Tech & Engineering Essay Examples and Topics. Page 41

5,371 samples

Occupational Injuries in the Construction Industry

Generally, the construction industry in the United States is among the largest industries, the largest employer, and the most hazardous industries, which contribute to approximately 20% of the annual occupational fatalities reported across the United [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 849

Security in the Information Communication Technology

These include adapting the users to the system and getting the involvement of users through soliciting their input on ways of advancing the system. The corporate governance of the information security ought to begin from [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3185

Ethical Issues Surrounding Social Networking Sites

Social media can also be used to track the activities of users. It is important that measures be taken to control some of the ethical issues associated with social media, especially issues of privacy.
  • Subjects: Internet
  • Pages: 3
  • Words: 922

The Key Features and Objectives of an Incident Command System

In response to the disaster that occurred, the framework involved executing the activities that fell under the responsibilities of the incident commander, one of them being to establish the incident response program.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 828

Webinars in Education

When it is night-time, some participants may be very exhausted and will not have the enthusiasm required to actively participate in the seminar sessions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 265

Quality and Rapid Application Development

One of the main concerns that arose from the use of RAD was that the quality of the software produced did not always meet the quality standards for software projects.
  • Subjects: Programming
  • Pages: 14
  • Words: 3741

Cloud Computing Security Issues in Enterprise Organizations

This paper will set out to show that while there are significant security threats that an enterprise faces when it migrates to the cloud, there are solutions that can be implemented to mitigate these threats [...]
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2908

Using Workaround Processes in Organizations

The project leaders have the responsibility to establish robust mechanisms to enhance the success of a workaround. The efficiency of the workaround depends on the knowledge and experience of the information and technology experts.
  • Subjects: Project Management
  • Pages: 5
  • Words: 1407

Construction Safety in Latino Community

The study seeks to: Examine the prevailing status of construction safety and accidents among male workers in the Latino community, especially in the construction industry.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3914

Business Continuity and Crisis Management

The biggest challenge for an organisation operating in a disaster-prone business environment is the development of mechanisms of predicting risks and ways of protecting their brands from collapsing in the event of organisational crisis.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2827

Dispute Resolution Mechanisms

Therefore, the article gives the contractor the power to communicate in writing to the engineers and inform him of any proposed changes that will ensure adverse impacts of various situations are minimised or eliminated.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1219

Company Conceptual and Logical Data Views

On the one hand, the American Express keeps in pace with the time, employing the latest technologies to satisfy the clientele; on the other hand, some of the customers' complaints concerning the quality of services [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1156

Integrating Technology Into the Classroom

The types of quantitative information that would be helpful for evaluating the effectiveness of the imposed measures include the results of students' standardized tests and statistics data as to the rate of students' dropouts after [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 831

Integrated Safety Management System

However, ISO 14001 is biased towards the protection of the environment and while there are many constraints as a result of the merger of these two systems, the addition of ISO 9001 further complicates the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 939

Project Management: Maturity Models

The work of the project maturity models is to describe the scope of the projects and the activities that may be related to the project.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2784

Building Cordless Vacuum Cleaner Project

Total float This is the total delay time that a single activity in the non critical path can be delayed without affecting the duration of completion of the project.
  • Subjects: Project Management
  • Pages: 3
  • Words: 1158

Adrian Lamo’s Hacking: Is It Right?

The example of Galileo introduces a theory about the construction of the Solar System that was the target of interest of the well-known scientist.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 602

Project Design for Quality

The project committee and contractor will observe the established protocol through out the lifecycle of the construction phase of the project whenever there is contact with the RSAF.
  • Subjects: Project Management
  • Pages: 15
  • Words: 3797

The Samsung Galaxy Tab

It should be noted that the Galaxy Tab is based on the successes of the Galaxy S.whereas Apple's iPad was the first of such gadgets into the market; Samsung already had Galaxy S in the [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 868

Project Management and Strategy Alignment

The above described process is generally referred to as the project governance framework which seeks to link the concept, the content the output and the outcomes of the project under management.
  • Subjects: Project Management
  • Pages: 9
  • Words: 2503

Concept of Bonded Wire Strain Gauges

The first type is referred to as fine wire strain gauge, the second type is known as metal foil wire strain gauge while the third one is known as semi-conductor bonded wire strain gauge.
  • Subjects: Engineering
  • Pages: 2
  • Words: 666

