Tech & Engineering Essay Examples and Topics. Page 41

5,359 samples

The Charleston Sofa Super Store Fire

The crew around the back side of the building noticed that the fire was in the loading dock area and was threatening the showroom".
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 846

Skills and Qualities of Project Managers

These are key skills that can be measured through the ability of a manager to create and sustain an excellent working relationship that results in improved business productivity.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1404

Content Analysis Method

The unit of analysis is the smallest meaningful unit analyzed by the researcher. This type of analysis can be implemented with the help of software.
  • Subjects: Applications
  • Pages: 2
  • Words: 565

Future for mobile handsets in UK

The purpose of the project is to identify the following Mobile Phone Gadgets and their use in the United Kingdom Technological advancement of the mobile phone Gadgets in the U.
  • Subjects: Phones
  • Pages: 10
  • Words: 2830

Instruments to Collect Data

The representation of data should be done in a way such that the purpose of the research will be evident from the data displayed on the graphs and charts.
  • Subjects: Data
  • Pages: 2
  • Words: 585

Cyber Security Threat Posed by a Terrorist Group

These among other features of the internet have been identified to form the basis of the cyber terrorism attacks. A comprehensive international collaboration among investigators and prosecution teams in cases of cyber attacks have also [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1940

Phone Manufacturing Industry

In the next five years, the industry is expected to be affected by macro-economic factors as follows: With increase in population, the industry is likely to have an increased number of people with varying needs [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 631

Establishing a Project Management Office (PMO)

Establishment Role, Scope and Office The initial set up of the PMO will involve the establishment of the organizational role and scope of the office.
  • Subjects: Project Management
  • Pages: 8
  • Words: 2238

Effective Project Management Practices

A project scope encompasses the entire task involved in the creation of the products of the project and the processes that creates them and also the processes that are involved in the definition and controlling [...]
  • Subjects: Project Management
  • Pages: 8
  • Words: 2303

Theft of Information and Unauthorized Computer Access

Such people might attempt to steal information with a motive of using it to exploit the company by selling confidential information to the competitors or to leverage on the same to get a new job.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 779

Project Management: Order Processing System

The sales department basing on the directive by Benhams chief executive produced a project brief on behalf of the Board of Directors which was subsequently passed to the project team to evaluate the viability of [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 2055

Who Should Be Allowed to Filter the Internet?

In this study, I shall discuss several issues pertaining filtering and censoring among them being: countries rights or needs to filter the internet, internet, how the Great Firewall of China reflects a particular form of [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1708

Concept of Project Plan in Project Management

One of the biggest challenges of the project that has been identified is the difficulty of achieving all the goals that the project intends to achieve without deviating from the constraints of the project that [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 983

Project Management in Business

In a business industry whatever project undertaken pursues a similar kind of model that involves Defining the project- this is where the project director describes the kind of a scheme it is as well as [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1273

ArchiMate Architecture, ArchiMate Series, and Related

The research carried out by Iacob and Jonkers sought to define the process of model integration for ArchiMate, and found that the language uses integration of detailed designs to visualize, and analyze enterprise architectures.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 2055

Tablet PC Product Analysis

Rutenbeck opines that "Tablet PC is cost effective, a mini- laptop device, and is designed with pen drive that makes it more useful especially to university students".
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1662

The Computer-Mediated Learning Module

A runtime data model will be used to encode the information received into a standard format of programming, and a standard metadata will also be used to identify a particular activity in the performance criterion [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1656

Network management: principles and practice

The success of the network or interface that will be put in place will greatly depend on the bandwidth that will define the data rate of the network connection.
  • Subjects: Internet
  • Pages: 2
  • Words: 678

Miniaturization Process Associated Risks

Miniaturisation is the process of continued minimisation of the sizes of devices and products. Privacy The reduction of the size of technological devices has made stalking and invasion of privacy an easy process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1539

Computer Security and Its Main Goals

Confidentiality is an aspect of security that ensures that access to data and other computer assets is limited to the authorized parties.
  • 5
  • Subjects: Computer Security
  • Pages: 2
  • Words: 668

Effects of the Internet

The dawn of the internet phenomenon has completely changed the way people conduct their daily activities. The above statements exemplify and amplify the benefits of the internet revolution.
  • Subjects: Phones
  • Pages: 3
  • Words: 746

Welcome Robotic for Abu Dhabi Women College

In the year 2009, the college opened a second banch in the city of khalifa to cater for the students who encounter problems relocating to the capital city.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2686

