Home > Free Essays > Tech & Engineering > Page 39

Tech & Engineering Essay Examples and Topics

4,689 samples

Design a helper

Therefore, personal robots in addition to making life easier should be able to perceive and understand the surroundings. However, robots are a source of worry in the future as they can be risky to humans.
  • Subjects: Robotics
  • Pages: 4
  • Words: 1091

The Open Systems Interconnection Referencing Model

Layer 7: The Application Layer This layer is the interface between the user and the network. The layer "transforms the data from the session layer to provide a standard interface for the application layer and [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1508

Global Information Systems (GIS)

Information on the country in which the organization operates is relevant to the organization because it provides the relevant information regarding the existing business opportunities in the country and the possibility of their exploitation.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2773

Application of RFID Technology

The silicon chip in the transporter tag contains object such as the exact place of location, the date of manufacture, the color of the product, the price, or any other relevant information.
  • Subjects: Applications
  • Pages: 5
  • Words: 1595

Nanotechnology in Human and Animal Health

Nano-medical tools and instruments facilitate study and observation of the functioning and metabolism of minute living cells such as proteins and hormones. Such knowledge can contribute to the development of new medical approaches in the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 564

Data Integration and Data Quality

Data quality is one of the protective measures that is highly valued by most companies because the records that are stored in databases can be used to trace events and for the referencing to be [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1565

Technology: Being Digital

This has been achieved by the fact that the world is a global village thus transmitting information does not have to rely on time and money. A click of the mouse is enough to have [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 716

Technologically Advanced Baseball Bats Research

The purpose of this research study is to investigate the advantages of using technologically advanced, or high priced, baseball bats in the Little League Baseball.
  • Subjects: Engineering
  • Pages: 2
  • Words: 575

The Rationale of the Cryonics

The Egyptians hence tried to make sure that they preserved a person very close to immortality and this is the reason why they when to greater extent of building the pyramids and doing the mummification.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 2017

Data collection methods

5
They are collected together and the team leader who is usually the researcher asks relevant questions that lead to data collection in his area of interest.
  • Subjects: Data
  • Pages: 2
  • Words: 587

Hardcopies Versus Softcopies

Today it is possible to have the electronic versions of the physical reading materials such as the encyclopaedias, dictionaries or bibles, which are easy to access at any time or location as opposed to carrying [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1119

Rescue Operation for Trapped Chilean Miners

1
This helped the rescuers in knowing the conditions inside the mine, more importantly; the holes were used to send food, water and medication to the miners.
  • Subjects: Engineering
  • Pages: 4
  • Words: 543

Effects of Word Processors on Writing Ability

Using word processors, I can retrieve pieces of writing written in the past and try to improve on them. Sometimes I am not able to spot my mistakes in writing when using word processors.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 568

The Cloning Controversy

2
Considering the fact that most of the controversy about cloning arises from misinformation or ignorance about the matter, this study shall set out to conclusively research on cloning and its merits so as to attest [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1207

Online Persona: Ethical Implications

For the purposes of this essay, let us accept that a fabricated online persona remains ethically unsound, as we consider the social harm this causes, namely, the perpetuation of crippling social stigmas, and the erosion [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 821

AECbytes “Building the Future”

The author commends the continued innovation and the production of new things and new ways of handling the tasks of building design, construction, and collaboration, despite the challenging economics times.
  • Subjects: Engineering
  • Pages: 2
  • Words: 702

Biometric Technologies and Security

To achieve this, the assumptions that biometrics facilitate the invasion of privacy, may have dangerous health effects on the users, are discriminatory and are unnecessary expenses need to be laid to rest if the full [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2830

Dangers of Texting while Driving

5
The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1267

Impact of Modern Technology on Human Communication

However, this paper has also illustrated that there may be hindrances to communication which can arise from the abuse of modern technology in communication efforts by individual.
  • Subjects: Internet
  • Pages: 3
  • Words: 808

Best Methods for Oil Clean Ups

The reports cover issues ranging from causes of oil spills to the effects of oil spills on the environment. Thus the main sources which lead to the release of oil into the ocean are related [...]
  • Subjects: Engineering
  • Pages: 11
  • Words: 3033

Hunter Institute of TAFE

Project description: the main purpose of this project is to open a new computer lab at Hunter Institute of TAFE. The necessity of this project can be explained by the fact that many computers in [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1366

Uninterruptable Power Supply (UPS) Systems

The equipment running under the UPS gets supply of power for several minutes before switching the power to an alternative or emergency power options such as batteries in case of electric failures.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1928

The iPhone’s Main Features and Productivity

The sophistication of the iPhone is reiterated by Jacko who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 728

Is Technology Neutral?

