Tech & Engineering Essay Examples and Topics. Page 35

4,726 samples

Spamming Is More Acceptable Way of Sales Practice than Cold Calling

The digitization of information and communication technologies, the global extension of ICT-supported networks, services and applications, fixed and mobile phones, the World Wide Web and the internet have opened the diverse ways for a wide [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2268

Engineering and Teton Dam

In the case of the State of Idaho and the town of Rexburg, engineering innovation was needed to deal with the growing needs of an expanding township. The purpose of the dam was for the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1974

Pros and Cons of Waterfall Model

When the engineer and the client identify all requirements and the design, then the model can enhance superiority and security of the product.
  • Subjects: Programming
  • Pages: 7
  • Words: 2008

Cloud Hosting Media Services

While this can be attributed to a number of factors, the most important of them is the existence of the internet as well as the emergence of many service providers.
  • Subjects: Data
  • Pages: 16
  • Words: 4295

Two Greatest Hacking Systems in the USA

Appropriating intellectual output of someone else is also a computer malpractice that is intolerable. Generally, Computer malpractice is seen when a person shows hasty and careless conducts or behaviors when making use of computer systems.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 950

PC Network Troubleshooting

For instance, simple restart of the program, sending the signal to the system in order to reload the initialization file restores the problem.
  • Subjects: Internet
  • Pages: 10
  • Words: 2780

Network Security and E-Business

The introduction of e-businesses has resulted to the need to modify the computer security systems from keeping the unwanted users away, but enabling the targeted people to access the network.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2184

Security Control in Organization

The security of the organization and the entire database depends on the quality of security each staff of the company enjoys.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2232

GIS Applications and Data Types

The use of a square grid to locate features in a defined location Ground survey and GPS is used to pick vector images Optical scanners mainly used to gather raster data.
  • Subjects: Applications
  • Pages: 2
  • Words: 511

Internet Usability Importance

Internet usability refers to the design and positioning of a website for ease of interaction with the users. The branding of domain names also leads to enhanced internet usability.
  • Subjects: Programming
  • Pages: 2
  • Words: 757

Biometrics and User Authentication

The cost of installing a fingerprint authentication system is higher relative to a voice recognition system. The cost of face recognition biometric authentication system depends on the security level of the system.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1743

Metadata and Tools in American Express

The ETL tool is used in the data integration section of the master data management implementation to alternate, standardize and transfer data to the master data management hub. Another factor that companies should consider in [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1478

Assistive Technology for High School Students with Dyslexia

The study query being dealt with is, "Can assistive technologies meet the requirements of dyslexic high school students when it comes to writing assignments?" The first part of this proposal details the underlying literature to [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 3061

The Education System and Factors of Technology

The methodology of this research is rooted in the comparisons of podcasts and vodcasts effectiveness. This research has raised the capacities and potential of technology in learning.
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2231

Cloud Computing Advantages and Challenges

The mere fact that users are not aware of the security strength of the facility can make the facility vulnerable to misuse by users who might install malicious data that can affect the usability of [...]
  • 5
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2261

Assessing the Benefits of Cloud Computing: NVoicePay

The present paper uses a case study on NVoicePay to illuminate the business advantages of cloud computing and how IT leadership can be effective in achieving technology buy-in by communicating the benefits of the technology [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 940

Geographic Information Systems: A Review

The future of the industry is also based on the availability of the internet in many parts of the world, and this will push the traditional use of the desktop into the past.
  • Subjects: Applications
  • Pages: 25
  • Words: 6900

Virtual Reality in Construction

Originally, the use of virtual reality in construction within the past decade has been limited to 3D object design wherein separate 3D representations of the exterior and interior of the buildings are designed utilizing 3D [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2916

Recording and Analysing Data in HR

In an organization, employee data is collected as a part of HR data. In an organization, payroll data is a constituent of HR data.
  • Subjects: Data
  • Pages: 2
  • Words: 693

Dealing with IT’s Internal Business Partners

For example, the structure of management, the practice of the management, and the team work exhibited within an organization determine the importance of IT in an organization.
  • Subjects: Data
  • Pages: 2
  • Words: 623

Information Security: User’s Responsibility

The purpose of this project is to investigate the role played by information users in information security management. Why do employees engage in security-related risks that lead to breach of information security in the contemporary [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 832

