Tech & Engineering Essay Examples and Topics. Page 45

5,747 samples

Nanotechnology Risk Assessment and Management

Nanoparticles in the nuclear waste are easily absorbed by the human body leading to adverse effects of the respiratory system. These impurities are risky to the human health and the environment.
  • Subjects: Project Management
  • Pages: 7
  • Words: 1914

Cell Phone Industry in the USA

Cell phone industry is indeed one of the most developed sector in the modern world considering the fact that, cell phones are currently in use in almost all parts of the world.
  • Subjects: Phones
  • Pages: 2
  • Words: 577

Ethical Industrial Engineering Ethics

Failure to embrace this by past engineers led to the establishment of code of ethics that guide all engineers in their day to day execution of services.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1872

Objectives of Project Management

It must be noted though that objectives are not immovable sets of goals that need to be followed exactly, rather the unique aspect of project management objectives lies in the fact that they can be [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1241

Current and Past Technology

Technology and marketing are inseparable in that marketing have to keep pace with the developing technology to ensure they use the most modern technology of the time.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 788

Technological impact of the Samsung NC215S Netbook

While many netbooks and laptops have been launched with great technological features, the thing that sets this Netbook apart from others is that its lid carries a solar panel on the top that allows the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 601

Engineering Aspects of Man-Made Disasters and Oil Spills

This report will inquire the engineering aspects of manmade disasters and oil spills with special focus on oil rigs, causes of oil disasters, engineering response to oil disasters and prevention.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1728

Microsoft in the Web Browser Business

Different browsers give the impression to have diverse degrees of utility reliant on the materials to be gained access to and the use to be made of the material by the recipient.
  • Subjects: Internet
  • Pages: 2
  • Words: 723

Ethic and Contemporary Issues in Multimedia and IT

According to the media associations, the work of the media and IT is to inform people about the happenings of the world and a means of communication that would bring growth rather than disasters.
  • Subjects: Internet
  • Pages: 3
  • Words: 976

The Formation of the TSA and the Effect on Air Travel

The famous terrorist attack on the Twin Towers on September 11 of the year 2001 in the US was a key event that heighted the security awareness concerning the susceptibility of the transport modes especially [...]
  • Subjects: Aviation
  • Pages: 15
  • Words: 4164

How Could Wireless Communications Be Made More Secure?

The Mobile Telephone Switching Office keeps a record of the mobile phone's location so that it knows the particular cell in which the mobile phone is located and can call the mobile phone when it [...]
  • Subjects: Internet
  • Pages: 12
  • Words: 3701

Evolution of Fire Protection Codes

With regards to the findings in this research paper, the following hypothesis seems relevant: despite the gradual improvements made to fire protection codes, noncompliance and the challenge of dynamic nature of fire disasters continue to [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3864

Fire Protection of Flammable Storage Tanks

The kind of storage tank used in storing combustible and flammable liquids heavily relies on the stored product physical characteristics and the location of the tanks.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1374

Screw and Lobe Compressors

There is no oil lubrication in the oil free compressors; thus, the movement of the screws compresses the air without necessarily depending on the oil seal.
  • Subjects: Engineering
  • Pages: 3
  • Words: 852

System Administrator Duties

Some of the core issues that the system administrator needs to keep users abreast of include: security of the systems and networks in use, user policies on the acceptable conduct, policy on the system backup [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1613

Data Warehousing at REI

The second reason is that the company wants to increase the accuracy of the information in its hands regarding the outdoor activities of its members.
  • Subjects: Data
  • Pages: 5
  • Words: 1417

The Cyber Security Act of 2009 Analysis

This would contribute to enormous benefits to both the government and private stakeholders by ensuring a cyber security strategy that serves the interests of all.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 948

Application of Technology in Education

Therefore, it is vital for educators to use the above spheres of learning in the application of technology in education. However, the spheres of learning are in constant conflict with each other in the lives [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1107

Classroom Versus Online Tutorials

For example, some studies have revealed that many learners are willing to attend the normal class sessions since they are skeptical about the quality of online classes.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 827

Debate about Real ID in the New Media

Certainly, the urgency of the debate of anonymity versus real ID is on the current agenda because, on the one hand, introducing real names online makes users more responsible for posting comments and photos.
  • Subjects: Internet
  • Pages: 2
  • Words: 562

Development of Technology in Education

The use of the Second Life can help enhance students' learning by engaging them in the new experiences and a new way of interaction. One of the major benefits of the use of Virtual Worlds [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 582

Threat to Civil Aviation-Hijacking

The 9/11 attacks on the United States' civil aviation industry demonstrated the extent to which terrorism can cause damage to the economy of a country and mass murder of innocent individuals. On the other hand, [...]
  • 1
  • Subjects: Aviation
  • Pages: 8
  • Words: 2192

Information Security and Controls in an Organization

According to Hawker, IT Security and Control include physical, logical, and administrative measures organizations put in place to ensure data integrity, confidentiality, and availability to authorized users.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 531

How Organizations Benefit from IT Security and Control

According to Hawker, IT Security and Control include physical, logical, and administrative measures organizations put in place to ensure data integrity, confidentiality, and availability to authorized users.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 1813