3.5
Rather than attribute the loss of jobs to adoption of technology, it is more appropriate to blame the loss of jobs on the decision to adopt technology.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 975

The Efficiency Resulting From Utilizing Information Systems

When reporting and querying technology is incorporated in most databases, it allows employees to easily generate reports and interpret the same for execution of plans in the organization. To embrace information technology fully and benefit [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1377

History of the Internet

In the late 1960s, some proponents of the internet conducted research to find out the likelihood of interconnection between systems using the ARPANET.
  • Subjects: Internet
  • Pages: 3
  • Words: 961

Computer Communication Network in Medical Schools

Most medical schools have made it compulsory for any reporting student to have a computer and this point the place of computer communication network in medical schools now and in the future.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1743

What Are the Causes of the Increased Lack of Internet Privacy?

Although every individual has the right to accuse the government and internet service providing companies over their failure to protect their customers' privacy, individuals should recognize, they have a crucial duty to play as far [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 712

Impact of Computer Based Communication

5
It started by explaining the impact of the internet in general then the paper will concentrate on the use of Instant Messaging and blogs.
  • Subjects: Internet
  • Pages: 4
  • Words: 1659

Relational Database Systems

This is a business report, personally addressed to the manager of the Easy Drive School of Motoring explaining why and how a relational database system will address the problems of the organization.
  • Subjects: Data
  • Pages: 6
  • Words: 1702

Hyper Text Markup Language (HTML)

1
The inability of an individual to compute a sum in HTML disqualifies it as a programming language. The presence of formatting commands in HTML does not also qualify it as a programming language.
  • Subjects: Programming
  • Pages: 2
  • Words: 557

How Technology Affects Our Lives – Essay

5
Another example of the use of technology in improving productivity and output is the use of database systems to store data and information.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2756

Impact of the Internet on Information Systems Ethics

Privacy of information involves ability to confine the confidential personal information in a specified domain area. The architecture of the internet is meant to enhance sharing of information and not to conceal or defend its [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 851

Business Pressures in Aviation Industry

The situation has brought major impacts in the lives of the passengers and even in the business of the transport service providers.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1723

Physical Fitness in Aviation

Aviation is an aspect that highly depends on the judgment of the people on the crew and the pilot for any outcome therefore, necessitating the importance of one to be careful with the health state [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2304

Fitness and Performance in Aviation

The physical fitness and vigorous health of aviation workers are critical aspects in their performance, in aviation, because of the nature of some of their jobs that may be physically demanding.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2183

What is a Weblog?

It also crucially important to underline the purposes of this essay: to present all the necessary information about blog's essence, to underline what makes weblogs popular, to clear up who read weblogs and why, to [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 636

Challenges of Computer Technology

Computer Technologies and Geology In fact, computer technologies are closely connected to any sphere of life, and it is not surprisingly that geology has a kind of dependence from the development of computers and innovative [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1673

The Policies and Documentation: IPv4 vs. IPv6

Ipv4 addresses are supposed to be run out in the next two years that is why it's alternative which is Ipv6 is needed for the proper arrangement of the messages.
  • Subjects: Internet
  • Pages: 7
  • Words: 1880

Sample of Chart or Graph

While the stacked bar chart is very helpful in understanding the overall votes by respondents as well how many considered each focus area as critical or high, it does not give an idea of the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 559

IT & Networks for Business

The main characteristics of the net generation are, they communicate using voice or data while on the move, they are internet savvy and are always connected either through WAP on the cell phones or Wi-Fi [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 272

The Role of Intranet in Health and Human Services Organization

Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. Individuals ought to be empowered to control the collection, use, and distribution [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 982