Management Technology Operation Based

The mission of the company is to use progressive technologies in the field of electronics to create a new product in the electronic engineering industry.
  • Subjects: Engineering
  • Pages: 2
  • Words: 461

Engineering Professionalism and Ethics

On the other hand, the professors apply the several elements and aspire to develop the lives of different individuals. It determines the way a professional handles the issues that are to be engaged with learners [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1140

Google Cloud Products in Khan Academy

The study will mainly focus on a number of challenges experienced by the institution at the initial stage, the ways the Google Cloud Platform or a specific Google App Engine was presented as a solution, [...]
  • Subjects: Programming
  • Pages: 8
  • Words: 2179

Lean Burn Engine Technology

First, the excess air used in lean burn technology reduces the temperature of the combustion process and this lowers the amount of oxides of nitrogen produced by nearly half, compared to a conventional gasoline engine.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2773

Cyber Theft and Its Consequences

This research paper will address the usage of internet and how internet theft has continued to thrive as the technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3150

Cloud Computing in Network Security

In contrast, in cloud computing, the cloud provider encrypts customer's data before it is stored in the cloud. Identity and Access Management is another protocol that can be used to manage users accessing data in [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1393

A Fire That Changed NFPA Codes

This paper will discuss the impact of this event on the code of the National Fire Protection Association. The Southwest Boulevard Fire showed that the storage of inflammable liquids posed a significant threat to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 842

Bioinformatics and Biotechnology

The purpose of this study is to provide an overview of bioinformatics and to illustrate how bioinformatics can be utilised in the design of drugs and the enhancement of agricultural products.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2598

PMA Results on Flight Express Aircrafts

The first one is Check A and it must be carried out before the first flight of the day. In addition, the functionality of the fuel pump has to be inspected during this check.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1088

The Educational Promise of Social Media

The use of social media can only be useful if the students or children are closely watched and guided on how to make use of it for positive development.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 588

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

The influx of wireless technologies in organizations

This implies that wireless and mobile technologies plays a significant role in the expansion of the communication lines within the organization, which in turn increases the capability and the capacity of the organization to respond [...]
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2484

How the technology impact education

It is noted that technology plays a significant role in spheres of life and the field of education is not an exception. Experts in the field of education have acknowledged that technology is another gift [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 593

Wireless charging

The application and constant development of mobile phone technology in the modern era is experiencing a boom, as innovators in the technology sector look forward to a future of introducing wireless charging technology for the [...]
  • 1
  • Subjects: Engineering
  • Pages: 4
  • Words: 1194

ABC Company project

Currently, the business information systems used in the operations have indicated their inability to handle the magnitude and the complexity of the business functionality needed by the company.
  • Subjects: Project Management
  • Pages: 3
  • Words: 968

Strategy And Controls In Information Security

An attack could comprise any of the following categories or a combination of any of them: Fabrications, which means adoption of some deceptions to play a trick on the unaware users of a system; Interruptions, [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1319

The rooftop garden project

These elements will help in environmental sustainability as they will play a major role in informing, reminding as well as persuading the target audience, which in this case, are students, on the importance of coming [...]
  • Subjects: Project Management
  • Pages: 9
  • Words: 2766

Data Mining: Concepts and Methods

Speed of data mining process is important as it has a role to play in the relevance of the data mined. The accuracy of data is also another factor that can be used to measure [...]
  • Subjects: Data
  • Pages: 3
  • Words: 891

Learning Process and Incorporating Technology

Kant was among the initial philosophers to recognize the processes of the mind and that the mind was integral of the thinking process and has the capacity to add value to the development of thoughts.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 907

Mobile Technology Advancements

This wide range of customer requirements underpins the fact that mobile system based users require a high level of availability to access IT and IS systems.
  • Subjects: Phones
  • Pages: 7
  • Words: 1977

Effective Multicultural Project Management

I wish to study and examine in this research how communication and the multicultural differences are likely to affect the success of project implementation.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2865

Will Schools Survive the Internet?

