Tech & Engineering Essay Examples and Topics. Page 34

4,317 samples

Threat to Civil Aviation-Hijacking

The 9/11 attacks on the United States' civil aviation industry demonstrated the extent to which terrorism can cause damage to the economy of a country and mass murder of innocent individuals. On the other hand, [...]
  • 1
  • Subjects: Aviation
  • Pages: 8
  • Words: 2192

Advantages of Anonymity in New Media World

The assumption that anonymity does not contribute to the reliability and credibility of the content is false because posting information online is strictly regulated by cyber law.
  • Subjects: Internet
  • Pages: 2
  • Words: 564

Institutional Implementation of Technology

With most forms of technology, reliability and stability is heavily dependent on the expertise of the handler and the frequency of use.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 546

Solar Furnace (Font Romeu – Odeillo, France)

The furnace stands as a demonstration of the potential of solar energy to the world and it remains amongst the world's greatest projects especially in the line of solar energy exploitation.
  • Subjects: Engineering
  • Pages: 12
  • Words: 3329

Software System Implementation Process

The document will cover installation strategies of the licensed software, and the loading of the application with user test data. The training will be objectively based on system security and user problems.
  • Subjects: Programming
  • Pages: 4
  • Words: 1049

The Popularity of Video Games and Their Benefits

Are the benefits of playing violent video games, on the one hand, and the benefits of playing pro-social video games, on the other, can be considered qualitatively different?
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3122

Engineering Ethics and Industrial Accidents

In the business world, the creation involves the definition of new products and services availed in the market. The engineer should ensure that the components chosen for the various processes in the plant are able [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1965

Ethical Responsibilities in Engineering

Typically, the engineer needs lifelong learning ethical responsibilities to protect the public health, improve the safety and welfare of others, and the ability to address emerging problems and challenges in engineering.
  • Subjects: Engineering
  • Pages: 2
  • Words: 544

Blackberry Smartphone Consumer Behavior

Description of Internal Variables Consumer Personality: the personality of the consumer especially that of the middle class has a significant influence on the purchase decisions. With the brand and the specific outlet in mind, a [...]
  • Subjects: Phones
  • Pages: 7
  • Words: 2249

Media Power and Post Modernity

There is a written text on the top of the photo with the name and model of the car. The written text on top of the people in the advert is similar to that of [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2275

The Replica Data Security

The users and owners of the data have to be sure that the information is not vulnerable to hacking. This necessitated the development of data security software that is capable of limiting the total loss [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1082

Wireless Headphones from H2pro Company

The sales team will also be trained on the usability of the wireless headphones H2pro have produced so that they can be able to explain it to customers.
  • Subjects: Phones
  • Pages: 4
  • Words: 1093

Between Discipline and Profession

He begins with emergence of electrical engineering to that of computer engineering. In essence, computer engineering is a distinct disciplinary and professional domain.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1689

Technology and Its Future Development

It is clear that technology is starting to become smaller but it is to the benefit of people and with careful control will not evolve into a great evil.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 559

Who Invented Your House?

Although one cannot point to a specific year, many agree that the balloon style began in the 19th century in the Midwest.
  • Subjects: Engineering
  • Pages: 2
  • Words: 577

American Calling: Technology Impact on Human Life

The book talks about the technological role of the telephone in the American society. In the second chapter, the author discusses the impacts of the telephone on the American society.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1628

Click, and Facebook revises privacy by Tim Dick

The article discusses the issue of privacy on the Internet taking Facebook as a bright example of how your interests and activity can be revealed to other users of this global social network.
  • Subjects: Internet
  • Pages: 2
  • Words: 648

Role of Engineer in Global Challenges

Additionally, concessions should be made by stakeholders in terms of funding and availing the necessary conditions for engineers to come up with innovative ways aimed at dealing with these challenges.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1372