Ethical Reasoning to Determine the Course of Action

Hurrying up the testing to meet the publicly announced testing deadline may lead to compromising the reliability and safety of the entire aircraft system. The decision to object to the demands obeys the rules of [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 832

Homomorphic Encryption: Communication and Security

Public cloud providers need the intervention of homomorphic encryption to promote security on the access of information. The access of information on the Internet may be dangerous because other competitors may be able to access [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 845

Google Docs Challenges and Opportunities

In this paper, I will discuss the Google Docs as a one of the prominent tools for collaboration, and try to present the challenges that are faced in its implementation, and how they are overcome.
  • Subjects: Applications
  • Pages: 2
  • Words: 1483

Engineering Disaster: Exxon Valdez Oil Spill

In this case, such a board would have ensured that the sonar was working, and the ship was well equipped and structured to carry the stipulated volume of crude oil.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 838

Computer Mediated Learning

Among the terms that are often used and erroneously taken to have the same meaning as computer mediated learning is the term computer authored learning.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 647

Teaching Content Through Literature and Technology: Trade Books

Activities: students' presentation of the Thanksgiving Day and the way of how they understand it; quizzes with the help of which students show their level of knowledge; competitions which are organized by the teacher to [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1175

Discouraging and Eliminating Cyber Bullying

Resources Role of the resource/input Statement forms To facilitate information transfer to the staff Counseling Personnel To arm students against the problem Bullying report system To create efficient internet enhance report system Regulation implementation documents [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Technology and Online Assessments

Educators are faced with a tough challenge to come up with innovative ways that guarantee the success of the education system besides ensuring that they are able to perform to the expectations of the public.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1388

Eye Tracking in Web Usability Studies

A researcher calculates the number of fixations on an area of interest to understand the level of the customers' interest. In most cases, a researcher needs to study the actual time spent on an area [...]
  • Subjects: Programming
  • Pages: 3
  • Words: 835

Project Color™ by The Home Depot

The major positive attribute is usability: the consumer only needs to take a photo of the room to be painted, or it could be uploaded from the iPhone library.
  • Subjects: Internet
  • Pages: 2
  • Words: 598

Safety Culture in Aviation

However, safety culture, in the production context, is a product of the integration of values and norms within the organization, which translates to commercial gains.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3036

The Global Revolution in Mobile

As earlier pointed out, users are currently able to use mobile phones with cameras and a huge amount of memory, and it is possible owing to the existence of 5G technology.
  • Subjects: Phones
  • Pages: 5
  • Words: 1392

Concept of Steganography in Society

The clandestine communication is attached to the carrier to create the steganography medium. The recipient of the message had to trim the messenger's hair to retrieve the communication.
  • Subjects: Internet
  • Pages: 11
  • Words: 3157

Emergency Communications Program

The first component of the plan entails training a group of employees in the identification of the internal and external constituents to be included in the evaluation of the terrorist threat.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 974

Information Security Basics

An important aspect of malware code is that it is installed in a computer without the consent of the owner of the computer.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1762

Salesforce Backup Solutions

Over and above that, the paper lists strategic steps on how to assimilate Salesforce Backup frameworks into micro-organisations for data safety in the event of system failures and adverse data loss.
  • Subjects: Internet
  • Pages: 11
  • Words: 2456

Database Management Systems in Charities

In conclusion, the research will identify issues associated with the use of database management systems in charities as well as churches and effective ways to handle these problems.
  • Subjects: Data
  • Pages: 7
  • Words: 1928

Computers and Information Gathering

On the other hand, it would be correct to say that application of computers in gathering information has led to negative impacts in firms.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

Spatial Data Division of Abu Dhabi Municipality

First the customer goes to the customer service to fill up the request form and inform the office of the request's rationale and the coverage area of the project or study.
  • Subjects: Data
  • Pages: 14
  • Words: 3603

Information Management Systems

It also discusses the importance of such systems in the context of the need to handle big data. For transaction processing system, the appropriateness of the dealings is overly dependent on the accurateness of the [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2290

The Future of Software Development

With the kind of efficiency and effectiveness that Scrum has demonstrated in previous projects, it is strengthening the weak lines and minimizing the possibility of errors persisting for a long time.
  • Subjects: Programming
  • Pages: 4
  • Words: 1087

IT Resource Actual Contingency Testing Plan

Another consideration in planning for contingency is the presence of human mistakes in the design and the operation phases of the system.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2989

