Tech & Engineering Essay Examples and Topics. Page 36

4,315 samples

Loud and Clear Mobile Communications

Virgin mobile Australia This is the youngest of the other service providers and is ranked fourth in the Australian telecommunication industry.
  • Subjects: Phones
  • Pages: 10
  • Words: 2760

Is Using Cell Phone Dangerous?

Research has further shown that "the side of the brain that is exposed to the ionizing radiations from the cell phone metabolizes more glucose than other parts that are not exposed to it".
  • Subjects: Phones
  • Pages: 4
  • Words: 1274

Nanotechnology Risk in a Nanogenerator

In the context of this essay zinc oxide is used in nanogenerator which acts as a transducer in the conversion of mechanical energy to electrical energy.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1367

Nanotechnology Risk in NanoBatteries

When the nanobatteries are exposed to fire, the inhalation of the fumes may cause severe respiratory tracts inflammation in the upper region of the respiration systems, which can lead the damage of the lungs.
  • 4
  • Subjects: Engineering
  • Pages: 5
  • Words: 1524

Biotechnology Development and the U.S. Economic Hegemony

Biotechnology is understood by many to be one of the most promising areas of technological development and among the most probable to bring significant economic and societal gains to the United States in the 21st [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1720

Toyota Corporation Data Resource Management

Other than utilizing the knowledge and experience that the employees have, there is the need to use available information to grow and develop knowledge and expertise in employees.
  • Subjects: Data
  • Pages: 5
  • Words: 1394

Computer Networks and Security

The node and the server share the private or secret key known to the KDC and to the nodes and servers.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2659

Regional Airlines: SkyWest Airlines

In 1977, the SkyWest Airlines made agreements with American Airlines, United Airlines, Texas International and Hughes, and this allowed check-in and baggage transfers between the airlines for the passengers.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2205

Internet Censorship in Saudi Arabia

The censorship is charged to the ISU, which, manage the high-speed data links connecting the country to the rest of the world.
  • 1
  • Subjects: Internet
  • Pages: 5
  • Words: 1471

The Computer Microchip Industry

For instance, the company can decide to focus on durability and by doing so, the company will have a competitive advantage in the market.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 938

Wireless Technologies

In a bid to improve technology in the building, it is important to implement the wireless security devices. The cameras are also easy to hack into since the level of their security system is low.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 554

Contribution of the Factors to the Internet Growth

With the use of this different scripting languages integration of multimedia features into products has become a reality and with the advancement in scripting languages the internet in the near future is expected to have [...]
  • Subjects: Programming
  • Pages: 5
  • Words: 1653

Characteristics for Website Evaluation

The website has a clear purpose, and the purpose is to provide the users with information concerning weather conditions. The website is user-friendly it has guidelines and navigation tool that are appropriate and consistent and [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 549

Challenges of the Huge Data in the Day-to-Day Transactions

This paper addresses some of the challenges the huge data may pose in the day-to-day transactions."RFID protocol is a communication protocol that uses radio waves to enable the transfer of data from an electronic tag [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1268

E-mail Spam: What it is and how it works

They also throw back the argument of accessing addresses back to recipients and claim that since it is in a public directory, then spammers should not be blamed for accessing and using the addresses.
  • Subjects: Internet
  • Pages: 3
  • Words: 829

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

Wind Turbines Manufacturers Overview

Sinovel has been a leader of the Chinese market in producing innovative turbine equipments in the sense that; it is the first to introduce an advanced wind turbine in the world, it was the first [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2729

PC Models Comparative Analysis

Design features are also quite strong in two of the computers; the 27inch Apple iMac as well as the HP Touchsmart.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1184

The Engineering Challenges of the 21st Century

The experiences in terms of the effects and the response measures used in the Chernobyl nuclear power plant accident can be considered by Japan to help it address the consequences of the Fukushima nuclear disaster.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1958