Business Data Analysis: Etisalat

Examples of information obtainable from data mining are transaction data, text report and memos, relational data, World Wide Web repositories, and multimedia data.
  • Subjects: Data
  • Pages: 3
  • Words: 812

Business Data Analysis: Abu Dhabi Municipality

Some the databases used in the functioning of the business are; Databases resources management-This is the managerial activity applied to information system that helps in the management of organization resources.
  • Subjects: Data
  • Pages: 3
  • Words: 771

Johntech Website and Acceptable Usage Policy

Purpose The purpose of this AUP is to specify the acceptable behaviors for visitors of the interactive Johntech website hosted by John a technical computer expert with extensive experience in the field of computer technology.
  • Subjects: Data
  • Pages: 2
  • Words: 574

The Role of Computer Forensics in Criminology

In fact, since the development of the virtual machine monitors, the live-state analysis in digital forensics has become common and easy to understand.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1947

Fall Accidents in Construction Industry

It should be noted that a piece of pipe fell from the ceiling and it jerked the lift; as a result, the worker collapsed on the pavement and the injuries that he sustained proved to [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1339

Privacy on the Internet: A Critical Analysis

The present paper looks into the issues of privacy on the Internet by analyzing literature on how to protect your computer and confidential information from such vulnerabilities.
  • Subjects: Internet
  • Pages: 5
  • Words: 1439

Extranet and B2B E-Commerce for Business

The risks to be considered by the Top Breadz team studying the solution are the following: Retail partners might not possess the proper or compatible Information Technology background to gain advantage of Top Breadz's new [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 1842

Entrepreneurship, Creativity and Innovation

According to Freeman, the national system of innovation is defined as, "The network of institutions in the public- and private-sectors whose activities and interactions initiate, import, modify and diffuse new technologies".
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1575

Internet Security Practices in Organization

Internet information access policy: This policy should contain guidelines for allowing and disallowing access to an organization's information resources via the Internet.
  • Subjects: Internet
  • Pages: 3
  • Words: 701

Abu Dhabi Airport Information Technology

Another department present at the airport is the Strategic and International Affairs department. This department is responsible for the internationalization of the airport's services.
  • Subjects: Aviation
  • Pages: 5
  • Words: 977

White Paper on Cloud Computing

Cloud providers and services vary and it is important to select a model that suits the operations of an organisation. The organisation needs to assess functions that are to be performed through a cloud system.
  • Subjects: Cloud Computing
  • Pages: 6
  • Words: 1645

Laying Pipelines Under the Sea

The paper seeks to assess the effects of the hydrodynamic forces on the piggy back bundle and on the single pipelines forming the bundle.
  • Subjects: Engineering
  • Pages: 15
  • Words: 3903

Legal Aspect of IT

One of the ethical dilemmas that the internet users face is the need to protect the information received from unauthorised people.
  • Subjects: Internet
  • Pages: 4
  • Words: 1166

Control over Personal Information

In this section I would like to speak about the policies of such a company as Twitter since I often use their services. Admittedly, I may not contact the management of Twitter and ask these [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 801

Multiple Dimension of Value: Blu-Ray v. HD-DVD

The paper also outlines some of the techniques that a firm can apply to improve the overall performance of its technology and design. The Blu-ray technology, due to its compatibility with a number of technologies, [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1632

Technological Access, Literacy and Fluency

However, not all members of the community surrounding the University are technologically literate. To improve access to digital technology in Michigan Technological University and the surrounding areas, various measures should be put in place.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 792

Impact of Information Technology on Customers

Most businesses in the globe have adopted the digital way and businesses are sacrificing their time and finances to bring in advanced technologies to tackle and manage their processes within the business effectively and efficiently.
  • Subjects: Applications
  • Pages: 6
  • Words: 1642

IT for Users in Organizations

Subscribers should be entitled to terminate the services of a CSP and to recover all the data that they had entrusted with the CSP.
  • Subjects: Internet
  • Pages: 7
  • Words: 1940

