Tech & Engineering Essay Examples and Topics. Page 44

5,359 samples

Optus Solutions: Facebook as a Communication Medium

This information was gathered and documented for use in the report to determine if the company was using the right channels and media of communication to reach existing and potential new customers to the company.
  • Subjects: Internet
  • Pages: 11
  • Words: 2962

Information systems: safety of wireless networks

This paper provides an analysis case study in Australia concerning the security issues during the deployment of wireless networks for organizations and overview of the effect of "war driving" and 'war chalking" on the uptake [...]
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1880

The Mobile Phone as an Electronic Wallet

Based on this it is possible to conclude that the penetration of mobile phones within the Abu Dhabi area is very widespread given that it is the largest of the emirates.
  • Subjects: Phones
  • Pages: 6
  • Words: 1772

Organizational Management and Experiential Computing

Without experiential computing, humans would view the world in a symbolic form; but relating the world with human experience gives a deeper meaning to the relationship because the world is part of life and humans [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1364

Business Intelligence and Data Warehousing System

The name business intelligence is a name that was formed in the mid 1950s to describe the act of changing un-grouped data from a company's or an organization's contrasting functional data into a common data [...]
  • Subjects: Data
  • Pages: 9
  • Words: 2636

Software Solutions in Web Design

Joomla is reportedly among the most popular tools in web design and is based on the PHP and MySQL technologies. Interspire is a proprietary shopping cart development solution that is rich in many of the [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 569

The Go-Phone by AT&T Company

This then results in a long process of verification where the representative asks the caller to provide some form of verification on the account aside from the pass code which can consist of either the [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2990

Evaluating Security Software

Some of the antispyware software examples include; MacAfee internet security and Kaspersky internet security. The antispyware software examples are Webroot secure anywhere antivirus and stozilla.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 533

Fibre Reinforced Plastic

Secondly, it is important to consider the change in the stiffness of the member to be strengthened. This requires the use of FRP composite, which is bonded to the tension face.
  • Subjects: Engineering
  • Pages: 2
  • Words: 370

Where is writing taking us?

The big question of discussion at this particular juncture is evaluation and examination of the impact of the new technologies and how they affect the core purpose of writing. Important to note and mention is [...]
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2586

Ethical Debate on our Information Privacy

However, with the high reliance on the internet technology as the superior channel of communication, governance, business process and information storage, a number of questions have emerged regarding the safety of the internet as a [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2196

A Discussion on the Acceptability of Data Mining

Today, more than ever before, individuals, organizations and governments have access to seemingly endless amounts of data that has been stored electronically on the World Wide Web and the Internet, and thus it makes much [...]
  • Subjects: Data
  • Pages: 2
  • Words: 608

The Technology’s Influence on Lives

In this essay, I will demonstrate the influence of technology in our lives first by looking at the current phenomenon of phone addiction and proceed to show its continued significance in the developing field of [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 810

Global Finance Inc.: Assets Risks and Mitigation

In addition, the report also addresses the CEO's concerns about the mobility security and design for secure mobile computing for portable devices with regard to authentication technologies and protection of data.
  • Subjects: Cyber Security
  • Pages: 20
  • Words: 5340

Impact of Scientific Discoveries on the World

As a wrap up, therefore, Juan Enriquez envisions the future of the global economy which is characterised by tremendous developments in the scientific and the technological world.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 656

The collapse of the twin towers

Most reports have so far indicated that the main cause of the collapse of the buildings, were the fires that erupted following the explosion, upon impact of the airplanes.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 549

Six-Sigma Implementation in Information Technology

The six phases assist the management to avoid overlooking the factors that affect the quality of target aspects. Software opportunities and defects are identified in order to allow for the calculation of six-sigma performance indicators.
  • Subjects: Project Management
  • Pages: 7
  • Words: 1944

Design of ICT For Disaster Management Systems

The design of the system was based on software functionality deemed critical based on extensive knowledge, experience, and tacit knowledge of the Office of Emergency Preparedness. The functionality of the system is critical in enabling [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 531

ICT for Disaster Management Systems

The purpose of this research is to establish the conditions for successful design of ICT for disaster management systems in ICT and emergency services.
  • Subjects: Applications
  • Pages: 6
  • Words: 1642