Data Warehoisung: Composite Bicycle Frame

The production of the composite bicycle frame that combines a metal spine in the midst of a fibre reinforced plastics have been in the market for quite a while but the materials keep changing to [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 675

Computer Fraud and Contracting

The law does not provide the consumers with measures to enforcing the online contracts because the argument is that, it is impossible to tell the intention and the consent of the consumer when they signed [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1836

Security Requirements Engineering

There are a number of approaches to the study of security requirements engineering, for instance, the elicitation method is likely to provide a framework for ordinary functional requirements which are more often than not oriented [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1181

Electronic Range Finder Technology Application

In the early 1960s, the devices were actively fitted in the most expensive cameras. Although more sophisticated auto-focus devices later outnumbered the range finders, some of these cameras are still in use today.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 546

Rogue Security Software: Digital Crime Scenario

This rogue security software can appear on a website in the form of an advertisement which in most of the time informs that internet user of their win for being a visitor to the website [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

Internet Positive and Negative Impacts on Education

The computer and the internet were the most significant inventions of the 21st century and these two inventions have changed the way human beings operate. Tsai asserts that the internet has increased the ability of [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 883

Industrial Engineering

4
This is to facilitate development of appropriate construction designs, allocation of resources, and crafting of superior strategic plan to enhance effectiveness.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1094

The differences between e-readers and tablets

The spread of the innovative technologies pushes some people on the idea that books are going to disappear. First, the ancient books as the reminder of human history are going to remain.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 583

Organizational Vulnerability

The man-in-the-middle attack is also known as integrity attack since the actions of the system operators are based on the integrity of the data.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1324

Recommendation for a web server software package

When the software offers a wide range of product designs for the clients, they may feel that they are delayed from accessing the services. This is not convenient to clients who are particular in the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 543

Phishing threats and counter measures

In this case, the attacker sends emails to the bank customers promoting them to change their account information such as the password and username.
  • Subjects: Internet
  • Pages: 2
  • Words: 574

Société Générale Bank: Effective Security Controls

The management of the bank revealed that Kerviel exploited every loophole to hack the computer operations at the bank. It is also important to list the potential risks because it enables the security personnel to [...]
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1619

Evolution of Power Production

The goal of this paper is to review the evolution of power production as the basis for considering the future options of power for the planet.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2534

Information System and Modern Business

For instance, the Enterprise Resource Planning System is currently used to address business challenges such as linking strategic objectives of the organization and performance.
  • Subjects: Data
  • Pages: 3
  • Words: 821

Sephora: The Offers of Sephora.ca

The main particular feature of the campaigns is the fact that the offers are almost not available in stores, and the products are presented in the limited series.
  • Subjects: Internet
  • Pages: 5
  • Words: 1396

Pros and Cons of Information Technology

Some of the disadvantages of the improved technology include new forms of pollution that are as a result of the gadgets used to access the resource.
  • Subjects: Internet
  • Pages: 2
  • Words: 609

Digitally Based Information Age

The new environment has influenced people's health and the way people treat information. In the first place, it is necessary to consider people's health or rather the way the digital world affects humans.
  • Subjects: Internet
  • Pages: 2
  • Words: 562

Hydraulic Engineering

One of the disadvantages with using canals for transportation was that the boats were easily damaged while on the double slipways.
  • Subjects: Engineering
  • Pages: 2
  • Words: 550

Machinery and Modern Industry

The main thrust of the essay though was not to point out how effective machines are in increasing the means of production, rather, it was the intention of Marx to reveal how the use of [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1737

Inventions that the world would do without

5
For instance, the invention of communication technology has been of great help to the entire world because of the convenience and reliability it has come with.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 568

On Becoming a Cell Phone Junkie

Although I must admit that cell phones have earned their merits as essential tools of existence in the new millennium, I do not subscribe to the idea that my life should depend on it.
  • Subjects: Phones
  • Pages: 2
  • Words: 604

Applying Cloud Computing in the Corporate Area

In the software-as-a-service, the retailerprovides the software product,the hardware infrastructure and networks with the user via a front-end portal. In conclusion, software as a service cloud computing is not going to dominate the next several [...]
  • Subjects: Cloud Computing
  • Pages: 5
  • Words: 1276

Use Software as a service

The software industry is a dynamic industry which has undergone several changes and one of the current trends in the industry is cloud computing.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 566

Enterprise Architecture Center

According to Hayles,the main objective of EA is to enhance the performance of an organization by reducing the instances of faults in the tasks that are performed by their employees.
  • Subjects: Data
  • Pages: 5
  • Words: 1353

Open Source Systems: the Risks and Ethical Issues

In this paper, the risks and ethical issues associated with open-source systems are outlined and additionally, a one-page audit plan for an open-source system for Global Airline Co.prepared in order to boost the company's confidence [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1261

Are Hybrid Cars Worth It?