The British Aerospace Company: Tornado Aircraft

The kingdom of Saudi Arabia is one of the most important countries not only in the Middle East, but also in the globe. Fuel is usually stored in the fuselage which is located in the [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2638

Fire Plan Design and Prevention System

The formula for calculating the need fire flow is: The need fire flow for 25% involvement will be 1333. The water aids the fire departments when the building is on fire.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 585

How podcasts differ from radio

The internet is less subjected to the limitations on the scope of coverage that are radio experiences. The role of content creation is also easy for podcasts in comparison to radio broadcasts.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 557

Management of Risk in IT Projects

The main task is to acknowledge the presence of the problem. The audit process helps the project manager to assess the extent of the problem.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1126

Birmingham Revival – Project Execution Plan

General project arrangements The Project Manager shall determine the project schedule and the activities that will be undertaken in the various stages of the project execution.
  • Subjects: Project Management
  • Pages: 15
  • Words: 4256

Legal and Ethical Issues in IT

The fact that technology keeps changing adds to the complexity of the ethical and legal issues surrounding information technology. One of the most significant ethical issues in information technology is that of appropriate use.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Information and Data Value

As far as the success of Return on Information metrics application is determined by the objective setting; it is logical to suppose that ROI is to be managed by the strategy marketing department likely to [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 604

Fabrics of the New Millennium

As for the potential novelties, the clothes that adjust to the environmental settings or the accessories of the customer might be one of them as the desire and passion for ergonomics and development do not [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 616

DATA and Information Security

According to Smyth, the consequences related to the loss of data that was in the custody of the organization demonstrate the vulnerability of the organization's information systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 604

Human Computer Interface: Evolution and Changes

The conferences will not require members to be there in person as the events can be transmitted to people in their homes and they can make suggestions too.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 568

Construction Project Management Strategic Issues

The task of the project managers is to oversee the activities of the project until its completion. The money would be used to purchase equipment that would be used in the whole project and pay [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2760

The History of Internet and Internet Security

According to Vacca, the development of computers at approximately 1950 was the genesis of the history of the internet. In a research done in 1988, Einar explain that the WANK worm attacked the VMS system [...]
  • Subjects: Internet
  • Pages: 14
  • Words: 3843

Unleashing web 2.0 for African learning

In order to attain a higher degree of student perception of learning as well as engage students in the process of learning in Africa, a constructivist approach ought to be put in place.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2821

Fidelity Simulation Research

During the primary stages of learning, high fidelity illustration may confuse a learner due to the speedy representation of the compounded sequence.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 540

Miniature Camera on Soccer Shirt

The issue is that some of the motions and rapid movements may lead to confusion, and it is paramount to take all the necessary measures to make sure that the level of stability of is [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1664

Integrating Technology into the Classroom Research Method

As far as the present research on the impact of technology on the students' progress is concerned it is necessary to use the mixed approach which will reveal adequate and valid data and thorough analysis [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 871

The changing role of technology in higher education

However, the history of technological usage in modern education began with the application of educational films in learning during the 1900s and the Presseys mechanical-teaching machines during the 1920s.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1416

The Charleston Sofa Super Store Fire

The crew around the back side of the building noticed that the fire was in the loading dock area and was threatening the showroom".
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 846

Content Analysis Method

The unit of analysis is the smallest meaningful unit analyzed by the researcher. This type of analysis can be implemented with the help of software.
  • Subjects: Applications
  • Pages: 2
  • Words: 565

Future for mobile handsets in UK

The purpose of the project is to identify the following Mobile Phone Gadgets and their use in the United Kingdom Technological advancement of the mobile phone Gadgets in the U.
  • Subjects: Phones
  • Pages: 10
  • Words: 2830

The Project Manager in Construction

In addition, the chart states the duration it took to complete the events, and, whether this is the duration, the project manager had scheduled for the event.
  • Subjects: Project Management
  • Pages: 6
  • Words: 1468

Cyber Security Threat Posed by a Terrorist Group

These among other features of the internet have been identified to form the basis of the cyber terrorism attacks. A comprehensive international collaboration among investigators and prosecution teams in cases of cyber attacks have also [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1940

Establishing a Project Management Office (PMO)

