Tech & Engineering Essay Examples and Topics. Page 43

5,747 samples

Intervention Strategy in Education

To ensure that the study is comprehensive and unbiased, data will be collected through completion of tests during the research. Secondary data will be collected in libraries and with the help of numerous online resources.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1429

Does Blogging Increase the Motivation of Boys in Class

My interest in this area is to prove the hypothesis of the research that the use of blogging in Design and Technology will increase boys' motivation, diversify their knowledge, and improve their literacy in school.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1994

The Recommendations of the American Welding Association

One of the recommendations that are common in most of the sources analyzed in this research is that anyone working in an environment where there is a risk of chromium and nickel fumes should make [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1971

Online Shopping Platform for La Donna Boutique

By using online services, La Donna cost of production will be reduced because it will be selling goods directly to the customers and this will make producers to get rid of costly intermediaries. The e-commerce [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 590

University of Bedfordshire STEPS Project Plan

With a good and informed understanding of the capacity required by the funding project, the project managers and leaders are in a better position to develop a comprehensive definition and understanding of the most suitable [...]
  • Subjects: Project Management
  • Pages: 8
  • Words: 2337

The Software Engineering Debate

The second reason the author adduces to his view that software development is not an engineering activity is the lack of standardized approaches to software development.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1148

Physical Disabilities and Assistive Technology

For example, learners with visual impairments can use text-to-speech programs. Learners with physical disabilities can be gathered for with the help of assistive technology devices such as adaptive keyboard and screen reading software for learners [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 663

Cryptology and Data Protection

The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 955

Observance, Privacy and Law

It is important for social media users to realize that social networks are not fully concerned with the probability of misuse of their personal information.
  • Subjects: Internet
  • Pages: 2
  • Words: 540

Internet Filtering: Debating the Positives & Negatives

Moving on to the exposition of the positives, it is clear that uncensored access to the Internet may impact negatively on the teenagers' attitudes, behaviour and safety, hence the need to employ Internet filtering.
  • Subjects: Internet
  • Pages: 4
  • Words: 1104

Project Management at MM

Since the project has the support of the top leadership of the organization, the management is ready to meet all the staffing needs of the project.
  • Subjects: Project Management
  • Pages: 3
  • Words: 903

Internet Use Policy at Fairleigh Dickinson University

In discussing the ethical issues, it is imperative to note that personal use of the Internet broadens the ideological divergence between the employer and the worker, which is further polarized by the contrast between economic [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1163

Data Mining Role in Companies

The increasing adoption of data mining in various sectors illustrates the potential of the technology regarding the analysis of data by entities that seek information crucial to their operations.
  • Subjects: Data
  • Pages: 4
  • Words: 1137

Data Warehouse

In a bid to get to that end, the data has to pass through data acquisition, which refers to retrieval of information from the data sources; that is, "a set of processes and programs that [...]
  • Subjects: Data
  • Pages: 15
  • Words: 4161

Low-Power Microcontrollers

Power supply from portable batteries has a significantly low voltage component, which affects the efficiency of the supply and the ability of the devices to adapt to the capabilities of the batteries.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 883

Censorship on the Internet

Censorship in the internet can also occur in the traditional sense of the word where material is removed from the internet to prevent public access.
  • Subjects: Internet
  • Pages: 9
  • Words: 2516

The Main Industrial Hygiene Concerns

The Incident Commander must also communicate precise description of the type, extent, danger, and management of the hazard. Some of the team members must also be involved in the active cleaning and elimination of all [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1114

Green Computing in Botswana

The primary goal of green computing is to mitigate the use of harmful resources. Section B of the questionnaire focused on assessing how the respondents handle computers.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Somerset Rural Youth Project

Due to the implementation of the green activities program, the organization has been in a position to preserve the global climate.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2770

Somerset Rural Youth Project – Quality Assurance

Given that, the SRYP mainly concerns testing and innovation, the staffs use a variety of strategies to reach out to the Somerset youths and deliver appropriate services.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2840

Relational Database Management Systems

Relational database management systems improve productivity, speed and flexibility of data management in an organization through a design that encourages a clear boundary between the logical and physical aspect of database management system.
  • Subjects: Data
  • Pages: 2
  • Words: 615

Cloud Computing and Amazon Web Services

Amazon EC2, Amazon S3 and RightScale are designed with capability to adapt with the size and amount of data and the number of users.
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 819

Internet Filtering Positives and Negatives

The issue of keeping of information by governments does not hold because as the government leaves the internet open to no filtering, it only protects the rights of a few individuals.
  • Subjects: Internet
  • Pages: 4
  • Words: 1042

Augmented Reality Technology

The cost effectiveness of this technology arises from its ability to keep a project on track, and this is the cost benefit of augmented reality.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1291