Use of Simulation in Military

The first type of simulation used in the military is live simulation. The second application of simulation in the military is the use of virtual simulation.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

Normative Ethics and the Right to Privacy

Recent advances in technologies have prompted a new consideration of e-mail, use of e-mail, and its relation to ethics. From the deontological perspective, the court's decision to give Ellsworth's parents legal access to his e-mail [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 892

Insights on Green Automotive Development

Basing judgment on affordability and availability of the EVs, the tax incentives and exemptions offered by some government agencies to purchasers due to the high initial costs seems to be an unsustainable venture in emerging [...]
  • Subjects: Engineering
  • Pages: 5
  • Words: 1414

Information Technology and Low-Cost Airlines

This is made possible by many factors but it can be said that the most significant component is the use of information technology specifically the utilization of the Intranet and Extranet networking system.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1625

Application of RFID Technology

The silicon chip in the transporter tag contains object such as the exact place of location, the date of manufacture, the color of the product, the price, or any other relevant information.
  • Subjects: Applications
  • Pages: 5
  • Words: 1595

Data Integration and Data Quality

Data quality is one of the protective measures that is highly valued by most companies because the records that are stored in databases can be used to trace events and for the referencing to be [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1565

Technologically Advanced Baseball Bats Research

The purpose of this research study is to investigate the advantages of using technologically advanced, or high priced, baseball bats in the Little League Baseball.
  • Subjects: Engineering
  • Pages: 2
  • Words: 575

The Rationale of the Cryonics

The Egyptians hence tried to make sure that they preserved a person very close to immortality and this is the reason why they when to greater extent of building the pyramids and doing the mummification.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 2017

Hardcopies Versus Softcopies

Today it is possible to have the electronic versions of the physical reading materials such as the encyclopaedias, dictionaries or bibles, which are easy to access at any time or location as opposed to carrying [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1119

Rescue Operation for Trapped Chilean Miners

This helped the rescuers in knowing the conditions inside the mine, more importantly; the holes were used to send food, water and medication to the miners.
  • 1
  • Subjects: Engineering
  • Pages: 4
  • Words: 543

AECbytes “Building the Future”

The author commends the continued innovation and the production of new things and new ways of handling the tasks of building design, construction, and collaboration, despite the challenging economics times.
  • Subjects: Engineering
  • Pages: 2
  • Words: 702

Biometric Technologies and Security

To achieve this, the assumptions that biometrics facilitate the invasion of privacy, may have dangerous health effects on the users, are discriminatory and are unnecessary expenses need to be laid to rest if the full [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2830

Dangers of Texting while Driving

The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • 5
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1123

Best Methods for Oil Clean Ups

The reports cover issues ranging from causes of oil spills to the effects of oil spills on the environment. Thus the main sources which lead to the release of oil into the ocean are related [...]
  • Subjects: Engineering
  • Pages: 11
  • Words: 3033

Hunter Institute of TAFE

Project description: the main purpose of this project is to open a new computer lab at Hunter Institute of TAFE. The necessity of this project can be explained by the fact that many computers in [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1366

Computer Communication Network in Medical Schools

Most medical schools have made it compulsory for any reporting student to have a computer and this point the place of computer communication network in medical schools now and in the future.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1743

What Are the Causes of the Increased Lack of Internet Privacy?

Although every individual has the right to accuse the government and internet service providing companies over their failure to protect their customers' privacy, individuals should recognize, they have a crucial duty to play as far [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 712

Relational Database Systems

This is a business report, personally addressed to the manager of the Easy Drive School of Motoring explaining why and how a relational database system will address the problems of the organization.
  • Subjects: Data
  • Pages: 6
  • Words: 1702

Impact of the Internet on Information Systems Ethics

Privacy of information involves ability to confine the confidential personal information in a specified domain area. The architecture of the internet is meant to enhance sharing of information and not to conceal or defend its [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 851

Business Pressures in Aviation Industry

The situation has brought major impacts in the lives of the passengers and even in the business of the transport service providers.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1723

Fitness and Performance in Aviation

The physical fitness and vigorous health of aviation workers are critical aspects in their performance, in aviation, because of the nature of some of their jobs that may be physically demanding.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2183

What is a Weblog?

