Tech & Engineering Essay Examples and Topics. Page 39

5,359 samples

Cloud Computing: Privacy and Security

Despite the variety of advantages, the concept has presented to the end-users, there is also a range of risks associated with data and information security and privacy.
  • Subjects: Cloud Computing
  • Pages: 25
  • Words: 605

4G Network Adaptation and Evolution

In comparison to other networks, the functionality of 4G networks is distributed amongst a set of gateways and servers. It has also become easier to make video calls due to the speed and latency of [...]
  • 3
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2855

Analysis of nuclear engineering topics: Eight Mile Road Hearsay

The stakeholders include me, the plant's employees, the plant's management, the company, members of the public living within the plant's vicinity, the environment, colleagues in other power plants, and the nuclear industry.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1228

The iTrust Security Issue

It is important to note that management of data and proper maintenance of records is a very crucial process to the success of the organization.
  • Subjects: Internet
  • Pages: 5
  • Words: 1383

How Technology Changes Society

The study will explore the role of IMS in diminishing road carnage in the UAE. The structure of the family is also impacted upon the demise of the member.
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 3323

Google Does No Evil

Google has played a great role in delivering the right content to users of the search engine. Google has brought the world from darkness to the light, and people should never dream of a world [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1194

ICT Incorporation in Education: Leadership Laws Applicability

In this perspective, this paper proposes a research project seeking to determine the applicability of leadership laws including those postulated by John Maxwell in his book The 21 Irrefutable Laws of Leadership in aiding to [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1185

Emerging IT-Related Technology’s Ethical Issues

The 21st century is marked by the development of information technology and the emergence of IT-related technologies. The ethical dilemma under research is privacy and confidentiality on the application of emerging technology such as online [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 589

Response to Aviation Accidents

Within the FAA, the Office of Accident Investigation and Prevention is involved in accident investigation. During an investigation, the FAA reviews the recommendations and analyses of the NTBS in relation to aviation guidelines and policies.
  • 5
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 1850

The Multics Operating System Project

The architect linked "the file system with the memory access system". The Stratus VOS operating system had relied on "Multics to design its internal and external features".
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1156

Dialysis Water Treatment System

Heat exchanger: the evaporated water from the boiler is passed through the heat exchanger where it loses heat to the working fluid/feed water in the heat exchanger.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1788

Computer Security – Information Assurance

Some of the health care information stored in shared computers is sensitive, and it calls for health care practitioners to use a two-factor authentication to make sure that other users do not access the information. [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1159

Research on Radio Frequency Identification Technology (RFID)

Additionally, the stores are fitted with antenna readers at the door to detect the movement of the tagged products. Most of the qualities needed by information technology applications can be obtained in a number of [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1117

Secure Software Project Management

The use of computers in the day-to-day running of activities has therefore called for the setting up of standards that will guarantee aspects such as security of the software by ensuring that ethical elements of [...]
  • Subjects: Project Management
  • Pages: 9
  • Words: 2512

Fukushima’s Place in Nuclear History

The process of splitting the atoms is referred to as fission and uranium is the material that is used in the process.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2502

“It’s a Flat World, After All” by Thomas Friedman

Information technology was and has remained critical in the realization of a global virtual village, which is marked by the ease of access to information from all corners of the world and the ability to [...]
  • 1
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2214

Technology in Information Mining

What comes to the mind when talking about technology in relation to information are the changes in the methods of information extraction from different databases and processing of the data in order to come up [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1503

How Does Magnetic Train Works

The train still operates using the engine yet the engine is mainly used to control the speed and ensure that the vehicle stops whenever necessary.
  • Subjects: Engineering
  • Pages: 8
  • Words: 1563

Analysis of improving ATM services

The interview will involve bank managers to give information about the methods they are applying in order to reduce the increasing ATM risks.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1959

Smart Grid Technology: Power System Stability

According to the Ontario Smart Grid Forum, smart grid is a contemporary form of technology that makes use of computing knowledge in order to boost the efficiency of producing electricity On the same note, the [...]
  • Subjects: Engineering
  • Pages: 21
  • Words: 5757

Web Design for Selling Self-Published Books

The customer will also specify the format of the e-book and the type of file. After this process, the system then sends the e-book to the customer provided e-mail for download or the customer can [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2818

Technology in Modern World

Human cloning will lead to singularity in the sense that there will be no difference between the natural process of production and artificial production.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 604