The main aim of this paper is to analyze both sides of the argument and establish the validity of the statement, 'With the rise in modern technology, there will be no need for teachers as [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2264

Audiovisual Technology Application

Under the display individual static images function-type, traditional technologies used to support teaching and learning process comprise of overhead and slide projectors, bulletin board and posters; while the digital-and-other-emerging versions of the same comprise of [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 933

Internal and External Issues in the Airline Industry

The skills and training that the airline staff get is necessary to ensure security and effectiveness of the flight and thus make the operation and management of the airline easier. The preferences and the needs [...]
  • Subjects: Aviation
  • Pages: 11
  • Words: 3036

Cryptography and Privacy Protection

The main ethical issue is the dilemma between the privacy of a group and individuals and their safety and security, for example, on what side the government would want to maintain the privacy of its [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2286

Wireless Sensor Networks

The set up of this topology is very organised in such a way that, every single node in the system has a unique number of nodes, which are interlinked to it, at the lower point [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1618

Goyder on Technology in Society

This phrase indicates how Goyder perceived technology in the context of its importance, relevancy, and connection to humanity in the current world.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 577

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2970

Conceptual Exegesis of Web Production: A Cocktail Website

In the exegesis, certain attention will be paid to the form, content and materials used in OMP, the evaluation of functions and purposes of the work, understanding of the context from the legal, social, and [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2273

Qualitative Data Analysis Exercise

These include the causes of high mobile phone bills, different customer and sales policies, morality in handling customers, call rates and the age group that uses mobile phones mostly from the opinions expressed by the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 889

Impact of Technology on Teaching

The demographics of the Department of Defense Education Activity schools highlight the nature of students and the expected challenges in both teaching and learning.
  • 5
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2760

Systems and Network Security

In addition to monitoring the users of a system the Windows Server 2003 platform allows the administrator of the system to audit activity on the system by observing the system logs.
  • Subjects: Computer Science
  • Pages: 15
  • Words: 3812

Security on Windows Server 2008

During execution, the process is given an access token that identifies it to the rest of the system and quite often this token will be the same as the user account that started the process.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2319

Project Life Cycle of V-22 Osprey

One of the reasons was to improve the design of the aircraft and to manage the communication lines. The fact that the funding by the Research and Development was very low to meet the requirements, [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2876

Stratus and MS .NET

Regardless of the purpose of the server, it is important that the level of availability matches the applications and functions assigned to that server.
  • Subjects: Programming
  • Pages: 9
  • Words: 2772

Business Information System Management

The company has a very large network and through use of cloud technology, the company has been able to make its operations easer, though it still needs to realize strategies of full utilizing the technology.
  • Subjects: Data
  • Pages: 2
  • Words: 1197

Security Vulnerabilities in Software

This is a problem that has resulted from failure of the system, in the engineering processes which allocate the requirements of the system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 720

“Stalking the Wily Hacker” by Clifford Stoll

According to the provided article, effective communication requires adoption of superior strategies and security elements that hold the potential of enhancing safety of the information relayed.
  • Subjects: Internet
  • Pages: 7
  • Words: 1976

Data Communication and Networking

So as to expound on this topic, this paper shall discuss: the term Internet; the three networks that were involved in the first test of TCP/IP protocol and conduction of the test; the standard used [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2821

Project Plan: Emirates Airline and Fly Dubai

The identification of the different activities involved in the project and the precedence relation is essential in ensuring that the project runs smoothly.
  • Subjects: Project Management
  • Pages: 9
  • Words: 2955

Internet Key Exchange Protocol

On the other hand, a symmetric data encryption, also referred to as conventional data encryption, uses a common key to encrypt and decrypt data.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 828

Home Office: Network Attack Protection

In conclusion I believe that this kind of firewall is the best for small office as it is easy to install, affordable and it has all the security fractures ranging from IP management, to prevention [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 631

Quebec Bridge Construction

Prior the construction of the bridge, the only way to cross the river was by the use of a ferry. While there were no major flaws in the initial design of the bridge, changes to [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 909

Cloud computing in supply chain management

Cloud computing is one of the advancements, which have significantly transformed the manner in which several companies manage and access information within and outside the firm.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 564

Human Resource Database Application

In essence, the DDBMS will serve the interests of the organisation in addition to other physical aspects of the HRIS. For this reason, the design of the HR database should provide appropriate tools and techniques [...]
  • Subjects: Data
  • Pages: 6
  • Words: 1657

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

Blu-Ray Triumph Over HD-DVD

HD-DVD war, Sony had an upper hand in their Blu-Ray discs that store 25GB on a single layer compared to HD-DVD having a capacity of 15GB on a single layer.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 702