It also crucially important to underline the purposes of this essay: to present all the necessary information about blog's essence, to underline what makes weblogs popular, to clear up who read weblogs and why, to [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 636

The Policies and Documentation: IPv4 vs. IPv6

Ipv4 addresses are supposed to be run out in the next two years that is why it's alternative which is Ipv6 is needed for the proper arrangement of the messages.
  • Subjects: Internet
  • Pages: 7
  • Words: 1880

The Role of Intranet in Health and Human Services Organization

Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. Individuals ought to be empowered to control the collection, use, and distribution [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 982

Data Warehoisung: Composite Bicycle Frame

The production of the composite bicycle frame that combines a metal spine in the midst of a fibre reinforced plastics have been in the market for quite a while but the materials keep changing to [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 675

Computer Fraud and Contracting

The law does not provide the consumers with measures to enforcing the online contracts because the argument is that, it is impossible to tell the intention and the consent of the consumer when they signed [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1836

Security Requirements Engineering

There are a number of approaches to the study of security requirements engineering, for instance, the elicitation method is likely to provide a framework for ordinary functional requirements which are more often than not oriented [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1181

Electronic Range Finder Technology Application

In the early 1960s, the devices were actively fitted in the most expensive cameras. Although more sophisticated auto-focus devices later outnumbered the range finders, some of these cameras are still in use today.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 546

Rogue Security Software: Digital Crime Scenario

This rogue security software can appear on a website in the form of an advertisement which in most of the time informs that internet user of their win for being a visitor to the website [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

The differences between e-readers and tablets

The spread of the innovative technologies pushes some people on the idea that books are going to disappear. First, the ancient books as the reminder of human history are going to remain.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 583

Organizational Vulnerability Assessment

The man-in-the-middle attack is also known as integrity attack since the actions of the system operators are based on the integrity of the data.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1324

Recommendation for a web server software package

When the software offers a wide range of product designs for the clients, they may feel that they are delayed from accessing the services. This is not convenient to clients who are particular in the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 543

Phishing threats and counter measures

In this case, the attacker sends emails to the bank customers promoting them to change their account information such as the password and username.
  • Subjects: Internet
  • Pages: 2
  • Words: 574

Société Générale Bank: Effective Security Controls

The management of the bank revealed that Kerviel exploited every loophole to hack the computer operations at the bank. It is also important to list the potential risks because it enables the security personnel to [...]
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1619

Evolution of Power Production

The goal of this paper is to review the evolution of power production as the basis for considering the future options of power for the planet.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2534

Information System and Modern Business

For instance, the Enterprise Resource Planning System is currently used to address business challenges such as linking strategic objectives of the organization and performance.
  • Subjects: Data
  • Pages: 3
  • Words: 821

Sephora: The Offers of Sephora.ca

The main particular feature of the campaigns is the fact that the offers are almost not available in stores, and the products are presented in the limited series.
  • Subjects: Internet
  • Pages: 5
  • Words: 1396

Hydraulic Engineering

One of the disadvantages with using canals for transportation was that the boats were easily damaged while on the double slipways.
  • Subjects: Engineering
  • Pages: 2
  • Words: 550

On Becoming a Cell Phone Junkie

Although I must admit that cell phones have earned their merits as essential tools of existence in the new millennium, I do not subscribe to the idea that my life should depend on it.
  • Subjects: Phones
  • Pages: 2
  • Words: 604

Applying Cloud Computing in the Corporate Area

In the software-as-a-service, the retailerprovides the software product,the hardware infrastructure and networks with the user via a front-end portal. In conclusion, software as a service cloud computing is not going to dominate the next several [...]
  • Subjects: Cloud Computing
  • Pages: 5
  • Words: 1276