Jet Engine in the Air Transport Industry

The purpose of this essay is to evaluate the impacts of the jet engine development on the air transport industry. The following is a discussion of some of the implications that the jet engine brought [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1978

Origins, Characteristics, and Consequences of Technological Systems

Technological systems also share this complexity because technological systems are also processes of several political, technical, and ideological systems that work together to create the technological system. Broadly, this essay takes the example of electrification [...]
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2526

Facebook: An Indispensable Social Networking Tool

It is the responsibility of users to handle their privacy issues and not the responsibility of Facebook. It is necessary for people to learn to use Facebook effectively and appropriately.
  • Subjects: Internet
  • Pages: 3
  • Words: 841

‘E-Readers vs. Print Readers: The Way Forward’

Of course there exist many other benefits that e-readers provide to users that may never be accessible in paperback contexts, but the present paper argues that traditional books are not about to be replaced by [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 861

QR Codes: Are They Efficient?

QR codes platforms need to be made more secure to reduce security threats which users are exposed to. Some users are directed to malicious content and websites whenever they scan these codes.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 580

Spamming Is More Acceptable Way of Sales Practice than Cold Calling

The digitization of information and communication technologies, the global extension of ICT-supported networks, services and applications, fixed and mobile phones, the World Wide Web and the internet have opened the diverse ways for a wide [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2268

Engineering and Teton Dam

In the case of the State of Idaho and the town of Rexburg, engineering innovation was needed to deal with the growing needs of an expanding township. The purpose of the dam was for the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1974

Pros and Cons of Waterfall Model

When the engineer and the client identify all requirements and the design, then the model can enhance superiority and security of the product.
  • Subjects: Programming
  • Pages: 7
  • Words: 2008

Steam Digital Software Distribution System

The relative successes of such companies create a competitive pressure for Steam as they either force the company to re-invent its products, or forces the company to consider reducing the price of its products, thereby [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 2011

Cloud Hosting Media Services

While this can be attributed to a number of factors, the most important of them is the existence of the internet as well as the emergence of many service providers.
  • Subjects: Data
  • Pages: 16
  • Words: 4295

Two Greatest Hacking Systems in the USA

Appropriating intellectual output of someone else is also a computer malpractice that is intolerable. Generally, Computer malpractice is seen when a person shows hasty and careless conducts or behaviors when making use of computer systems.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 950

PC Network Troubleshooting

For instance, simple restart of the program, sending the signal to the system in order to reload the initialization file restores the problem.
  • Subjects: Internet
  • Pages: 10
  • Words: 2780

Network Security and E-Business

The introduction of e-businesses has resulted to the need to modify the computer security systems from keeping the unwanted users away, but enabling the targeted people to access the network.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2184

Security Control in Organization

The security of the organization and the entire database depends on the quality of security each staff of the company enjoys.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2232

GIS Applications and Data Types

The use of a square grid to locate features in a defined location Ground survey and GPS is used to pick vector images Optical scanners mainly used to gather raster data.
  • Subjects: Applications
  • Pages: 2
  • Words: 511

Internet Usability Importance

Internet usability refers to the design and positioning of a website for ease of interaction with the users. The branding of domain names also leads to enhanced internet usability.
  • Subjects: Programming
  • Pages: 2
  • Words: 757

Biometrics and User Authentication

The cost of installing a fingerprint authentication system is higher relative to a voice recognition system. The cost of face recognition biometric authentication system depends on the security level of the system.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1743

How Computers Work: Components and Power

The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1077

Metadata and Tools in American Express

The ETL tool is used in the data integration section of the master data management implementation to alternate, standardize and transfer data to the master data management hub. Another factor that companies should consider in [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1478

Assistive Technology for High School Students with Dyslexia

The study query being dealt with is, "Can assistive technologies meet the requirements of dyslexic high school students when it comes to writing assignments?" The first part of this proposal details the underlying literature to [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 3061

The Education System and Factors of Technology

The methodology of this research is rooted in the comparisons of podcasts and vodcasts effectiveness. This research has raised the capacities and potential of technology in learning.
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2231

Cloud Computing Advantages and Challenges

The mere fact that users are not aware of the security strength of the facility can make the facility vulnerable to misuse by users who might install malicious data that can affect the usability of [...]
  • 5
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2261

Assessing the Benefits of Cloud Computing: NVoicePay

The present paper uses a case study on NVoicePay to illuminate the business advantages of cloud computing and how IT leadership can be effective in achieving technology buy-in by communicating the benefits of the technology [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 940