Establishment Role, Scope and Office The initial set up of the PMO will involve the establishment of the organizational role and scope of the office.
  • Subjects: Project Management
  • Pages: 8
  • Words: 2238

Effective Project Management Practices

A project scope encompasses the entire task involved in the creation of the products of the project and the processes that creates them and also the processes that are involved in the definition and controlling [...]
  • Subjects: Project Management
  • Pages: 8
  • Words: 2303

Theft of Information and Unauthorized Computer Access

Such people might attempt to steal information with a motive of using it to exploit the company by selling confidential information to the competitors or to leverage on the same to get a new job.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 779

Project Management: Order Processing System

The sales department basing on the directive by Benhams chief executive produced a project brief on behalf of the Board of Directors which was subsequently passed to the project team to evaluate the viability of [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 2055

How to Improve the People Contribution to Project Management

The input of both the individuals and groups in the organization is invaluable to the achievement of organizational goals. A process on the other hand refers to a course of action characterized by a series [...]
  • Subjects: Project Management
  • Pages: 9
  • Words: 2690

Concept of Project Plan in Project Management

One of the biggest challenges of the project that has been identified is the difficulty of achieving all the goals that the project intends to achieve without deviating from the constraints of the project that [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 983

Project Management in Business

In a business industry whatever project undertaken pursues a similar kind of model that involves Defining the project- this is where the project director describes the kind of a scheme it is as well as [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1273

ArchiMate Architecture, ArchiMate Series, and Related

The research carried out by Iacob and Jonkers sought to define the process of model integration for ArchiMate, and found that the language uses integration of detailed designs to visualize, and analyze enterprise architectures.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 2055

Tablet PC Product Analysis

Rutenbeck opines that "Tablet PC is cost effective, a mini- laptop device, and is designed with pen drive that makes it more useful especially to university students".
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1662

The Computer-Mediated Learning Module

A runtime data model will be used to encode the information received into a standard format of programming, and a standard metadata will also be used to identify a particular activity in the performance criterion [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1656

Network management: principles and practice

The success of the network or interface that will be put in place will greatly depend on the bandwidth that will define the data rate of the network connection.
  • Subjects: Internet
  • Pages: 2
  • Words: 678

Miniaturization Process Associated Risks

Miniaturisation is the process of continued minimisation of the sizes of devices and products. Privacy The reduction of the size of technological devices has made stalking and invasion of privacy an easy process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1539

Computer Security and Its Main Goals

Confidentiality is an aspect of security that ensures that access to data and other computer assets is limited to the authorized parties.
  • 5
  • Subjects: Computer Security
  • Pages: 2
  • Words: 668

Effects of the Internet

The dawn of the internet phenomenon has completely changed the way people conduct their daily activities. The above statements exemplify and amplify the benefits of the internet revolution.
  • Subjects: Phones
  • Pages: 3
  • Words: 746

Welcome Robotic for Abu Dhabi Women College

In the year 2009, the college opened a second banch in the city of khalifa to cater for the students who encounter problems relocating to the capital city.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2686

Management Technology Operation Based

The mission of the company is to use progressive technologies in the field of electronics to create a new product in the electronic engineering industry.
  • Subjects: Engineering
  • Pages: 2
  • Words: 461

Engineering Professionalism and Ethics

On the other hand, the professors apply the several elements and aspire to develop the lives of different individuals. It determines the way a professional handles the issues that are to be engaged with learners [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1140

Google Cloud Products in Khan Academy

The study will mainly focus on a number of challenges experienced by the institution at the initial stage, the ways the Google Cloud Platform or a specific Google App Engine was presented as a solution, [...]
  • Subjects: Programming
  • Pages: 8
  • Words: 2179

Lean Burn Engine Technology

First, the excess air used in lean burn technology reduces the temperature of the combustion process and this lowers the amount of oxides of nitrogen produced by nearly half, compared to a conventional gasoline engine.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2773

Cyber Theft and Its Consequences

This research paper will address the usage of internet and how internet theft has continued to thrive as the technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3150

The Advantages and Disadvantages of PMA

The difference between the licensed and independent PMA is in the character of the cooperation between the companies and the features of producing the PMA parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 553

Cloud Computing in Network Security

In contrast, in cloud computing, the cloud provider encrypts customer's data before it is stored in the cloud. Identity and Access Management is another protocol that can be used to manage users accessing data in [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1393