Enterprise Architecture Center

According to Hayles,the main objective of EA is to enhance the performance of an organization by reducing the instances of faults in the tasks that are performed by their employees.
  • Subjects: Data
  • Pages: 5
  • Words: 1353

Open Source Systems: the Risks and Ethical Issues

In this paper, the risks and ethical issues associated with open-source systems are outlined and additionally, a one-page audit plan for an open-source system for Global Airline Co.prepared in order to boost the company's confidence [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1261

Are Hybrid Cars Worth It?

First and foremost what must be understood is that hybrid vehicles on average cost more than their primarily gasoline based counterparts, while it may be true that the hybrid car industry focuses on the fact [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2008

Nanotechnology and its Perspectives in Connecticut

According to a report by Office for Workforce Competitiveness of Connecticut, efforts to advance nanotechnology in Connecticut began in 2003 with a detailed assessment of the benefits of nanosciences to the state and the state's [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 629

Air Force Maintenance and Production Planning

The paper also explores the concept of production planning in the air force in regard to the setting up of air force production centers and the personnel mandated with the strategic management and the overall [...]
  • Subjects: Aviation
  • Pages: 5
  • Words: 1493

Information Networking as Technology

Mozilla Firefox, Opera mini, and Seamonkey are the three web browsers covered in this project paper. Opera mini browser is by far better than Mozilla Firefox is; Opera mini is very efficient in terms of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 591

Business Intelligence Approaches

Business intelligence is a term used to refer to a collection of applications that aim at keeping and making available a data bank in a certain industry or organization; the bank is referred to when [...]
  • Subjects: Data
  • Pages: 2
  • Words: 629

Computer Crimes Defense and Prevention

Naval Academy and he said that the security of the United States is threatened by a new breed of adversaries that has found a way to harass and terrorize America.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 541

The Best Social Networking Tool for Me

Rating of each alternative It is better to explore each tool, analyze the benefits of each tool before making a decision. Nevertheless, a good decision process will always lead to the best social networking tool.
  • Subjects: Internet
  • Pages: 3
  • Words: 757

Discourse of the Information Society

World Wide Web as a cybernetic phenomenon The World Wide Web, the graphical-interface Web browser, and the search engine tools have really shaped the face and the capabilities of the internet we enjoy to-date.
  • Subjects: Internet
  • Pages: 6
  • Words: 1595

Digital Technology – The Use of the Internet

Looking back, in retrospect, the computer that I first encountered was incomparable to the computers of today. The ultimate advancement in computer technology, for me, was the mainstream use of the internet.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Database Application at Amazon

A row contains data of one or more columns according to the design of a database; it describes a single instance of an entity.
  • 5
  • Subjects: Data
  • Pages: 4
  • Words: 419

Case Project Information Security

An even bigger risk that the virus poses is that it uses the host machine to perpetrate denial of service attacks over the internet.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 786

Security System: Information and Property within Business

Information security system Business information may include but not limited to information on employees, consumers, commodities offered, financial status of the business, business policies and also future plans of the business hence such information should [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 979

The Bates Numbering System of Document Branding

In summary, it can be said that Bates numbering is a basic system of document organization operating on the principle of clearly embedding documents and images with unique digital or manual identifiers.
  • Subjects: Data
  • Pages: 2
  • Words: 544

Security Threats in Social Sites

Contrasting speculations that the sites lack security or privacy, the involved firms recognize benefits of investing in Information Security, thus the need to understanding methodologies behind risks experienced by the clients.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 622

Data Analysis and Maintenance

The hypotheses of the research have been developed with the operationalization of the variables done. The other personal data such as the age, weight, height and personal characteristics of the employees shall be obtained from [...]
  • Subjects: Data
  • Pages: 2
  • Words: 712