Geographic Information Systems: A Review

The future of the industry is also based on the availability of the internet in many parts of the world, and this will push the traditional use of the desktop into the past.
  • Subjects: Applications
  • Pages: 25
  • Words: 6900

Virtual Reality in Construction

Originally, the use of virtual reality in construction within the past decade has been limited to 3D object design wherein separate 3D representations of the exterior and interior of the buildings are designed utilizing 3D [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2916

Recording and Analysing Data in HR

In an organization, employee data is collected as a part of HR data. In an organization, payroll data is a constituent of HR data.
  • Subjects: Data
  • Pages: 2
  • Words: 693

Dealing with IT’s Internal Business Partners

For example, the structure of management, the practice of the management, and the team work exhibited within an organization determine the importance of IT in an organization.
  • Subjects: Data
  • Pages: 2
  • Words: 623

Information Security: User’s Responsibility

The purpose of this project is to investigate the role played by information users in information security management. Why do employees engage in security-related risks that lead to breach of information security in the contemporary [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 832

Ethical Reasoning to Determine the Course of Action

Hurrying up the testing to meet the publicly announced testing deadline may lead to compromising the reliability and safety of the entire aircraft system. The decision to object to the demands obeys the rules of [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 832

Technology Plan for W.T. White High School

The adoption of the new technology in learning and in the operations of the school will have positive impacts on the performance of the school.
  • Subjects: Project Management
  • Pages: 7
  • Words: 2244

Project Management: Sydney Water Company

Besides, from the start of the project, there were unclear procedures on how the project was to be reported to the board of directors.
  • Subjects: Project Management
  • Pages: 6
  • Words: 2058

Homomorphic Encryption: Communication and Security

Public cloud providers need the intervention of homomorphic encryption to promote security on the access of information. The access of information on the Internet may be dangerous because other competitors may be able to access [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 845

Project Collaboration Portal

The early purpose of JVIE was to solve the challenges associated with the project and utilize the opportunities, which it brought.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1105

Computer Technology in the Last 100 Years of Human History

These communication tools are based on computer technology, and are the foundation of younger generations' living. Computer technology is detrimental to the lives of younger generations because it fails.
  • 5
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1113

Building a Cordless Vacuum Cleaner

Therefore, start and finish of a task is a representation of two stages of the project. The longest path linking the start and finish point in a network diagram through a series of intermediate activities [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1317

Google Docs Challenges and Opportunities

In this paper, I will discuss the Google Docs as a one of the prominent tools for collaboration, and try to present the challenges that are faced in its implementation, and how they are overcome.
  • Subjects: Applications
  • Pages: 2
  • Words: 1483

Engineering Disaster: Exxon Valdez Oil Spill

In this case, such a board would have ensured that the sonar was working, and the ship was well equipped and structured to carry the stipulated volume of crude oil.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 838

Computer Mediated Learning

Among the terms that are often used and erroneously taken to have the same meaning as computer mediated learning is the term computer authored learning.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 647

Social and Organisational Issues in Project Management

As suggested in the literature, it may indeed be true that leadership style and competence in project settings are not directly related to project success; however, it can be argued that these two variables are [...]
  • Subjects: Project Management
  • Pages: 7
  • Words: 2082

Pontrelli Recycling Inc’s Project Management

The first amongst the planning activities is the fact that project managers must comprehend the firm's economic goals and other objectives to enable them align project operations to financial goals.
  • Subjects: Project Management
  • Pages: 2
  • Words: 654

Teaching Content Through Literature and Technology: Trade Books

Activities: students' presentation of the Thanksgiving Day and the way of how they understand it; quizzes with the help of which students show their level of knowledge; competitions which are organized by the teacher to [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1175

Discouraging and Eliminating Cyber Bullying

Resources Role of the resource/input Statement forms To facilitate information transfer to the staff Counseling Personnel To arm students against the problem Bullying report system To create efficient internet enhance report system Regulation implementation documents [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Technology and Online Assessments

Educators are faced with a tough challenge to come up with innovative ways that guarantee the success of the education system besides ensuring that they are able to perform to the expectations of the public.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1388

How to Define Project Success?