The Curious Case of Gary McKinnon

In this case, the author uses the alleged computer hacker who was identified as Gary McKinnon from the United Kingdom in the case study to address the complex types of criminal activities that do take [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1375

Telecommunication Project: Bluetooth

This technology has the ability of overcoming the challenge of synchronization since it has the potential of connecting a myriad of devices.
  • Subjects: Internet
  • Pages: 2
  • Words: 668

Cloud Computing and Corporate IT Infrastructure

It is important to recognize that the application of cloud computing has led to the development of new security threats. The organizations must consider the possibility of engaging the services of technical and experienced IT [...]
  • Subjects: Cloud Computing
  • Pages: 5
  • Words: 1342

Intel and Advanced Micro Devices

Of the two companies, AMD was the first to introduce a 64-bit chipset with a clocking capability measurable in gigahertz. Although Intel chips resist over-clocking, the location of the L2 cache memory facilitates faster memory [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Technological solutions for human services

The use of technology becomes very critical to offer the services to the clients who are widely spread in the inaccessible parts of the country.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 909

Technology vs. Humans: Exploring the Benefits of Cursive Writing

Because handwriting is a unique interpretation of personality type, it should also render specific qualities and ideas that are subjective to this personality. First of all, it allow to express your personality because handwriting is [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 622

The Comparison of iPhone, Droid, and BlackBerry

The purpose of the report is to compare iPhone, Droid, and BlackBerry in relation to such features as the peculiarities of the operating system, usability, apps and tools, the technical characteristics, and the price of [...]
  • Subjects: Phones
  • Pages: 5
  • Words: 1445

Ten Programming Languages

The discovery and meteoric development of the computer enabled the development of the modern high-level programs, which have significantly changed the world of computing and influence various aspects of peoples' lives in the 21st century. [...]
  • Subjects: Programming
  • Pages: 6
  • Words: 1624

The Environmental Responsibility of Engineers

Today, the problem of the environmental responsibility is actively discussed by the scientists and researchers in relation to the global environmental problems, and the most influential one of them is the climate changes, which are [...]
  • 3
  • Subjects: Engineering
  • Pages: 7
  • Words: 1902

Hotels Cooling and Heating Systems

The first essential part of the system is the source of warmed or cooled air. It is the origin of all gases distributed within the system and in the rooms.
  • Subjects: Engineering
  • Pages: 3
  • Words: 831

Different Types of Cement

The other types of cement include the blended and the hydraulic cement. Type one and Type one-A constitute of the Portland cement used for most of the basic construction.
  • 5
  • Subjects: Engineering
  • Pages: 3
  • Words: 853

Benefits and Application of Database Packages

Furthermore, "database process is a tool which is beneficial to build effective applications like inventory and sale ordering management in business operation". The use, collection, and processing of information is important in business operation.
  • Subjects: Data
  • Pages: 2
  • Words: 663

Technology and Life Standard

Some of the major technological achievements of the 20th century adopted in the essay are the internet and computers. To start with, the internet can be described as the interconnectivity of the global system through [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 836

Storage of Combustible and Flammable Liquids

For a tank to store a certain flammable liquid safely, the liquid is pressurized to the rating of the tank and as per the nature of the fluid.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2770

Highlighting the Intricacies of Cloud Computing

After that, we will delve into the characteristics of cloud computing which will then be closely followed by cloud computing services, how to manage a cloud, cloud organization standard, the benefits of cloud computing as [...]
  • Subjects: Cloud Computing
  • Pages: 15
  • Words: 4006

Plastic Fences as Safety and Protection Means

It is only on the site where they are to be utilized that water is added in giving such barricades the characteristic weight and rigidity needed to sustain the impact of a moving vehicle.
  • Subjects: Engineering
  • Pages: 3
  • Words: 947

Modern Scripting Languages and Web Transformation

These websites are created with the use of software applications on the web where many users can access them as compared to the desktop scenario that is beneficial to one end user only.
  • Subjects: Programming
  • Pages: 5
  • Words: 1344

Will Hydrogen Replace Fossil Fuels for Cars?