Pipeline Installation Elements

This must take into account the line size of the pipeline and the length of the barrel. Design Pressure The design pressure must serve as a basis for determining the thickness of the wall of [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2790

Programming Logic and Design – Program Change

In the online processing method, processing of data takes place as it is input into the program, that is, unlike in batch processing it does not wait for the data to be organized into a [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 605

Value of Smartphone Security

The security standards include the use keystroke dynamics, monitoring the time of key holding, the flight time, multiplayer access regulations, priority regarding the application accessibility.
  • Subjects: Phones
  • Pages: 6
  • Words: 1678

Professional Advice on a Project in Post Contract Stage

The drawing presented to both parties regarding the project defines the work to be performed by the contractor and client. Lastly, the form states the time required to complete the project and the provisions and [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2795

Is Thunderbolt the Real Deal?

The Thunderbolt technology storage devices provide an opportunity for manufacturers to continue in the process of providing both professionals and consumers with quality devices.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 759

People Attitude about Green Computing

The first category is composed of the direct effects of the information technology products on the environment. The country leads in terms of the wide use of computers and other information technology devices.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 837

Technology and University Culture

In an interesting correlation between technology and university culture, Stephen Marshall presents the notion that it is the very culture within universities that ascribe to a set of strict fundamentals and organizational practices that limits [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 613

History of Cyber Terrorism

Terrorism on the cyberspace is one of the biggest challenges that came with the invention of the internet. The nature of the environment used in internet communication and socialization makes it hard for people to [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1204

Can the Internet Provide a Forum for Rational Political Debate?

The comparisons drawn between the Internet and its usage, on the one hand, and the radio and television, on the other hand, help to develop constructive discussions and arguments concerning the possibility of the Internet [...]
  • 5
  • Subjects: Internet
  • Pages: 16
  • Words: 4330

Sydney Opera House Project management

The scope of the project ought to be clearly defined before the project. This attribute helps in the analysis of the success of the project.
  • Subjects: Project Management
  • Pages: 3
  • Words: 891

Project Management and Operations

As an alternative, management often distributes the pay rise based on performance of the employees. It also shows the distribution of pay rise.
  • Subjects: Project Management
  • Pages: 2
  • Words: 557

Addressing Information Technology Access Challenges for Students

The main purpose of the proposed study is to critically evaluate viable ways modern distance teaching universities can employ to deal with the challenge of lack of access to information and communication technologies that are [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2269

Technology-Enhanced Strategies to Address Students’ Needs

One of the doubtless arguments in favor of use of technology as a means to reach balance between providing a general guidance to students and addressing the needs of every student in particular is that [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 583

Web 2.0 and Open Educational Resources

Hence, all that we learn is always available and this leads to the promotion of a lifelong studying and learning as students are able to access more information without the need to buy books.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 749

The Effectiveness of Using Podcast Lectures

The research seeks to indentify if learning using podcasts is more effective and beneficial to the students as compared to the traditional classroom lectures.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 868

Greater Gabbard Wind Farm Mega Project

The project management unit must understand the needs of all the stakeholders identified in the first stage, and how these needs are aligned to the needs of the project.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2778

Construction Safety and Accidents in Latino Community

The study seeks to: Examine the prevailing status of construction safety and accidents among male workers in the Latino community, especially in the construction industry. The purpose of this study is to examine the issue [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1208

Cloud Computing: Data Confidentiality, Privacy and Thefts

However, a majority of organizations are faced with the chief decision on whether or not it is advisable to embrace the technology and move their data as well as that of their customers to a [...]
  • Subjects: Cloud Computing
  • Pages: 8
  • Words: 1998

IT Security in Google

The Google's New Privacy Policy is just an attempt to ensure high-level security of an individual's data and improvement in the search field.
  • Subjects: Internet
  • Pages: 2
  • Words: 585

Cyber Attacks: The UK and China

Reflection on the advantages of the strategy adopted by the two governments The above analysis shows that the UK is more effective in dealing with cyber crime as compared to China.
  • Subjects: Internet
  • Pages: 2
  • Words: 615

Fire Safety in the Health Care System

Automatic fire alarm systems have either smoke or heat detectors that sense the presence of the smoke and heat respectively and sound the alarm to alert occupants to evacuate.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1999

HR, Communication, and Integration Management

Through discussion of the case of the Victorian desalination project, the paper applauds and associates success of the project to the creation of a teamwork culture amid the varying diversity differences of all personnel charged [...]
  • Subjects: Project Management
  • Pages: 8
  • Words: 2468

The Use of Sugar Wastes to Generate Electricity

The main project stakeholders for this project include: Project manager He is in charge of the project Project team members-they are in charge in implementation of the project Sugar mill management- they are the project [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 2229