How Infographics Make it Easier to Receive Information

Some of the limitations to the use of images in infographics include the visual impairment of the intended subjects, lack of clarity in the presentation of the message, and existing personal viewing preferences such as [...]
  • Subjects: Computer Science
  • Pages: 19
  • Words: 5180

ICT Disaster Management Systems

The role of ICT in the management of disaster is enormous in the current world. The events of the beginning of the 21st century has witnessed an unprecedented capacity of ICT to solve the emerging [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 526

Overview of the Internet Age

Although the young tech-savvy generation has been closely associated with the fast growth of digital crime through the internet, it is understood that individuals who are above 35 years account for nearly 45% of all [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 598

United Airlines Flight 173 Accident

Although the problem with landing gears was determined and overcome successfully, the crewmembers were inattentive to the fuel state, and the error resulted in the accident.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 546

Open Systems Interconnection model

The layers are arranged in a stratum whereby layer 7 is in the top and the bottom layer is 1. This layer is also responsible in the delimitation of the network type and the packet [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 518

Network Topology Design Process

The network design used the allocated company address space of 150.10.0. PART OF NETWORK NETWORK USED New York subnet 150.10.0.
  • Subjects: Internet
  • Pages: 5
  • Words: 962

Social Implications of Computer Technology: Cybercrimes

In reading the discussion above it becomes clear that the term cybercrime actually refers to computer-related crime; however, some consider computer crime to be a subdivision of cybercrime that warrants its own definition and understanding.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 547

Cybersecurity in the Energy Industry

In this regard, in the event that a cyber attack is launched against the energy sector, it is bound to have far reaching consequences.
  • 5
  • Subjects: Computer Security
  • Pages: 2
  • Words: 580

Computer Aided Software Tools (CASE)

The use of the repository is common to both the visual analyst and IBM rational software with varying differences evident on the utilization of services.
  • Subjects: Engineering
  • Pages: 2
  • Words: 2489

History of the Cellular Technology

With the developments in the cellular technology, electrical engineering has been affected by the changes and development of this technology. Ever since the introduction of the first mobile phones in the 1980s, electrical engineering experts [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 563

BlackBerry: Customer Behavior Analysis

Also, Blackberry has cut a market niche as a business device, enabling the company to get hold of the corporate users and distinguishing itself from the rest of the market.[1] Consumer behavior attempts to evaluate [...]
  • Subjects: Phones
  • Pages: 5
  • Words: 1378

Ethics in Computer Hacking

Hacking by no means follows ethics; the infiltration is to the benefit of hacker and loss of users of computer system, network or website.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 655

Security Technology Evaluation of Bank Solutions

However, through the utilization of the power of performance efficiency of decentralized systems and the possibility of elimination of distance through virtual connectivity of users, the centralized solution is the best choice for the data [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1485

Ethics in Computer Technology: Cybercrimes

The first one is the category of crimes that are executed using a computer as a weapon. The second type of crime is the one that uses a computer as an accessory to the crime.
  • 5
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1334

Computer Forensics and Investigations

It is crucial in the investigation of crimes that are related to the manipulation of computer systems. For digital evidence to be admissible in court, investigations should be conducted in a manner that adopts the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 798

Preparing a Computer Forensics Investigation Plan

However, if the information is thought to be contained in the permanent storage, then a computer has to be shut down before transporting it to a laboratory for forensic analysis. The first step in the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Basic Operations of Computer Forensic Laboratories

All computer forensic laboratories in the US have to adhere to the national standards before they could be certified. Standard computer forensic equipment is used to support standard procedures and conditions in the laboratories.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 834

The Relational Model for Database Management

Relational Database Management systems have powerful applications that can analyze and manipulate data in the system to serve the needs of the intended users.
  • 3
  • Subjects: Data
  • Pages: 4
  • Words: 1118

Fire Safety Engineering Overview

Fire safety engineering refers to the usage of scientific measures to improve the detection, prevention, and extinguishment of destructive fire. This is a recount of the successes of fire protection and safety engineering.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1684

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 780

Unified Modeling Language (UML)