Quay Cranes Weight Management Problems

In the article called "Quay crane scheduling problem" the authors recognise the problem with quay crane scheduling due to the growth of container traffic.
  • Subjects: Programming
  • Pages: 3
  • Words: 838

Computer Games: Morality in the Virtual World

It is necessary to note that these sets of morals are often employed in the virtual world only as many people create alter egos when playing games.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 585

Attribute-Based Encryption Overview and Benefits

The features of the public-key encryption include cryptography, public, and private key. As a result, the user can secure and authenticate data integrity using the private key.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 831

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Evaluation of the BackTrack Software Suite

According to the reviews, BackTrack can be easily used in the commerce environments because of the open access to the tools, and BackTrack is "good for web application assessment", and it is "perfect for penetration [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 873

The Recommendations of the American Welding Association

One of the recommendations that are common in most of the sources analyzed in this research is that anyone working in an environment where there is a risk of chromium and nickel fumes should make [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1971

Physical Disabilities and Assistive Technology

For example, learners with visual impairments can use text-to-speech programs. Learners with physical disabilities can be gathered for with the help of assistive technology devices such as adaptive keyboard and screen reading software for learners [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 663

Cryptology and Data Protection

The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 955

Observance, Privacy and Law

It is important for social media users to realize that social networks are not fully concerned with the probability of misuse of their personal information.
  • Subjects: Internet
  • Pages: 2
  • Words: 540

Internet Filtering: Debating the Positives & Negatives

Moving on to the exposition of the positives, it is clear that uncensored access to the Internet may impact negatively on the teenagers' attitudes, behaviour and safety, hence the need to employ Internet filtering.
  • Subjects: Internet
  • Pages: 4
  • Words: 1104

Internet Use Policy at Fairleigh Dickinson University

In discussing the ethical issues, it is imperative to note that personal use of the Internet broadens the ideological divergence between the employer and the worker, which is further polarized by the contrast between economic [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1163

Data Mining Role in Companies

The increasing adoption of data mining in various sectors illustrates the potential of the technology regarding the analysis of data by entities that seek information crucial to their operations.
  • Subjects: Data
  • Pages: 4
  • Words: 1137

Digital Signatures in The Business World

A digital signature is a cryptographically designed code that is attached to an electronic file to verify the authenticity of the sender.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 948

Low-Power Microcontrollers

Power supply from portable batteries has a significantly low voltage component, which affects the efficiency of the supply and the ability of the devices to adapt to the capabilities of the batteries.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 883

Censorship on the Internet

Censorship in the internet can also occur in the traditional sense of the word where material is removed from the internet to prevent public access.
  • Subjects: Internet
  • Pages: 9
  • Words: 2516

Green Computing in Botswana

The primary goal of green computing is to mitigate the use of harmful resources. Section B of the questionnaire focused on assessing how the respondents handle computers.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Relational Database Management Systems

Relational database management systems improve productivity, speed and flexibility of data management in an organization through a design that encourages a clear boundary between the logical and physical aspect of database management system.
  • Subjects: Data
  • Pages: 2
  • Words: 615

Cloud Computing and Amazon Web Services

Amazon EC2, Amazon S3 and RightScale are designed with capability to adapt with the size and amount of data and the number of users.
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 819

Augmented Reality Technology

The cost effectiveness of this technology arises from its ability to keep a project on track, and this is the cost benefit of augmented reality.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1291

Pipeline Installation Elements

This must take into account the line size of the pipeline and the length of the barrel. Design Pressure The design pressure must serve as a basis for determining the thickness of the wall of [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2790

Programming Logic and Design – Program Change

In the online processing method, processing of data takes place as it is input into the program, that is, unlike in batch processing it does not wait for the data to be organized into a [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 605

Value of Smartphone Security

The security standards include the use keystroke dynamics, monitoring the time of key holding, the flight time, multiplayer access regulations, priority regarding the application accessibility.
  • Subjects: Phones
  • Pages: 6
  • Words: 1678

Is Thunderbolt the Real Deal?

The Thunderbolt technology storage devices provide an opportunity for manufacturers to continue in the process of providing both professionals and consumers with quality devices.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 759

People Attitude about Green Computing

The first category is composed of the direct effects of the information technology products on the environment. The country leads in terms of the wide use of computers and other information technology devices.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 837

Technology and University Culture

In an interesting correlation between technology and university culture, Stephen Marshall presents the notion that it is the very culture within universities that ascribe to a set of strict fundamentals and organizational practices that limits [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 613

History of Cyber Terrorism

Terrorism on the cyberspace is one of the biggest challenges that came with the invention of the internet. The nature of the environment used in internet communication and socialization makes it hard for people to [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1204

Can the Internet Provide a Forum for Rational Political Debate?