The tale of two optical discs

The first flaw associated with the HD-DVD was disc capacity, whereas the HD-DVD disc had a maximum capacity of 15GB per side, the Blu-Ray disc has a maximum capacity of 25GB per side, hence, the [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 832

Textile Product Development and Engineering

One of the major uses of cotton material is the production of clothing materials and one of the significant features of a good clothing material is lightness that in most cases is determined by the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2586

Concept and Problem of Cyber Domain in US

For instance, U.S.power grid is one of the most vulnerable spheres for cyber attacks since it belongs to a private sector and it is not governed by the government. Unfortunately, major part of cyberspace belongs [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 579

Influencing and Controlling the Project

Proper communication will enhance the success of the project as well as good motivation of the people involved in the project.
  • Subjects: Project Management
  • Pages: 2
  • Words: 548

Aircraft Maintenance Process

Effective aircraft evaluation results in the determination of its existing state and the probability of the failure of its body and engine parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 588

Impact Digitization and Convergence on Internet

The establishment of the web in the year 1989 was a triggered by the massive development of social sciences, as a result of increased urge to share accumulated knowledge among scholars and researchers.
  • Subjects: Internet
  • Pages: 5
  • Words: 1467

The Internet Radio: A Critical Discussion

Through a critical examination of the concept of Internet Radio, the current paper will seek to extrapolate how users of the medium can create and place content over the internet and how users can use [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 982

Computer Forensics Related Ethics

Due to advancement in technology, individual information can be kept in databases, the risk of accessing this data is evident and this necessity the need of such a law so as to ensure security.
  • Subjects: Other Technology
  • Pages: 13
  • Words: 3655

In-room Technologies Used in the Hotel Rooms

It also looks into how the technological advances all over the globe affect the hotel industry and how the industry is prepared to adopt the in-room technologies which are used inside the hotel rooms specifically [...]
  • Subjects: Applications
  • Pages: 15
  • Words: 4111

Contemporary issues in Multimedia and IT

CSEA reduced the thoroughness of privacy and made it easier for the ISP to hand over information to the government whenever the relevant authority suspects unlawful dealing in the local networks.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1602

Ethics in the IT Practice

These are among the issues which have necessitated the governments across the globe to collaborate and develop comprehensive and detailed laws regarding the use of information technology.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1416

Information security in Small Scale Enterprises

With the physical security set-up, the management should now focus on technological aspects of the security plan, this are the process and procedures security maintenance to ensure that the information of a company is secure [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2227

Impacts of Databases and ERPs on the Industry/Military

The ERPs as they are called have both negative and positive impacts on the military and the industry in general and this paper is meant to review some of those effects. This implies that budgetary [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 1592

Emerging Technologies: Augmented Reality and iPhone Technology

Although this technological innovation has not been used in any learning environment, because it is partly real and virtual; hence, its ability to show required information at the required time and place using a special [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 718

Negative Influence of Cell Towers

However, the vast majority of researchers claim that it is necessary to continue research in this field and at the same time it is important to limit people's exposure to cell towers.
  • Subjects: Phones
  • Pages: 2
  • Words: 581

Electronic Health Records Project management

The group will consider the product portfolio of the company in order to compare it with the project needs. It will achieve this through a well-planned project and careful selection of the respective IT vendors.
  • Subjects: Project Management
  • Pages: 5
  • Words: 1423

Data Warehousing and Its Benefits for Organizations

The report defines what data warehousing is and explains in details the importance of data warehousing in an organization. The implementation of the SAP in Lenovo has brought more benefits to the Company.
  • Subjects: Data
  • Pages: 5
  • Words: 1372

Technology Plan for a Private Security Firm

Networking system The LAN mainly serves the employees of the company and it is accessible through a regulated password authentication system.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 1007

Nanotechnology Risk Assessment and Management

Nanoparticles in the nuclear waste are easily absorbed by the human body leading to adverse effects of the respiratory system. These impurities are risky to the human health and the environment.
  • Subjects: Project Management
  • Pages: 7
  • Words: 1914

Ethical Industrial Engineering Ethics

Failure to embrace this by past engineers led to the establishment of code of ethics that guide all engineers in their day to day execution of services.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1872

Current and Past Technology

Technology and marketing are inseparable in that marketing have to keep pace with the developing technology to ensure they use the most modern technology of the time.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 788

Technological impact of the Samsung NC215S Netbook

While many netbooks and laptops have been launched with great technological features, the thing that sets this Netbook apart from others is that its lid carries a solar panel on the top that allows the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 601
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.