First and foremost what must be understood is that hybrid vehicles on average cost more than their primarily gasoline based counterparts, while it may be true that the hybrid car industry focuses on the fact [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2008

Technology and Its Impact in the World

Technology has a profound root in the society; this is because today's world relies on the advances in technology. Technology has brought the discovery of electricity that is important in lighting up the world.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 624

Nanotechnology and its Perspectives in Connecticut

According to a report by Office for Workforce Competitiveness of Connecticut, efforts to advance nanotechnology in Connecticut began in 2003 with a detailed assessment of the benefits of nanosciences to the state and the state's [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 629

Ethical and Illegal Computer Hacking

For the ethical hackers, they pursue hacking in order to identify the unexploited areas or determine weaknesses in systems in order to fix them.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 557

Technology Help – American Become More Knowledgeable

Despite the fact that technology came to the rescue of several areas in the society, youths, especially those in the universities and high schools, rely heavily on the technology.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1173

Air Force Maintenance and Production Planning

The paper also explores the concept of production planning in the air force in regard to the setting up of air force production centers and the personnel mandated with the strategic management and the overall [...]
  • Subjects: Aviation
  • Pages: 5
  • Words: 1493

The Role of Design in the Website Performance

The main purpose of the work is to assess the key design features to attract the targeted audiences and improve the performance of the website for an organization established in an area viewed as being [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 762

Information Networking as Technology

Mozilla Firefox, Opera mini, and Seamonkey are the three web browsers covered in this project paper. Opera mini browser is by far better than Mozilla Firefox is; Opera mini is very efficient in terms of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 591

Business Intelligence Approaches

Business intelligence is a term used to refer to a collection of applications that aim at keeping and making available a data bank in a certain industry or organization; the bank is referred to when [...]
  • Subjects: Data
  • Pages: 2
  • Words: 629

Computer Crimes Defense and Prevention

Naval Academy and he said that the security of the United States is threatened by a new breed of adversaries that has found a way to harass and terrorize America.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 541

Memorial Health System CPOE Implementation

The management of the organization plays a vital role in project planning and implementation and in effecting the organizational change to enhance the use of the new technologies.
  • Subjects: Project Management
  • Pages: 2
  • Words: 892

The Best Social Networking Tool for Me

Rating of each alternative It is better to explore each tool, analyze the benefits of each tool before making a decision. Nevertheless, a good decision process will always lead to the best social networking tool.
  • Subjects: Internet
  • Pages: 3
  • Words: 757

Discourse of the Information Society

World Wide Web as a cybernetic phenomenon The World Wide Web, the graphical-interface Web browser, and the search engine tools have really shaped the face and the capabilities of the internet we enjoy to-date.
  • Subjects: Internet
  • Pages: 6
  • Words: 1595

Digital Technology – the Use of the Internet

Looking back, in retrospect, the computer that I first encountered was incomparable to the computers of today. The ultimate advancement in computer technology, for me, was the mainstream use of the internet.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

How computers influence our life

4.3
In the entertainment industry, many of the movies and even songs will not be in use without computers because most of the graphics used and the animations we see are only possible with the help [...]
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2554

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Subjects: Internet
  • Pages: 3
  • Words: 832

History of the Networking Technology

The development of computer networks is the answer to the urgent need of the modern day workplace to have the ability to receive and send information quickly and efficiently.
  • Subjects: Internet
  • Pages: 10
  • Words: 2699

Solutions to Computer Viruses

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 562

Database Application at Amazon

5
A row contains data of one or more columns according to the design of a database; it describes a single instance of an entity.
  • Subjects: Data
  • Pages: 4
  • Words: 419