Explosion Suppression Systems

However, ensuring that the latest technology should be used for explosion suppression is not enough; since human factor plays a major role in most of the accidents related to explosion, it is important that the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 585

Analysis: Domain Name System (DNS) and DNS tunneling

In addition, it requires an MX record in DS for the domain of the mail sender Ptr This character is the reverse map query on the PTR of the on-source RR Include:isp.com This is the [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2917

Ways of Strengthening Reinforced Concretes

As such, steel or RFP are some of the most commonly used concrete reinforcement materials to increase the strength of the structure and the ability to resist tension.
  • Subjects: Engineering
  • Pages: 5
  • Words: 896

Occupational Injuries in the Construction Industry

Generally, the construction industry in the United States is among the largest industries, the largest employer, and the most hazardous industries, which contribute to approximately 20% of the annual occupational fatalities reported across the United [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 849

Barbata Electronics – the Knock Your Socks Off project

The rationale for selecting the type of management structure based on the description provided in the question is the need for the company to invest in research and development of the most appropriate technology that [...]
  • 5
  • Subjects: Project Management
  • Pages: 2
  • Words: 485

Ethical Issues Surrounding Social Networking Sites

Social media can also be used to track the activities of users. It is important that measures be taken to control some of the ethical issues associated with social media, especially issues of privacy.
  • Subjects: Internet
  • Pages: 3
  • Words: 922

The Key Features and Objectives of an Incident Command System

In response to the disaster that occurred, the framework involved executing the activities that fell under the responsibilities of the incident commander, one of them being to establish the incident response program.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 828

Webinars in Education

When it is night-time, some participants may be very exhausted and will not have the enthusiasm required to actively participate in the seminar sessions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 265

Company Data Integration: American Express

For example, advertising and sales domain legacy data that may be important in determining the effectiveness of specific advertisements for the American Express company may be integrated into the information architect's design by employing a [...]
  • Subjects: Data
  • Pages: 2
  • Words: 647

Cloud Computing and Virtualization Technologies

Through cloud computing, the organization is in a position to access complex applications and enormous computing sources through the internet. Through cloud computing and virtualization technologies, the organization is likely to benefit from economies of [...]
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1109

Quality and Rapid Application Development

One of the main concerns that arose from the use of RAD was that the quality of the software produced did not always meet the quality standards for software projects.
  • Subjects: Programming
  • Pages: 14
  • Words: 3741

Cloud Computing Security Issues in Enterprise Organizations

This paper will set out to show that while there are significant security threats that an enterprise faces when it migrates to the cloud, there are solutions that can be implemented to mitigate these threats [...]
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2908

Using Workaround Processes in Organizations

The project leaders have the responsibility to establish robust mechanisms to enhance the success of a workaround. The efficiency of the workaround depends on the knowledge and experience of the information and technology experts.
  • Subjects: Project Management
  • Pages: 5
  • Words: 1407

Construction Safety in Latino Community

The study seeks to: Examine the prevailing status of construction safety and accidents among male workers in the Latino community, especially in the construction industry.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3914

Business Continuity and Crisis Management

The biggest challenge for an organisation operating in a disaster-prone business environment is the development of mechanisms of predicting risks and ways of protecting their brands from collapsing in the event of organisational crisis.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2827

Inspiring Creative Web Design

It will ensure that the user can understand the concern of the website at a glance. This will show the activities of the students in the organization.
  • Subjects: Internet
  • Pages: 7
  • Words: 2012

Company Operational Data Model

The logic model is an organized and illustrative way to share and present a company's understanding of the resources it is using for programs, the activities of the plan and the expected results.
  • Subjects: Data
  • Pages: 2
  • Words: 550

Company Conceptual and Logical Data Views

On the one hand, the American Express keeps in pace with the time, employing the latest technologies to satisfy the clientele; on the other hand, some of the customers' complaints concerning the quality of services [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1156

Integrating Technology Into the Classroom

The types of quantitative information that would be helpful for evaluating the effectiveness of the imposed measures include the results of students' standardized tests and statistics data as to the rate of students' dropouts after [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 831

Integrated Safety Management System

However, ISO 14001 is biased towards the protection of the environment and while there are many constraints as a result of the merger of these two systems, the addition of ISO 9001 further complicates the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 939

Solar Photovoltaic (PV)

Role of subsidiaries, in this case, would be to foresee the completion of grid-based rural electrification to off-grid areas that have poor and dispersed population.
  • Subjects: Engineering
  • Pages: 13
  • Words: 3763

Project Management: Maturity Models

The work of the project maturity models is to describe the scope of the projects and the activities that may be related to the project.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2784

Building Cordless Vacuum Cleaner Project

Total float This is the total delay time that a single activity in the non critical path can be delayed without affecting the duration of completion of the project.
  • Subjects: Project Management
  • Pages: 3
  • Words: 1158

Adrian Lamo’s Hacking: Is It Right?

