Tech & Engineering Essay Examples and Topics. Page 36

4,328 samples

Non Experts: Artificial Intelligence

Regardless of speed and the complexity of mathematical problems that they can solve, all that they do is to accept some input and generate desired output. This system is akin to that found in a [...]
  • Subjects: AI
  • Pages: 14
  • Words: 3773

The History of Relational Database Technology

In 1980's the disadvantages associated with relational database systems and the need to increase capacity of manageable objects led to the invention of commercial object-oriented database systems.
  • 5
  • Subjects: Data
  • Pages: 8
  • Words: 2179

Aviation Fire Risks and Safety

The major difference in standards of competence between the two branches is that, the personnel of Aviation Fire Rescue Services, have a deeper knowledge in aviation matters that the Local Authority Fire Rescue Services.
  • Subjects: Aviation
  • Pages: 9
  • Words: 2456

Product Fetch: SprintMusic MP3 Player

Therefore, this product has triple features it is eco-friendly as it uses a unique form of energy i.e.kinetic energy, it provides the distance ran and speed, and allows the user to set the desired speed [...]
  • 5
  • Subjects: Engineering
  • Pages: 3
  • Words: 859

“Capturing” in Culture and Beyond

The existence of the constant technological improvements in Europe as early as the thirteenth century validates Friedel's thesis on the existence of "a culture of improvement" in the western technology.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1099

Internet Tools for Dirt Bikes

The level of the technology that a company has impacts the profitability and the going concern of the business. Expenses related to the internal and external communication of the organization should be reviewed from time [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1126

High Power DVDs: Product Analysis

The High Power Subwoofer will always have you daring to move closer to the beat and the vibration mode is enough to turn your house into a club.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 662

Improvement of the Hp Touchpad and WebOS

Due to the poor performance of the Hp touchpad, many people started speculating the reasons for the poor sales performance of the gadget with some experts observing that the lack of Apps and the failure [...]
  • 5
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2148

Loud and Clear Mobile Communications

Virgin mobile Australia This is the youngest of the other service providers and is ranked fourth in the Australian telecommunication industry.
  • Subjects: Phones
  • Pages: 10
  • Words: 2760

Is Using Cell Phone Dangerous?

Research has further shown that "the side of the brain that is exposed to the ionizing radiations from the cell phone metabolizes more glucose than other parts that are not exposed to it".
  • Subjects: Phones
  • Pages: 4
  • Words: 1274

Nanotechnology Risk in a Nanogenerator

In the context of this essay zinc oxide is used in nanogenerator which acts as a transducer in the conversion of mechanical energy to electrical energy.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1367

Nanotechnology Risk in NanoBatteries

When the nanobatteries are exposed to fire, the inhalation of the fumes may cause severe respiratory tracts inflammation in the upper region of the respiration systems, which can lead the damage of the lungs.
  • 4
  • Subjects: Engineering
  • Pages: 5
  • Words: 1524

Biotechnology Development and the U.S. Economic Hegemony

Biotechnology is understood by many to be one of the most promising areas of technological development and among the most probable to bring significant economic and societal gains to the United States in the 21st [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1720

Managing Pilot Fatigue

This is so because the duties performed by the pilot in the cockpit require a lot of vigilance, care as well as mental and physical well being.
  • Subjects: Aviation
  • Pages: 3
  • Words: 779

Toyota Corporation Data Resource Management

Other than utilizing the knowledge and experience that the employees have, there is the need to use available information to grow and develop knowledge and expertise in employees.
  • Subjects: Data
  • Pages: 5
  • Words: 1394

Subsidies in the Airline

A significant occurrence in the history of US commercial airlines was the enactment of the deregulation Act which removed most of the federal government's regulations imposed on the industry.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1652

Computer Networks and Security

The node and the server share the private or secret key known to the KDC and to the nodes and servers.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2659

Regional Airlines: SkyWest Airlines

In 1977, the SkyWest Airlines made agreements with American Airlines, United Airlines, Texas International and Hughes, and this allowed check-in and baggage transfers between the airlines for the passengers.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2205

