Tech & Engineering Essay Examples and Topics. Page 39

5,909 samples

Crew Resource Management and Accidents

The workload is an essential notion in the discipline of human resource management; in the field of aviation, this notion gains critical importance because it is one of the factors upon which the safety of [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 3347

Airport Security and Human Factors Management

The complexity of the modern world and problems and misunderstandings in international relations resulted in the rise of terrorism, which is considered one of the most topical issues of the modern world.
  • Subjects: Aviation
  • Pages: 12
  • Words: 1117

Imagineering Myths About Virtual Reality

Walt Disney Imagineering team, which encompassed a wide range of professionals responsible for various entertainments offered by theme parks, resorts, and other venues, is currently devoting a lot of time and effort to unlock the [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1167

Biometrics and Body Scanner in Aviation Security

In particular, regulation number 300/2008, issued and approved by the European Parliament and Council, outlines a set of common standards and rules affecting the procedures involved in aviation security matters; to be more precise, the [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3852

E-Learning Theory’s Concepts and Principles

According to this concept, the irrelevant material needs to be removed entirely not to distract a reader from the main content. The main idea of this principle is to introduce key concepts before the start [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 681

Union National Bank’s Enterprise Social Networking

According to the online interview the researcher had with the top management of this firm, it is apparent that the Union National Bank has been negatively affected in the past by system failures.
  • Subjects: Applications
  • Pages: 15
  • Words: 3905

Project Management Institute: Training and Development

Project Management Institute is a prominent Institute founded in 1969 and provided education for more than 2,9 million specialists worldwide. Focusing on project management, it offers a wide range of certification programs.
  • Subjects: Project Management
  • Pages: 2
  • Words: 559

The Efficacy of Mobile Learning in Saudi Arabia

The concept of mobile learning refers to the educational process occurring through the medium of wireless devices. The research question can be formulated as follows: how effective is mobile learning for improving the academic outcomes [...]
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 2127

The Influence of Technologies on Education

The impact of technologies on cultural diversity is also dubious as mobilization of people can lead to cooperation, mutual enrichment, and creation of a new collective identity, as well as to conflicts, loss of identity, [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1407

Mobile Applications’ Benefits and Challenges

The other factor to consider is the number of handsets obtainable for a mobile platform and their characteristics. Additionally, it also determines the type of mobile devices that can use the applications.
  • Subjects: Applications
  • Pages: 6
  • Words: 1646

Vendor Products and Services Implementation

There are a lot of reasons the companies face the implementation failure of different projects, sometimes even before the project was actually implemented.
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 942

Digital Portfolio System Implementation

Also, the educators focus on the organizational issues that were encountered and demonstrate that the engagement of the key stakeholders has ensured the effective and near-universal use of portfolios in the program.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1427

New Media Technology Tools in High School Learning

The use of new media in schools is considered to be a process in itself, where the standards that allow new media adoption are set first. This study will examine the factors that enable the [...]
  • Subjects: Technology in Education
  • Pages: 20
  • Words: 5544

Dubai City’s Land Area Increasing Project

It is also important to understand the mission and vision strategy of this project, in order to rationalize the project. The vision of this project is to have a city that is free from pollution, [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2823

Aviation: Security Risk Management

Moreover, the rise of terrorism and its spread throughout the globe has also contributed to the great importance of security measures that must be explored to guarantee the security and safety of passengers and personnel [...]
  • Subjects: Aviation
  • Pages: 11
  • Words: 3098

Education Technology: Instructional Resources

Among the most beneficial instructional technology resources with the potential to enhance learning in the operating room is a journal of the Association of Operating Room Nurses.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 870

Education Technology Resources

However, it is not recommended to use it with elementary school students due to the complexity of the interface. It is possible to highlight some sections of the paper and leave a comment that will [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1725

Outcomes of the Phone Usage While Driving

To the end of their lives, neither the victims' loved ones nor the driver will be able to cope with the tragedy that resulted. The assertion that driving and texting or talking on the phone [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 1236