The example of Galileo introduces a theory about the construction of the Solar System that was the target of interest of the well-known scientist.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 602

Project Design for Quality

The project committee and contractor will observe the established protocol through out the lifecycle of the construction phase of the project whenever there is contact with the RSAF.
  • Subjects: Project Management
  • Pages: 15
  • Words: 3797

The Samsung Galaxy Tab

It should be noted that the Galaxy Tab is based on the successes of the Galaxy S.whereas Apple's iPad was the first of such gadgets into the market; Samsung already had Galaxy S in the [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 868

Human Computer Interaction – Heptic Technology in PlayMotion

With the introduction of haptic applications of in gaming, PlayMotion does not constitute the ultimate gaming experience any more. What haptic technology promises gamers tactile is feedback on their gaming experience and a multisensory involvement [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 579

Project Management and Strategy Alignment

The above described process is generally referred to as the project governance framework which seeks to link the concept, the content the output and the outcomes of the project under management.
  • Subjects: Project Management
  • Pages: 9
  • Words: 2503

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1864

Concept of Bonded Wire Strain Gauges

The first type is referred to as fine wire strain gauge, the second type is known as metal foil wire strain gauge while the third one is known as semi-conductor bonded wire strain gauge.
  • Subjects: Engineering
  • Pages: 2
  • Words: 666

The British Aerospace Company: Tornado Aircraft

The kingdom of Saudi Arabia is one of the most important countries not only in the Middle East, but also in the globe. Fuel is usually stored in the fuselage which is located in the [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2638

Fire Plan Design and Prevention System

The formula for calculating the need fire flow is: The need fire flow for 25% involvement will be 1333. The water aids the fire departments when the building is on fire.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 585

How podcasts differ from radio

The internet is less subjected to the limitations on the scope of coverage that are radio experiences. The role of content creation is also easy for podcasts in comparison to radio broadcasts.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 557

Management of Risk in IT Projects

The main task is to acknowledge the presence of the problem. The audit process helps the project manager to assess the extent of the problem.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1126

Voice Over Internet Protocol (VoIP)

For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2838

Birmingham Revival – Project Execution Plan

General project arrangements The Project Manager shall determine the project schedule and the activities that will be undertaken in the various stages of the project execution.
  • Subjects: Project Management
  • Pages: 15
  • Words: 4256

Legal and Ethical Issues in IT

The fact that technology keeps changing adds to the complexity of the ethical and legal issues surrounding information technology. One of the most significant ethical issues in information technology is that of appropriate use.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Information and Data Value

As far as the success of Return on Information metrics application is determined by the objective setting; it is logical to suppose that ROI is to be managed by the strategy marketing department likely to [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 604

Fabrics of the New Millennium

As for the potential novelties, the clothes that adjust to the environmental settings or the accessories of the customer might be one of them as the desire and passion for ergonomics and development do not [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 616

The Infrastructure of Cloud Computing as a Service

Typically, the entire system of cloud computing drawing from its definition provides the infrastructure for organizations to offer clients services dynamically responding to their needs based on the pay-as-use basis, and the economic benefits which [...]
  • 5
  • Subjects: Cloud Computing
  • Pages: 15
  • Words: 4383

Database Normalization and Implementation

The tbl_Player table is created to hold information on the players participating in the Queensland state soccer carnival and it comprises of seven fields, namely, Player Number, Full Name, Address, Contact, Age, Medical Notes and [...]
  • Subjects: Data
  • Pages: 2
  • Words: 680

Human Computer Interface: Evolution and Changes

The conferences will not require members to be there in person as the events can be transmitted to people in their homes and they can make suggestions too.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 568

Construction Project Management Strategic Issues

The task of the project managers is to oversee the activities of the project until its completion. The money would be used to purchase equipment that would be used in the whole project and pay [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2760

The History of Internet and Internet Security

According to Vacca, the development of computers at approximately 1950 was the genesis of the history of the internet. In a research done in 1988, Einar explain that the WANK worm attacked the VMS system [...]
  • Subjects: Internet
  • Pages: 14
  • Words: 3843

Unleashing web 2.0 for African learning

In order to attain a higher degree of student perception of learning as well as engage students in the process of learning in Africa, a constructivist approach ought to be put in place.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2821

Fidelity Simulation Research

During the primary stages of learning, high fidelity illustration may confuse a learner due to the speedy representation of the compounded sequence.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 540

Bottlenecks in a process

From the data provided, it is clear that in the case where the car has enough fuel and is in a good condition, the process of going to work takes the shortest time possible.
  • Subjects: Project Management
  • Pages: 2
  • Words: 581