Internet Censorship in Saudi Arabia

The censorship is charged to the ISU, which, manage the high-speed data links connecting the country to the rest of the world.
  • 1
  • Subjects: Internet
  • Pages: 5
  • Words: 1471

Analysis of Boeing and Airbus

The strategy to meet the needs of the global market done by Airbus and Boeing companies has been on the basis of organizing its local Genuine Assets to work better than other companies, confronting the [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 1075

Wireless Technologies

In a bid to improve technology in the building, it is important to implement the wireless security devices. The cameras are also easy to hack into since the level of their security system is low.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 554

Characteristics for Website Evaluation

The website has a clear purpose, and the purpose is to provide the users with information concerning weather conditions. The website is user-friendly it has guidelines and navigation tool that are appropriate and consistent and [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 549

Challenges of the Huge Data in the Day-to-Day Transactions

This paper addresses some of the challenges the huge data may pose in the day-to-day transactions."RFID protocol is a communication protocol that uses radio waves to enable the transfer of data from an electronic tag [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1268

PC Models Comparative Analysis

Design features are also quite strong in two of the computers; the 27inch Apple iMac as well as the HP Touchsmart.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1184

The Engineering Challenges of the 21st Century

The experiences in terms of the effects and the response measures used in the Chernobyl nuclear power plant accident can be considered by Japan to help it address the consequences of the Fukushima nuclear disaster.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1958

The iPhones Fourth Generation

It is the fourth generation of the iPhone, having succeeded the iPhone 3GS, the other two previous models are the original iPhone and the iPhone 3G.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Insights on Green Automotive Development

Basing judgment on affordability and availability of the EVs, the tax incentives and exemptions offered by some government agencies to purchasers due to the high initial costs seems to be an unsustainable venture in emerging [...]
  • Subjects: Engineering
  • Pages: 5
  • Words: 1414

Impact of Technology on Education

The history shows that technological progress and modernity are closely interconnected, arranging a tandem for the development of more sophisticated techniques for the cognition of the surrounding world.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1715

Information Technology and Low-Cost Airlines

This is made possible by many factors but it can be said that the most significant component is the use of information technology specifically the utilization of the Intranet and Extranet networking system.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1625

The Open Systems Interconnection Referencing Model

Layer 7: The Application Layer This layer is the interface between the user and the network. The layer "transforms the data from the session layer to provide a standard interface for the application layer and [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1508

Data Integration and Data Quality

Data quality is one of the protective measures that is highly valued by most companies because the records that are stored in databases can be used to trace events and for the referencing to be [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1565

Technologically Advanced Baseball Bats Research

The purpose of this research study is to investigate the advantages of using technologically advanced, or high priced, baseball bats in the Little League Baseball.
  • Subjects: Engineering
  • Pages: 2
  • Words: 575

Hardcopies Versus Softcopies

Today it is possible to have the electronic versions of the physical reading materials such as the encyclopaedias, dictionaries or bibles, which are easy to access at any time or location as opposed to carrying [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1119

Online Persona: Ethical Implications

For the purposes of this essay, let us accept that a fabricated online persona remains ethically unsound, as we consider the social harm this causes, namely, the perpetuation of crippling social stigmas, and the erosion [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 821

AECbytes “Building the Future”

The author commends the continued innovation and the production of new things and new ways of handling the tasks of building design, construction, and collaboration, despite the challenging economics times.
  • Subjects: Engineering
  • Pages: 2
  • Words: 702

Biometric Technologies and Security

To achieve this, the assumptions that biometrics facilitate the invasion of privacy, may have dangerous health effects on the users, are discriminatory and are unnecessary expenses need to be laid to rest if the full [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2830

Dangers of Texting while Driving

The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • 5
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1123

Impact of Modern Technology on Human Communication

However, this paper has also illustrated that there may be hindrances to communication which can arise from the abuse of modern technology in communication efforts by individual.
  • Subjects: Internet
  • Pages: 3
  • Words: 808

Best Methods for Oil Clean Ups

The reports cover issues ranging from causes of oil spills to the effects of oil spills on the environment. Thus the main sources which lead to the release of oil into the ocean are related [...]
  • Subjects: Engineering
  • Pages: 11
  • Words: 3033

Hunter Institute of TAFE

Project description: the main purpose of this project is to open a new computer lab at Hunter Institute of TAFE. The necessity of this project can be explained by the fact that many computers in [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1366

Is Technology Neutral?