To prove that the studies of the process of project success assessment are just as challenging and important as those of the generalized notion of success, we are going to dwell on the relativity of [...]
  • Subjects: Project Management
  • Pages: 7
  • Words: 1999

Eye Tracking in Web Usability Studies

A researcher calculates the number of fixations on an area of interest to understand the level of the customers' interest. In most cases, a researcher needs to study the actual time spent on an area [...]
  • Subjects: Programming
  • Pages: 3
  • Words: 835

Project Color™ by The Home Depot

The major positive attribute is usability: the consumer only needs to take a photo of the room to be painted, or it could be uploaded from the iPhone library.
  • Subjects: Internet
  • Pages: 2
  • Words: 598

Justification for IT Capital Projects

The IT Portfolio Model is another method that the firm can use to rank the projects. It is important to understand the relevance of choosing the three models to rank the projects provided.
  • Subjects: Project Management
  • Pages: 3
  • Words: 838

Safety Culture in Aviation

However, safety culture, in the production context, is a product of the integration of values and norms within the organization, which translates to commercial gains.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3036

Apollo Program Scope and Development

The authors of the article dedicated to the success of the Apollo Program and its amazing "bubble" policy in economic and financial contexts, Gisler and Sornette admit that the ways of how the representatives of [...]
  • Subjects: Project Management
  • Pages: 5
  • Words: 1516

The Global Revolution in Mobile

As earlier pointed out, users are currently able to use mobile phones with cameras and a huge amount of memory, and it is possible owing to the existence of 5G technology.
  • Subjects: Phones
  • Pages: 5
  • Words: 1392

Concept of Steganography in Society

The clandestine communication is attached to the carrier to create the steganography medium. The recipient of the message had to trim the messenger's hair to retrieve the communication.
  • Subjects: Internet
  • Pages: 11
  • Words: 3157

Diesel and Gas Engines in Armored Vehicles

While diesel engines can establish in lighter armored vehicles that need to run a significant number of kilometers, gas turbine engines are suitable for heavy offensive tanks and infantry fighting vehicles.
  • Subjects: Engineering
  • Pages: 2
  • Words: 570

Emergency Communications Program

The first component of the plan entails training a group of employees in the identification of the internal and external constituents to be included in the evaluation of the terrorist threat.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 974

Information Security Basics

An important aspect of malware code is that it is installed in a computer without the consent of the owner of the computer.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1762

Salesforce Backup Solutions

Over and above that, the paper lists strategic steps on how to assimilate Salesforce Backup frameworks into micro-organisations for data safety in the event of system failures and adverse data loss.
  • Subjects: Internet
  • Pages: 11
  • Words: 2456

Database Management Systems in Charities

In conclusion, the research will identify issues associated with the use of database management systems in charities as well as churches and effective ways to handle these problems.
  • Subjects: Data
  • Pages: 7
  • Words: 1928

Digital Evidence Presentation

The technology of the drive relates to the manner used to store data or the method of connecting to other computer-system parts, like the motherboard.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 3210

The Iridium Constellation Project

Strength and Weaknesses of the Iridium Project When it comes to defining the key benefits of the Iridium Project, the location of the financial resources is traditionally the first feature mentioned.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2757

Project and Stakeholder Management

Within the context of project management, the word stakeholder can be defined as any individual or "organisation that is actively involved in a project, or whose interests may be positively or negatively affected by execution [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 3114

E-Commerce System for a Clothing Company in Abu Dhabi

Consequently, the following is the work breakdown configuration: Work Breakdown Configuration for the Development and Implementation of the e-Commerce Application Project Preliminary Study/Survey Understanding the Apparel Market and its trends in marketing and selling Evaluation [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2836

Autonomous Robots

Since they are self sufficient, the autonomous robots have the capacity to work in the absence of human beings. In the future, humanoid robots might have the intelligence and emotions similar to those of human [...]
  • Subjects: Robotics
  • Pages: 7
  • Words: 1963

Twitter Discussion Application Programming Interface

Part of the reason for the limited usage is the inadequate amount of documentation and research on the subject of Geo-location using Twitter and mining of online health information using Twitter.
  • Subjects: Phones
  • Pages: 10
  • Words: 2825

Computers and Information Gathering

On the other hand, it would be correct to say that application of computers in gathering information has led to negative impacts in firms.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

Spatial Data Division of Abu Dhabi Municipality

First the customer goes to the customer service to fill up the request form and inform the office of the request's rationale and the coverage area of the project or study.
  • Subjects: Data
  • Pages: 14
  • Words: 3603

Information Management Systems

It also discusses the importance of such systems in the context of the need to handle big data. For transaction processing system, the appropriateness of the dealings is overly dependent on the accurateness of the [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2290
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.