E-Bikes in the UAE: New Technologies Advance

Finally, the design stage would require specification of the key components, such as the capacity of the battery, the principle of the charging mechanism's operation, the use of the mechanical components, and the overall shape [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1570

Videoconferencing Technology in Education

The following paragraph describes the work of Wang, Chen, and Wu, which discusses the role of videoconferencing technologies in multiple educational organizations and societies.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1092

The JASSM Program: Power of Autonomy and Learning

At last, his focus on results and desire to challenge the team to do the impossible was the factors that encouraged the team to complete the project before the set deadline.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1192

Kurzweil 3000 System Deployment

The awareness campaign should be focused on the key features of the product, its advantages over traditional learning methods, and the benefits of its implementation for the learners and, by extension, the improvement in the [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 923

Website Development and Planning Strategy

This stage of the process involves developing a "vision" for the website in terms of what is its specific purpose for the company.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1081

International Students and Mobile Services in Australia

At this point, we are going to advance a hypothesis that these customers pay most attention to such criteria as the price of international phone calls, the ease of use, the variety of mobile services, [...]
  • Subjects: Phones
  • Pages: 8
  • Words: 2098

Computer Based Learning in Elementary Schools

The main purpose of the research is to consider the background of the chosen sphere, the elementary education, and discuss current business issues in the computer technologies which may be used in the sphere and [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2230

Wireless Communication and the Trends in This Industry

The new development is also a time and cost saving mechanism for the banks that engage in the finance business due to the fact that integration of the different banking systems reduces costs on messages, [...]
  • Subjects: Phones
  • Pages: 6
  • Words: 1872

Human Computer Interaction: Types of Special Needs

The rapid growth of the information technology sector worldwide, with the accompanying rise and spread of the internet denotes the intensity of the challenge of meeting the special needs of persons who cannot use the [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1227

Diffusion of Innovations Theory in Education

When it comes to discussing the origins of the theory and the factors that have predetermined its appearance, or, at the very least, played an essential part in the process of theory creation, one must [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1250

Vology Inc.’s Information Security and Assurance

This paper is to assess the vulnerabilities of different areas of the information technologies services security and assurance, to provide possible methods of testing and defining the flaws in the existing infrastructure, and to identify [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 913

Cotton-Pellet Production Facility Feasibility

The first reason was the potential reduction of the energy footprint of the cotton industry in the country by offsetting the energy consumed by the industry.
  • Subjects: Project Management
  • Pages: 3
  • Words: 847

Soft Systems Methodology and Its Applications

General idea concerning Soft Systems Methodology There exists a common misapprehension that Soft Systems Methodology is a tactic for exclusively tackling soft problems, perhaps due to the use of the word "soft" in the taxonomy [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2767

Information System Development: Research Approaches

Besides, the running of an organization and achieving its purposes requires knowledge in the use of information technology and its management. Most of the design work is done by the managers and the IS practitioners.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1671

Car Parking Case Competition and Experience

The primary goal was to design the relevant solution to find the equilibrium between supply and demand related to the number of cars and a limited number of the parking lots.
  • Subjects: Project Management
  • Pages: 3
  • Words: 747

IT Companies and Their Business Opportunities

The data was analyzed and the conclusions confirmed that the corporate goals of the companies determined the level of payoff from information technology.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1380

The Importance of Virtual Learning Communities

The learning communities enable the instructors and the students to volunteer their questions. The virtual learning communities enable online degree programs to give students autonomy over the learning process.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1679

UAE Cybercrime Laws and Statistics in Dubai

According to the chart provided above, the introduction of the new legislation has contributed to a minor drop in cybercrimes. In addition, it can be suggested that programs should be created to educate people on [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 449

Technologies Development and Use in Education

The failure of the usage of technologies in the learning process gives rise to several significant problems. The modern sphere of learning is also characterized by adherence to modern tendencies.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 569

Classical Project Management: Flaws and Solutions

This essay will demonstrate that the reason to criticize the classical project management because of its inappropriateness for the praxis is in the fact that traditional project management strategies and tools are limited to address [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 1647