Rather than attribute the loss of jobs to adoption of technology, it is more appropriate to blame the loss of jobs on the decision to adopt technology.
  • 3.5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 975

Computer Communication Network in Medical Schools

Most medical schools have made it compulsory for any reporting student to have a computer and this point the place of computer communication network in medical schools now and in the future.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1743

What Are the Causes of the Increased Lack of Internet Privacy?

Although every individual has the right to accuse the government and internet service providing companies over their failure to protect their customers' privacy, individuals should recognize, they have a crucial duty to play as far [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 712

Impact of the Internet on Information Systems Ethics

Privacy of information involves ability to confine the confidential personal information in a specified domain area. The architecture of the internet is meant to enhance sharing of information and not to conceal or defend its [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 851

Business Pressures in Aviation Industry

The situation has brought major impacts in the lives of the passengers and even in the business of the transport service providers.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1723

Fitness and Performance in Aviation

The physical fitness and vigorous health of aviation workers are critical aspects in their performance, in aviation, because of the nature of some of their jobs that may be physically demanding.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2183

What is a Weblog?

It also crucially important to underline the purposes of this essay: to present all the necessary information about blog's essence, to underline what makes weblogs popular, to clear up who read weblogs and why, to [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 636

The Policies and Documentation: IPv4 vs. IPv6

Ipv4 addresses are supposed to be run out in the next two years that is why it's alternative which is Ipv6 is needed for the proper arrangement of the messages.
  • Subjects: Internet
  • Pages: 7
  • Words: 1880

Sample of Chart or Graph

While the stacked bar chart is very helpful in understanding the overall votes by respondents as well how many considered each focus area as critical or high, it does not give an idea of the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 559

The Role of Intranet in Health and Human Services Organization

Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. Individuals ought to be empowered to control the collection, use, and distribution [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 982

Data Warehoisung: Composite Bicycle Frame

The production of the composite bicycle frame that combines a metal spine in the midst of a fibre reinforced plastics have been in the market for quite a while but the materials keep changing to [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 675

Security Requirements Engineering

There are a number of approaches to the study of security requirements engineering, for instance, the elicitation method is likely to provide a framework for ordinary functional requirements which are more often than not oriented [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1181

Electronic Range Finder Technology Application

In the early 1960s, the devices were actively fitted in the most expensive cameras. Although more sophisticated auto-focus devices later outnumbered the range finders, some of these cameras are still in use today.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 546

Rogue Security Software: Digital Crime Scenario

This rogue security software can appear on a website in the form of an advertisement which in most of the time informs that internet user of their win for being a visitor to the website [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

The differences between e-readers and tablets

The spread of the innovative technologies pushes some people on the idea that books are going to disappear. First, the ancient books as the reminder of human history are going to remain.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 583

Organizational Vulnerability Assessment

The man-in-the-middle attack is also known as integrity attack since the actions of the system operators are based on the integrity of the data.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1324

Recommendation for a web server software package

When the software offers a wide range of product designs for the clients, they may feel that they are delayed from accessing the services. This is not convenient to clients who are particular in the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 543

Phishing threats and counter measures

In this case, the attacker sends emails to the bank customers promoting them to change their account information such as the password and username.
  • Subjects: Internet
  • Pages: 2
  • Words: 574

Société Générale Bank: Effective Security Controls

The management of the bank revealed that Kerviel exploited every loophole to hack the computer operations at the bank. It is also important to list the potential risks because it enables the security personnel to [...]
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1619