UML was created to be used in modeling of software intensive systems by use of diagrammatic models making it easy to introduce more objects to an existing project.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 616

The Internet’s Advantages and Disadvantages

The resent and the most influential invention in the life of people is the creation of the Internet. Nowadays, the invention of the Internet allows people monitor the work of the departments abroad, run relationships [...]
  • 5
  • Subjects: Internet
  • Pages: 4
  • Words: 1091

Forestry and paper-product industries

Some of the challenges occur due to the relationship that exists between the industries and electrical engineering sector in the country.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2281

Cloud compounding impact on businesses

Efficient management of the virtualization process is possible through the integration of systems that enhance stability and security of the cloud. The main hurdle for both consumers and businesses in adopting cloud compounding are lack [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 864

Technology of Human Resources and the Human Systems

The invention of printing, the slide ruler, the mechanical calculator, analog devices as well as algorisms between 0 CE and 1700s all culminated to the development of the computer by the start of the 1800s.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1355

Children’s Game Analysis Project: The Sims

Being aimed at showing the daily activities of the family, the game is great in considering the roles of the family members and the distinguishing those in accordance with the gender roles.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 563

Hybrid Engines vs. Standard Engine

While it is true that the engines of the last decade are more efficient that the standard engines of the former decades, hybrid engines result in even greater fuel efficiency.
  • Subjects: Engineering
  • Pages: 10
  • Words: 1943

Non Experts: Artificial Intelligence

Regardless of speed and the complexity of mathematical problems that they can solve, all that they do is to accept some input and generate desired output. This system is akin to that found in a [...]
  • Subjects: AI
  • Pages: 14
  • Words: 3773

The History of Relational Database Technology

In 1980's the disadvantages associated with relational database systems and the need to increase capacity of manageable objects led to the invention of commercial object-oriented database systems.
  • 5
  • Subjects: Data
  • Pages: 8
  • Words: 2179

Aviation Fire Risks and Safety

The major difference in standards of competence between the two branches is that, the personnel of Aviation Fire Rescue Services, have a deeper knowledge in aviation matters that the Local Authority Fire Rescue Services.
  • Subjects: Aviation
  • Pages: 9
  • Words: 2456

Product Fetch: SprintMusic MP3 Player

Therefore, this product has triple features it is eco-friendly as it uses a unique form of energy i.e.kinetic energy, it provides the distance ran and speed, and allows the user to set the desired speed [...]
  • 5
  • Subjects: Engineering
  • Pages: 3
  • Words: 859

“Capturing” in Culture and Beyond

The existence of the constant technological improvements in Europe as early as the thirteenth century validates Friedel's thesis on the existence of "a culture of improvement" in the western technology.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1099

Internet Tools for Dirt Bikes

The level of the technology that a company has impacts the profitability and the going concern of the business. Expenses related to the internal and external communication of the organization should be reviewed from time [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1126

High Power DVDs: Product Analysis

The High Power Subwoofer will always have you daring to move closer to the beat and the vibration mode is enough to turn your house into a club.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 662

Loud and Clear Mobile Communications

Virgin mobile Australia This is the youngest of the other service providers and is ranked fourth in the Australian telecommunication industry.
  • Subjects: Phones
  • Pages: 10
  • Words: 2760

Is Using Cell Phone Dangerous?

Research has further shown that "the side of the brain that is exposed to the ionizing radiations from the cell phone metabolizes more glucose than other parts that are not exposed to it".
  • Subjects: Phones
  • Pages: 4
  • Words: 1274

Nanotechnology Risk in a Nanogenerator

In the context of this essay zinc oxide is used in nanogenerator which acts as a transducer in the conversion of mechanical energy to electrical energy.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1367

Nanotechnology Risk in NanoBatteries

When the nanobatteries are exposed to fire, the inhalation of the fumes may cause severe respiratory tracts inflammation in the upper region of the respiration systems, which can lead the damage of the lungs.
  • 4
  • Subjects: Engineering
  • Pages: 5
  • Words: 1524

Biotechnology Development and the U.S. Economic Hegemony

Biotechnology is understood by many to be one of the most promising areas of technological development and among the most probable to bring significant economic and societal gains to the United States in the 21st [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2014