The comparisons drawn between the Internet and its usage, on the one hand, and the radio and television, on the other hand, help to develop constructive discussions and arguments concerning the possibility of the Internet [...]
  • 5
  • Subjects: Internet
  • Pages: 16
  • Words: 4330

Addressing Information Technology Access Challenges for Students

The main purpose of the proposed study is to critically evaluate viable ways modern distance teaching universities can employ to deal with the challenge of lack of access to information and communication technologies that are [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2269

The Effectiveness of Using Podcast Lectures

The research seeks to indentify if learning using podcasts is more effective and beneficial to the students as compared to the traditional classroom lectures.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 868

IT Security in Google

The Google's New Privacy Policy is just an attempt to ensure high-level security of an individual's data and improvement in the search field.
  • Subjects: Internet
  • Pages: 2
  • Words: 585

Cyber Attacks: The UK and China

Reflection on the advantages of the strategy adopted by the two governments The above analysis shows that the UK is more effective in dealing with cyber crime as compared to China.
  • Subjects: Internet
  • Pages: 2
  • Words: 615

Fire Safety in the Health Care System

Automatic fire alarm systems have either smoke or heat detectors that sense the presence of the smoke and heat respectively and sound the alarm to alert occupants to evacuate.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1999

Robotic Pharmacy System Implementation

Citing some of the key benefits of the robotic pharmacy system, one of the most important is that it reduces the need for technical labor significantly.
  • 5
  • Subjects: Robotics
  • Pages: 3
  • Words: 861

Analysis: Domain Name System (DNS) and DNS tunneling

In addition, it requires an MX record in DS for the domain of the mail sender Ptr This character is the reverse map query on the PTR of the on-source RR Include:isp.com This is the [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2917

Ways of Strengthening Reinforced Concretes

As such, steel or RFP are some of the most commonly used concrete reinforcement materials to increase the strength of the structure and the ability to resist tension.
  • Subjects: Engineering
  • Pages: 5
  • Words: 896

Security in the Information Communication Technology

These include adapting the users to the system and getting the involvement of users through soliciting their input on ways of advancing the system. The corporate governance of the information security ought to begin from [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3185

Ethical Issues Surrounding Social Networking Sites

Social media can also be used to track the activities of users. It is important that measures be taken to control some of the ethical issues associated with social media, especially issues of privacy.
  • Subjects: Internet
  • Pages: 3
  • Words: 922

Webinars in Education

When it is night-time, some participants may be very exhausted and will not have the enthusiasm required to actively participate in the seminar sessions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 265

Cloud Computing and Virtualization Technologies

Through cloud computing, the organization is in a position to access complex applications and enormous computing sources through the internet. Through cloud computing and virtualization technologies, the organization is likely to benefit from economies of [...]
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1109

Quality and Rapid Application Development

One of the main concerns that arose from the use of RAD was that the quality of the software produced did not always meet the quality standards for software projects.
  • Subjects: Programming
  • Pages: 14
  • Words: 3741

Cloud Computing Security Issues in Enterprise Organizations

This paper will set out to show that while there are significant security threats that an enterprise faces when it migrates to the cloud, there are solutions that can be implemented to mitigate these threats [...]
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2908

Construction Safety in Latino Community

The study seeks to: Examine the prevailing status of construction safety and accidents among male workers in the Latino community, especially in the construction industry.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3914

Business Continuity and Crisis Management

The biggest challenge for an organisation operating in a disaster-prone business environment is the development of mechanisms of predicting risks and ways of protecting their brands from collapsing in the event of organisational crisis.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2827

Company Conceptual and Logical Data Views

On the one hand, the American Express keeps in pace with the time, employing the latest technologies to satisfy the clientele; on the other hand, some of the customers' complaints concerning the quality of services [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1156

Integrating Technology Into the Classroom

The types of quantitative information that would be helpful for evaluating the effectiveness of the imposed measures include the results of students' standardized tests and statistics data as to the rate of students' dropouts after [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 831

Integrated Safety Management System

However, ISO 14001 is biased towards the protection of the environment and while there are many constraints as a result of the merger of these two systems, the addition of ISO 9001 further complicates the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 939