Evolution of Power Production

The goal of this paper is to review the evolution of power production as the basis for considering the future options of power for the planet.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2534

Information System and Modern Business

For instance, the Enterprise Resource Planning System is currently used to address business challenges such as linking strategic objectives of the organization and performance.
  • Subjects: Data
  • Pages: 3
  • Words: 821

Sephora: The Offers of Sephora.ca

The main particular feature of the campaigns is the fact that the offers are almost not available in stores, and the products are presented in the limited series.
  • Subjects: Internet
  • Pages: 5
  • Words: 1396

Hydraulic Engineering

One of the disadvantages with using canals for transportation was that the boats were easily damaged while on the double slipways.
  • Subjects: Engineering
  • Pages: 2
  • Words: 550

On Becoming a Cell Phone Junkie

Although I must admit that cell phones have earned their merits as essential tools of existence in the new millennium, I do not subscribe to the idea that my life should depend on it.
  • Subjects: Phones
  • Pages: 2
  • Words: 604

Applying Cloud Computing in the Corporate Area

In the software-as-a-service, the retailerprovides the software product,the hardware infrastructure and networks with the user via a front-end portal. In conclusion, software as a service cloud computing is not going to dominate the next several [...]
  • Subjects: Cloud Computing
  • Pages: 5
  • Words: 1276

Enterprise Architecture Center

According to Hayles,the main objective of EA is to enhance the performance of an organization by reducing the instances of faults in the tasks that are performed by their employees.
  • Subjects: Data
  • Pages: 5
  • Words: 1353

Open Source Systems: the Risks and Ethical Issues

In this paper, the risks and ethical issues associated with open-source systems are outlined and additionally, a one-page audit plan for an open-source system for Global Airline Co.prepared in order to boost the company's confidence [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1261

Are Hybrid Cars Worth It?

First and foremost what must be understood is that hybrid vehicles on average cost more than their primarily gasoline based counterparts, while it may be true that the hybrid car industry focuses on the fact [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2008

Nanotechnology and its Perspectives in Connecticut

According to a report by Office for Workforce Competitiveness of Connecticut, efforts to advance nanotechnology in Connecticut began in 2003 with a detailed assessment of the benefits of nanosciences to the state and the state's [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 629

Ethical and Illegal Computer Hacking

For the ethical hackers, they pursue hacking in order to identify the unexploited areas or determine weaknesses in systems in order to fix them.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 557

Air Force Maintenance and Production Planning

The paper also explores the concept of production planning in the air force in regard to the setting up of air force production centers and the personnel mandated with the strategic management and the overall [...]
  • Subjects: Aviation
  • Pages: 5
  • Words: 1493

Information Networking as Technology

Mozilla Firefox, Opera mini, and Seamonkey are the three web browsers covered in this project paper. Opera mini browser is by far better than Mozilla Firefox is; Opera mini is very efficient in terms of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 591

Computer Crimes Defense and Prevention

Naval Academy and he said that the security of the United States is threatened by a new breed of adversaries that has found a way to harass and terrorize America.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 541

The Best Social Networking Tool for Me

Rating of each alternative It is better to explore each tool, analyze the benefits of each tool before making a decision. Nevertheless, a good decision process will always lead to the best social networking tool.
  • Subjects: Internet
  • Pages: 3
  • Words: 757

Discourse of the Information Society

World Wide Web as a cybernetic phenomenon The World Wide Web, the graphical-interface Web browser, and the search engine tools have really shaped the face and the capabilities of the internet we enjoy to-date.
  • Subjects: Internet
  • Pages: 6
  • Words: 1595

Digital Technology – The Use of the Internet

Looking back, in retrospect, the computer that I first encountered was incomparable to the computers of today. The ultimate advancement in computer technology, for me, was the mainstream use of the internet.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Subjects: Internet
  • Pages: 3
  • Words: 832

Database Application at Amazon

A row contains data of one or more columns according to the design of a database; it describes a single instance of an entity.
  • 5
  • Subjects: Data
  • Pages: 4
  • Words: 419