A Fire That Changed NFPA Codes

This paper will discuss the impact of this event on the code of the National Fire Protection Association. The Southwest Boulevard Fire showed that the storage of inflammable liquids posed a significant threat to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 842

Bioinformatics and Biotechnology

The purpose of this study is to provide an overview of bioinformatics and to illustrate how bioinformatics can be utilised in the design of drugs and the enhancement of agricultural products.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2598

PMA Results on Flight Express Aircrafts

The first one is Check A and it must be carried out before the first flight of the day. In addition, the functionality of the fuel pump has to be inspected during this check.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1088

The Educational Promise of Social Media

The use of social media can only be useful if the students or children are closely watched and guided on how to make use of it for positive development.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 588

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

The influx of wireless technologies in organizations

This implies that wireless and mobile technologies plays a significant role in the expansion of the communication lines within the organization, which in turn increases the capability and the capacity of the organization to respond [...]
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2484

Strategy And Controls In Information Security

An attack could comprise any of the following categories or a combination of any of them: Fabrications, which means adoption of some deceptions to play a trick on the unaware users of a system; Interruptions, [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1319

Data Mining: Concepts and Methods

Speed of data mining process is important as it has a role to play in the relevance of the data mined. The accuracy of data is also another factor that can be used to measure [...]
  • Subjects: Data
  • Pages: 3
  • Words: 891

Learning Process and Incorporating Technology

Kant was among the initial philosophers to recognize the processes of the mind and that the mind was integral of the thinking process and has the capacity to add value to the development of thoughts.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 907

Mobile Technology Advancements

This wide range of customer requirements underpins the fact that mobile system based users require a high level of availability to access IT and IS systems.
  • Subjects: Phones
  • Pages: 7
  • Words: 1977

Effective Multicultural Project Management

I wish to study and examine in this research how communication and the multicultural differences are likely to affect the success of project implementation.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2865

Will Schools Survive the Internet?

The main aim of this paper is to analyze both sides of the argument and establish the validity of the statement, 'With the rise in modern technology, there will be no need for teachers as [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2264

Internal and External Issues in the Airline Industry

The skills and training that the airline staff get is necessary to ensure security and effectiveness of the flight and thus make the operation and management of the airline easier. The preferences and the needs [...]
  • Subjects: Aviation
  • Pages: 11
  • Words: 3036

Cryptography and Privacy Protection

The main ethical issue is the dilemma between the privacy of a group and individuals and their safety and security, for example, on what side the government would want to maintain the privacy of its [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2286

Goyder on Technology in Society

This phrase indicates how Goyder perceived technology in the context of its importance, relevancy, and connection to humanity in the current world.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 577

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2970

Conceptual Exegesis of Web Production: A Cocktail Website

In the exegesis, certain attention will be paid to the form, content and materials used in OMP, the evaluation of functions and purposes of the work, understanding of the context from the legal, social, and [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2273

Qualitative Data Analysis Exercise

These include the causes of high mobile phone bills, different customer and sales policies, morality in handling customers, call rates and the age group that uses mobile phones mostly from the opinions expressed by the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 889

Impact of Technology on Teaching

The demographics of the Department of Defense Education Activity schools highlight the nature of students and the expected challenges in both teaching and learning.
  • 5
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2760

Systems and Network Security

In addition to monitoring the users of a system the Windows Server 2003 platform allows the administrator of the system to audit activity on the system by observing the system logs.
  • Subjects: Computer Science
  • Pages: 15
  • Words: 3812

Security on Windows Server 2008

During execution, the process is given an access token that identifies it to the rest of the system and quite often this token will be the same as the user account that started the process.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2319

Project Life Cycle of V-22 Osprey

One of the reasons was to improve the design of the aircraft and to manage the communication lines. The fact that the funding by the Research and Development was very low to meet the requirements, [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2876

Stratus and MS .NET

Regardless of the purpose of the server, it is important that the level of availability matches the applications and functions assigned to that server.
  • Subjects: Programming
  • Pages: 9
  • Words: 2772

Business Information System Management

The company has a very large network and through use of cloud technology, the company has been able to make its operations easer, though it still needs to realize strategies of full utilizing the technology.
  • Subjects: Data
  • Pages: 2
  • Words: 1197
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.