In the past, the availability of fuel cells has been a major hindrance to the realization of hydrogen powered vehicles. The goal that hydrogen powered cars want to achieve is similar to that of fossil [...]
  • Subjects: Engineering
  • Pages: 8
  • Words: 2153

Installing a Power Supply Back Up System

This is because, power required to run the oven and freezers for long should be available and if a power supply cannot produce that equivalent of power the tests will be invalid.
  • Subjects: Engineering
  • Pages: 3
  • Words: 811

Power Supply Alternative

An uninterrupted power supply basically provides emergency power in cases where the input power fails, and this is exactly the kind of power supply fit for this type of a project.
  • Subjects: Engineering
  • Pages: 3
  • Words: 801

Rules and Requirements of the Combustible Liquids Use

The dangers and risks involved in handling flammable and combustible liquids and gases call for extra vigilance in the processes of packaging and transporting these liquids and gases.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2712

Suppression of Flammable and Combustible Liquids in Storage Tanks

In fact, given the intensity of the experienced losses, fire safety industrial units have considerably enhanced the techniques used to successfully extinguish and control fires faced in the outsized inflammable storage tanks. The factors include [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2766

Assessment of Total Evacuation Systems for High-Rise Buildings

Objective- The objective of this study is to evaluate possible improvements to be used in high-rise buildings through an investigation of occupant relocation and strategies for evacuation that involve the use of modern technology.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 773

The History of Aviation Industry in the USA

When speaking about the history of aviation in the USA, one is to keep in mind that aviation plays an important role in the development of the country, as it is considered to be a [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 806

Aspects of American Aviation Industry

The deregulation of the airline industry in 1978 enabled increase in competition and efficiency in the airline industry, leading to reduction of fares and increase in areas covered thus benefiting the stakeholders.
  • Subjects: Aviation
  • Pages: 3
  • Words: 881

Aviation Industry and Its Prominent Inventions

The above are some of the most influential aviation inventions ever made in the history of the industry. Given the failure in the development of manned aircraft by Russia, it is safe to conclude that [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 838

Data Mining Technologies

According to Han & Kamber, data mining is the process of discovering correlations, patterns, trends or relationships by searching through a large amount of data that in most circumstances is stored in repositories, business databases [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1082

Putting Play to Work in Games of Empire

This editorial scrutinizes the workforce of digital games, the contentment and capacity of game invention, the predicaments facing this industry and the novel ideas that affect the firm.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 574

Hacking: Social Engineering Online

The information is fed to the main web site that's runs the hacking software, where the information is sorted according to various numbers.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 721

High Performance Network

The current network comprising of category 5 cable could essentially be enhanced through technical upgrading of the infrastructure. The availability of a single pair of cable would immensely enhance upgrading to the category 6A cable [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 545

Microsoft SharePoint Tool

However, the introduction of Microsoft SharePoint into the sector is changing the situation. After collecting the data Microsoft SharePoint analyses the data, and share the information with the rest of them.
  • Subjects: Internet
  • Pages: 5
  • Words: 1383

IT Innovation and Its Impact on Business

The approach will be majorly an evaluation of the history of Google Apps and how since innovation it has proved to be essential in the business environment. Everybody in the chain of business has been [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 1346

Electrical Injuries and Fatalities

The aim of this article is to give an implementation plan for ARC Flash Management and a statement of legal aspect of Occupational Safety and Health topic.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 865

Mitsubishi Projector Manual

The projector has a remote control which may be used to control the operations of the projector from a distance. The size of the picture on the screen is varied by changing the distance between [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 544

Blackberry and iPhone Technology Assisted Learning

Despite the above potential negative impacts of mobile assisted learning on the effectiveness of the learning process, progressive research continues to indicate that Blackberry and iPhone technology assisted learning, have a positive impact on the [...]
  • Subjects: Phones
  • Pages: 12
  • Words: 3186

