • Pages: 2
  • Words: 323

The Green and Clean Kuwait Group Project Management

Although GCKG is a privately owned company, profit is not its main target, rather its mission is to maximize the resource values through waste management while reducing the environmental hazards and impact of global warming [...]
  • Subjects: Project Management
  • Pages: 22
  • Words: 6550

Soft Systems Methodology Application

The rapid development in this industry means that a firm does not have the luxury of time when developing new software. Consequently, such an innovative approach has the potential of enhancing the creativity and productivity [...]
  • Subjects: Project Management
  • Pages: 14
  • Words: 3862

Pilot Performance and Human Factors

To analyze the most prevalent reasons for the recent accidents in the aviation industry, and the role of human errors in these incidents.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1212

IPad Initiative and Its Perception in the UAE

"What are the stated differences between the attitudes of students and teachers to the iPad initiative in the UAE?" is the research question chosen as the basis for the interviews.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 863

Antecedents of Virtual Team Effectiveness

This section explores the context of the research, statement of the problem, research aims, research questions, and the implication of the study.
  • Subjects: Technology Effect
  • Pages: 52
  • Words: 17320

Ottawa Region ICT Centres Project

At the outset, the report explores the financial progress of the various issues concerning the management of the project's resources. It also explores the management of the relationships that were formed in the implementation process [...]
  • Subjects: Project Management
  • Pages: 30
  • Words: 5260

The U.S. Video Game Industry

This was also based on the views of the company's developers who assumed that the technological advantages of the the16-bit system were extremely less than that of the 8-bit system.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 941

Leadership for Entrepreneurs Course

The course offers leadership skills and will be seeking to enhance the ability of learners to manage other people and recognize their potential.
  • Subjects: Technology in Education
  • Pages: 9
  • Words: 2267

Digital Literacy Promotion at a Community Event

In the course of the event, the attendees will be explained the basics of how the new technology will help learners from Pre-Kindergarten through 12th-grade students in school districts and adult learners at the community [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 1191

University Information Assurance Managment & Control

Classification procedures can be different for companies, which can be proved by the information policies of the University of Liverpool and University of Wisconsin, but the general principle of information management appears to be more [...]
  • Subjects: Data
  • Pages: 3
  • Words: 960

Industrial Fire and Corrosion Prevention Measures

It was noted that the increase in corrosion of the Air Line was intense with high-levels of humidity. Thus, it was noted that the surface finishing of the Air Line was responsible for the intensity [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1120

Ship Unloaders and Belt-and-Bucket Elevators

These systems have an automatic sink-in device found in the HL-SKT as a component of the marine leg to ensure the best position when the unloader starts operations and, therefore, automatic unloading can be achieved [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1531

Society and Technological Change

Moreover, technology is a cumulative process that stores and transfers its knowledge to the future generations by means of the development.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 556