Managing Pilot Fatigue

This is so because the duties performed by the pilot in the cockpit require a lot of vigilance, care as well as mental and physical well being.
  • Subjects: Aviation
  • Pages: 3
  • Words: 779

Toyota Corporation Data Resource Management

Other than utilizing the knowledge and experience that the employees have, there is the need to use available information to grow and develop knowledge and expertise in employees.
  • Subjects: Data
  • Pages: 5
  • Words: 1394

Subsidies in the Airline

A significant occurrence in the history of US commercial airlines was the enactment of the deregulation Act which removed most of the federal government's regulations imposed on the industry.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1652

Computer Networks and Security

The node and the server share the private or secret key known to the KDC and to the nodes and servers.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2659

Regional Airlines: SkyWest Airlines

In 1977, the SkyWest Airlines made agreements with American Airlines, United Airlines, Texas International and Hughes, and this allowed check-in and baggage transfers between the airlines for the passengers.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2205

Internet Censorship in Saudi Arabia

The censorship is charged to the ISU, which, manage the high-speed data links connecting the country to the rest of the world.
  • 1
  • Subjects: Internet
  • Pages: 5
  • Words: 1471

Digital Technology in Modern Society

From the above analysis, it is more evident that digital technology has a wide range of effects to our culture and to the young generation.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1091

The Computer Microchip Industry

For instance, the company can decide to focus on durability and by doing so, the company will have a competitive advantage in the market.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 938

Wireless Technologies

In a bid to improve technology in the building, it is important to implement the wireless security devices. The cameras are also easy to hack into since the level of their security system is low.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 554

Contribution of the Factors to the Internet Growth

With the use of this different scripting languages integration of multimedia features into products has become a reality and with the advancement in scripting languages the internet in the near future is expected to have [...]
  • Subjects: Programming
  • Pages: 5
  • Words: 1653

Characteristics for Website Evaluation

The website has a clear purpose, and the purpose is to provide the users with information concerning weather conditions. The website is user-friendly it has guidelines and navigation tool that are appropriate and consistent and [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 549

Challenges of the Huge Data in the Day-to-Day Transactions

This paper addresses some of the challenges the huge data may pose in the day-to-day transactions."RFID protocol is a communication protocol that uses radio waves to enable the transfer of data from an electronic tag [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1268

E-mail Spam: What it is and how it works

They also throw back the argument of accessing addresses back to recipients and claim that since it is in a public directory, then spammers should not be blamed for accessing and using the addresses.
  • Subjects: Internet
  • Pages: 3
  • Words: 829

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

Wind Turbines Manufacturers Overview

Sinovel has been a leader of the Chinese market in producing innovative turbine equipments in the sense that; it is the first to introduce an advanced wind turbine in the world, it was the first [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2729

Normative Ethics and the Right to Privacy

Recent advances in technologies have prompted a new consideration of e-mail, use of e-mail, and its relation to ethics. From the deontological perspective, the court's decision to give Ellsworth's parents legal access to his e-mail [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 892

The iPhones Fourth Generation

It is the fourth generation of the iPhone, having succeeded the iPhone 3GS, the other two previous models are the original iPhone and the iPhone 3G.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Insights on Green Automotive Development

Basing judgment on affordability and availability of the EVs, the tax incentives and exemptions offered by some government agencies to purchasers due to the high initial costs seems to be an unsustainable venture in emerging [...]
  • Subjects: Engineering
  • Pages: 5
  • Words: 1414

Information Technology and Low-Cost Airlines

This is made possible by many factors but it can be said that the most significant component is the use of information technology specifically the utilization of the Intranet and Extranet networking system.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1625

The Open Systems Interconnection Referencing Model

Layer 7: The Application Layer This layer is the interface between the user and the network. The layer "transforms the data from the session layer to provide a standard interface for the application layer and [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1508

Application of RFID Technology

The silicon chip in the transporter tag contains object such as the exact place of location, the date of manufacture, the color of the product, the price, or any other relevant information.
  • Subjects: Applications
  • Pages: 5
  • Words: 1595

Data Integration and Data Quality

Data quality is one of the protective measures that is highly valued by most companies because the records that are stored in databases can be used to trace events and for the referencing to be [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1565
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.