Google Android OS: Strategic Plan

One of the plans for the company is to be the choice company for smartphone manufacturers in the choice of software required for the manufacture of the phones.
  • Subjects: Applications
  • Pages: 4
  • Words: 1233

Australian Robotics Inc.’s Project Management

As such, the measure of success will focus on ascertaining whether or not the project develops a new family of highly flexible, "intelligent" robots that can be used in handling heavy industry tasks.
  • Subjects: Project Management
  • Pages: 9
  • Words: 2421

Software Status Quo Workshop for an Organization

Therefore, it is imperative to make sure that the members of the organization are aware of the challenges that the operations with Big Data in the environment of the global economy may trigger.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 812

Recyclability Assessment of Vehicular Materials

This paper uses the indices-approach to gauge the recyclability of the finished products and thereby reveal the best practices that apply to the entire industry.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1641

Corporate Computing Function and Its Requirements

Typically, meeting the information needs of the organization is of paramount importance in the development of the network architecture of the organization that enables internal and external communication and sharing of information on the LAN [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 826

Resilience in Cyber-Ecology and Information Security

In a broader sense, resilience is one of the essential elements that determine the healthiness of a system. While trying to understand the meaning of resilience in the framework of cyber-ecology, it is critical to [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 852

Information Security Department Employees’ Skills

It is within this context that the paper assesses the sample activities performed by functions of the information security and assurance department, highlights the skills required, and explains the benefits of diversifying roles in the [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 860

Designing and Validating Technological Interventions

Current research as reported by Kennedy & Deshler demonstrates that the gap between the level at which learners with learning disabilities perform and the demands of the learning environment as well as the curriculum that [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 600

Online Teaching for the Disabled

The ability of technology to accommodate a disabled person should be considered when selecting and evaluating technological solutions for people with disabilities.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 528

Traditional and Changing Information Security

The traditional approach distinguishes the concepts of security and safety whereas both communities focus on preventing losses, the former deal with intentional activity and the latter focuses on the unintentional activities.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 882

Systems Thinking, Risks and Interdependencies

It is beneficial for the enterprise to treat it as a system because information security architecture is a complex notion that considers the harmonious interaction of information assurance services and mechanisms.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 923

Informatics as an Approach and a Theory

The multidisciplinary approach to informatics, in my view, has led to the many different definitions of informatics as professionals use the lens of individual disciplines or fields of expertise to make sense of the processes, [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 866

Technical Support: Protonic.com v Ask Me Help Desk

Not only was it required that I should include the information about my computer operating system, the browser that I use, and the company that supplies the Internet connection, but also a range of other [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 863

National Fire Protection Association Standards

While the NFPA 15 and NFPA 68 codes appear to offer appropriate devices for the control of explosive hazards, NFPA 69 offers the best standards and guidelines on the explosive prevention devices.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 548

Army Knowledge Online: Benefits and Flaws

The efficiency and effectiveness of the rehabilitation and diagnosis of the soldiers that have been wounded in the field have been augmented through the AKO application of Wounded Warrior.
  • Subjects: Internet
  • Pages: 2
  • Words: 552

Online Predators and Childrens’ Cybersecurity

To win the battle against online predators it is important to craft laws that were created by people with a thorough understanding of how perpetrators utilize information systems and the Internet to commit sexually-related cyber [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1114

Blue Moon Financial Company’s Incident Response

The senior security analyst will develop a specific remediation response for the attack. The senior security analyst will have to determine the most appropriate containment strategy for the active attack.
  • Subjects: Cyber Security
  • Pages: 12
  • Words: 3303

Addressing and Naming Model in a Large Organization

This paper aims to provide outlines of plans for the addressing and naming model that can be used in a large organization, in the environment based on the separate geographical locations, and in the environment [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 841

Photovoltaic System Advantages and Applications

Still, people continue making numerous attempts to solve the challenges, and the use of solar energy with the help of the PV system is one of the latest achievements that makes it possible to use [...]
  • Subjects: Engineering
  • Pages: 5
  • Words: 1374