Hypoxia in Pilots at Higher Altitudes

It is necessary to provide oxygen and pressure in the cabin of the pilots to increase their decreased endurance due to decompression and hypoxia.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2787

The Main Guidelines and Industrial Hygiene Concerns

In response to the case of New Orleans Hospital which has been affected by the Katrina disaster, the concept of industrial hygiene should be adopted in the recovery process. In execution of the rescue process, [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1141

Television as a Domestic Technology

Ever since the launch of digital television and the introduction of the set-top box as the modern consumer technology to replace the analogue television system, television has been cast into the limelight with respect to [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1247

OPSEC and Site Security

The importance of individual responsibility is critical in enhancing the safety of the facilities and personnel. Thus to enhance accountability in the event of a terrorist incident, the association offers free updated information and training [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 747

Pilot’s mission in flying jet aircraft and spacecraft

The technical skills possessed by these pilots and their ability to fly sophisticated aircrafts both in space exploration missions and air combat has evolved since 1945 and undoubtedly continuous to play critical role in the [...]
  • Subjects: Aviation
  • Pages: 5
  • Words: 1514

Information Security: A Critical Discussion

In more complex terms, however, the concept of information security is often viewed under the lens of protecting data and complex information systems from unauthorized or illegal access, use, revelation, interruption, modification, examination, inspection, recording [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 757

Meteorite or Puck Hunt: Autonomous Mobile Robot

The Development of the Design Being the first time that we are taking part in this type of competition, we decide to work out a plan that would help us develop the autonomous mobile robot [...]
  • Subjects: Robotics
  • Pages: 12
  • Words: 3249

A History of Aircraft

Just as the title suggests, the book is a detailed history of the invention of the aircraft by the Orville and Wilbur Wright.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1619

Ethics and Computer Security

The introduction of computers and the internet in the 1970s marked the end and the beginning of a new era where human labour was no longer required in the production of goods and services.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1549

Smoke Alarm “Smart Smoke Detector”

Smart Smoke detectors will allow customers to evade the smoke detector and to reduce the annoyance of the alarm. This report examines extensively and pinpoints the expected process that Global Engineering will follow to achieve [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1092

Software Development Lifecycles

Using the example of a construction project, the architect's blueprint can be taken to construe the methodology while the tools used by the construction workers are the tools needed for the task.
  • Subjects: Programming
  • Pages: 14
  • Words: 3725

Do Investors Care if Steve Jobs Is Healthy?

The article by Koch, Fenili and Chebula tries to investigate the impact Apple's founder Steve Jobs health has on the profitability of the company through an analysis and evaluation of stock/share price and market capitalization.
  • Subjects: Phones
  • Pages: 2
  • Words: 585

New Technologies and Organizational Needs

To improve the organizational processes, increase the effectiveness of the work, contribute to the organizational development, many new technologies can be successfully used in the sphere of management.
  • Subjects: Applications
  • Pages: 4
  • Words: 1091

Information Security: The Physical Security Factor

This paper is devoted to outlining some of the fundamental steps that need to be considered for the physical security of computers used in an urgent care center to access patient data and their email [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 889

The Airbus Fly-By-Wire Control System

In fly-by-wire, the control of the aircraft is only achieved through the use of electrical signals. The fly-by-wire control systems have enabled automatic stability system to be included in the plane and act autonomously to [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1651

Spreadsheet Errors in Management

The first type of quantitative errors is mechanical errors which are defined as simple mistakes such as typing a number in the wrong cell and mistyping of numbers. In order to facilitate detection of errors, [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 856

Plastic Types and Manufacturing

The length of the wood should be slightly shorter than the length of the head that the artist intends to make.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2849

Brief History of the Boeing 787

The above information on the Boeing 787 is crucial as it has given the quest to explore the power behind the success of the aircraft in the market.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207