WiFi in Rural Areas: Technology Implementation

After the collection, the assembling of the materials starts to make the Cantenna. To ensure nice fitting of the N-connector, "use a special tool to smoothen out the burrs and enlarge the hole slightly and [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2738

The Work Breakdown Structure Issues

There is no use denying the fact that every new project needs a good and clear plan which will be able to take into account all peculiarities of the work of a new project [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 516

Digital Gaming in the Classroom: Teacher’s View

The authors identified that there was a problem when identifying the learning preference of the K-12 students coupled with how well instructional methods would suit their learning preferences, which was then the problem of the [...]
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2643

Lead Fashion Designers: Enterprise Resource Planning System

The separation of the application server from database server will make it possible for Lead fashion Designers' customers to access the application server where they can make their queries as well as facilitate them to [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 882

Literacy Through iPads in Early Education

In the article, Beschorner and Hutchison, note that in the 21st century, children gain access to written language very early due to the use of digital devices.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 571

Secure Software Development Life Cycle

Then there was a challenge response model according to which the system sent the user a challenge in the form of randomized character string, and the user responded with a computational value based on the [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2242

Net Neutrality Proposed by Internet Providers

Also, it would restrict open and free access to these contents, a virtue that was the main driver for its introduction in the first place. Moreover, it has enabled open and free access to different [...]
  • Subjects: Internet
  • Pages: 15
  • Words: 4109

New Media Technologies for Teachers

The research questions help to explore the overarching query, which is to determine what motivates or limits teachers when they are adopting new technologies and to bring out an understanding of the teacher's use of [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 583

Information Support Importance in the National Strategy

On the other hand, Information assurance deals with the creation of the policies, the procedures and the systems that assure people that the information they are using is valid, reliable, available, accessible, confidential and trustworthy.
  • Subjects: Computer Security
  • Pages: 15
  • Words: 4111

PowerPoint Computer Program: Principles and Processes

If their needs are considered when the use of PowerPoint to communicate is addressed is a subject to be debated. However, it is quite difficult to fulfill the needs of the blind when PowerPoint is [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 593

Robotic Satellites: Implementation Plan and Budget

One of the most effective methods of reaching the maximum level of security, not to feel restricted, and reduce spending is the usage of electronic or robotic companions.
  • Subjects: Project Management
  • Pages: 9
  • Words: 2478

Right to Be Forgotten and Impact on Cyber-Trust

Because of the need to incorporate the experience acquired in the past into the current framework of business decisions, passed the Right to Be Forgotten in 2006.
  • Subjects: Internet
  • Pages: 4
  • Words: 1092

The Internet as a Information Systems Innovation

The first step is the recognition of hazards where the focus is on anything that can cause harm concerning the subject of the risk, for instance, a computer network. The second step is the classification [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1211

Defining Work and the Work Breakdown Structure

To be more exact, the very concept of WBS presupposes that the key deliverable of the project should be decomposed to sub deliverables and then to a specific activity.
  • Subjects: Project Management
  • Pages: 2
  • Words: 307

Power Amplifiers: Aims, Classes and Theory

The main aim of power amplifiers is to transform a signal of a weak strength to a signal of strong strength and direct it into a load at significantly higher power.
  • Subjects: Engineering
  • Pages: 2
  • Words: 685

Cyber Counselling: Experiential Activity

I have to admit, though, that I have been reading the answers repeatedly, and I was not treating them the way a customer would: I was analyzing the techniques my partner had used.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1443

Driveway Resurfacing Risk Management Spreadsheet

These are risk description, likelihood, impact, detectability, category of the risk, indicators of the risk, possible responses and assumptions, and, finally, the status of the risk and the identification of who is responsible for a [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 616

The Importance of Media in the Classroom

The theory is developed from the perspective of a teacher and aims at the analysis of the classroom media employment as well as the accommodation of the reviewed sources to the school conditions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 405

The Model of Bringing Personal Device

Despite the fact, that it can increase the satisfaction from the workplace, the BYOD model contributes to the issues with the support of the personal devices.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1117

“Teaching Machines” by B. F. Skinner

The main purpose of the article is to show readers the process of development of teaching machines and the main principles of their work.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 859

New York Philharmonic Digital Archive

1 Besides, the archive is in possession of some of the items that were preserved and kept in the music library of the Philharmonic.
  • Subjects: Project Management
  • Pages: 3
  • Words: 816

The Wright Brothers’ First Flight

The given paper revolves around one of the greatest events in the history of humanity which predetermined the further development of science and society.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1131

Ethics in the Technologies and Communications

The American Psychological Association adopted the resolution after a study by the National Institute of confirmed the same results by the Surgeon General. In addition, it has led to a looming sense of isolation from [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1316

“IT Doesn’t Matter” by Nicholas Carr

And it is impossible to disagree with Nicholas Carr when he claims that IT experiences the phase of commoditization. For example, it is possible to adopt the proprietary technologies that would provoke the diversification of [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 835

Project Management Life Cycle Model

The key aim of the project resides in improving the communication of the networks in the corporate building in order to ensure that remote offices are consistently interconnected.
  • Subjects: Project Management
  • Pages: 3
  • Words: 835

Can iPhone Maintain Its Initial Momentum?

The company has produced a high-quality product, understood when the price needs to be lowered and acted so, managed to promote their product so well that people have idolized it, used attractive packaging and right [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 631

Cyber Practice and Stakeholders Value

On the other hand, such stakeholders should consider the idea of human rights and combine the idea of their personal expression freedom with the rights of other people to have personal space and opinions.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 590

The Use of Mobile Phones in Modern Society

The paper would discuss the emergence of mobile phones as the only tool for future needs. People can also open accounts through the phone and ask for loans through the same device.
  • Subjects: Phones
  • Pages: 2
  • Words: 577

Heathrow Terminal 5 Project: Cultural Awareness

The construction of Terminal 5 at Heathrow International Airport is one of the major projects that were undertaken by the UK government through the British Airport Authority [BAA] to decongest the Heathrow Airport. The BAA [...]
  • Subjects: Project Management
  • Pages: 7
  • Words: 1250

Computer and Digital Forensics and Cybercrimes

This has greatly affected the success of computer forensics and it is the main drawback in this area. The world is now safer due to the increasing usage of computer forensics in court cases.
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2717

Texting and Motor Vehicle Accidents

One of the major causes of motor vehicle accidents is the prevalent habit of texting while driving. A zero-tolerance policy to distracted driving helps to keep the attention of the drivers on the road.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1750

Mobile Devices for Learning Improvement

The question that has to be answered in this kind of research is: Can mobile devices improve the way of how students accept and understand the material or is it only an easy way to [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 600

Single and Double Loop Learning in Project Management

By incorporating a detailed and in-depth analysis of the project implications and the effects of decision-making in the project closure process, one will be able to introduce the staff members to DLL, therefore, contributing to [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 617

The Old Navy Mobile Marketing Campaign

Mobile marketing as a promotional technique must have targeted young males due to the feature of the privatized dialogue that most youths seem to embrace.
  • Subjects: Phones
  • Pages: 5
  • Words: 1471

T-Shirts Project’s Quality Management Initiatives

The project environment and the chances to improve the quality of the project have to be identified and analyzed properly because this plan is one of the last chances to achieve success and create a [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2840

Mensa Aviation and Abu Atal Project Management

According to Portny, project execution refers to the process of implementing the strategies in order to achieve the intended project aim. In this project, the focus is to ensure that the construction of the hotel [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 3160

Cost Control and Budgeting in Project Environment

Fundamentally, the period that the project takes to materialize and progress towards its goals and the time when it achieves the desired goals forms the basis of its operating cycle.
  • Subjects: Project Management
  • Pages: 5
  • Words: 1408

Program Portfolio Management’s Early Stages

The paper would address the issue concerning the impact of the early and the front-end of Project Portfolio Management. The success of Project Portfolio Management relies on the initial planning and the commitment to the [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 501