Advantages of Anonymity in New Media World

The assumption that anonymity does not contribute to the reliability and credibility of the content is false because posting information online is strictly regulated by cyber law.
  • Subjects: Internet
  • Pages: 2
  • Words: 564

Institutional Implementation of Technology

With most forms of technology, reliability and stability is heavily dependent on the expertise of the handler and the frequency of use.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 546

Software System Implementation Process

The document will cover installation strategies of the licensed software, and the loading of the application with user test data. The training will be objectively based on system security and user problems.
  • Subjects: Programming
  • Pages: 4
  • Words: 1049

The Popularity of Video Games and Their Benefits

Are the benefits of playing violent video games, on the one hand, and the benefits of playing pro-social video games, on the other, can be considered qualitatively different?
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3122

Central heating systems

The main components of a central heating system include the source of heat and appliances for heating, medium of conveying the heat to the area where heating is required, and spaces for releasing heat.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2743

Engineering Ethics and Industrial Accidents

In the business world, the creation involves the definition of new products and services availed in the market. The engineer should ensure that the components chosen for the various processes in the plant are able [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1965

Technology – Security Policy, Ethics, and the Legal Environment

Title III of the E-Government Act of 2002, and the federal Information Security Management Act of 2002, obliges federal government agencies to present information security protections for economy and business information and information systems.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 832

Media Power and Post Modernity

There is a written text on the top of the photo with the name and model of the car. The written text on top of the people in the advert is similar to that of [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2275

The Replica Data Security

The users and owners of the data have to be sure that the information is not vulnerable to hacking. This necessitated the development of data security software that is capable of limiting the total loss [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1082

Wireless Technology in IKEA

In case with wireless power, the focus is made on efficiency because it influences the extent by which the energy is sent to the receivers of the power.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 1910

Between Discipline and Profession

He begins with emergence of electrical engineering to that of computer engineering. In essence, computer engineering is a distinct disciplinary and professional domain.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1689

Acceptable Use Policy

Owners have the authority to change the policies regarding the use of the internet or intranet. Acceptable Use Policy covers the provisions for network etiquette, which is the limitation to the users of network and [...]
  • 5
  • Subjects: Data
  • Pages: 2
  • Words: 655

Technology and Its Future Development

It is clear that technology is starting to become smaller but it is to the benefit of people and with careful control will not evolve into a great evil.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 559

Introducing of Edison’s Technologies

The inventor had persuaded the public that previous devices were the matters of the past by explaining the main benefits of electricity from its efficient work to the cost necessary to sustain the invention.
  • Subjects: Engineering
  • Pages: 3
  • Words: 819

Book Review – Tesla’s Turbine Engine

The development of the wind power, the emergence of water, and animal power were some of the scientific and technological developments that shocked the humanity.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1907

American Calling: Technology Impact on Human Life

The book talks about the technological role of the telephone in the American society. In the second chapter, the author discusses the impacts of the telephone on the American society.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1628

Click, and Facebook revises privacy by Tim Dick

The article discusses the issue of privacy on the Internet taking Facebook as a bright example of how your interests and activity can be revealed to other users of this global social network.
  • Subjects: Internet
  • Pages: 2
  • Words: 648

Role of Engineer in Global Challenges

Additionally, concessions should be made by stakeholders in terms of funding and availing the necessary conditions for engineers to come up with innovative ways aimed at dealing with these challenges.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1372

Technology Development In Asia

The science and technology in the Republic of India, for example, has employed advanced technologies in the manufacture of commercial vehicles.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1619

Business Data Analysis: Abu Dhabi Municipality

Some the databases used in the functioning of the business are; Databases resources management-This is the managerial activity applied to information system that helps in the management of organization resources.
  • Subjects: Data
  • Pages: 3
  • Words: 771

Johntech Website and Acceptable Usage Policy

Purpose The purpose of this AUP is to specify the acceptable behaviors for visitors of the interactive Johntech website hosted by John a technical computer expert with extensive experience in the field of computer technology.
  • Subjects: Data
  • Pages: 2
  • Words: 574

The Role of Computer Forensics in Criminology

In fact, since the development of the virtual machine monitors, the live-state analysis in digital forensics has become common and easy to understand.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1947

Fall Accidents in Construction Industry

It should be noted that a piece of pipe fell from the ceiling and it jerked the lift; as a result, the worker collapsed on the pavement and the injuries that he sustained proved to [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1339

Database Structures of Abu Dhabi Airport

First, the supportive services department has all the critical information required in the monitoring and running of the airport. In addition, the database structures in this department help in the identification of potential risks to [...]
  • Subjects: Data
  • Pages: 3
  • Words: 835

Privacy on the Internet: A Critical Analysis

The present paper looks into the issues of privacy on the Internet by analyzing literature on how to protect your computer and confidential information from such vulnerabilities.
  • Subjects: Internet
  • Pages: 5
  • Words: 1439

Extranet and B2B E-Commerce for Business

The risks to be considered by the Top Breadz team studying the solution are the following: Retail partners might not possess the proper or compatible Information Technology background to gain advantage of Top Breadz's new [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 1842

Invention Analysis and Claiming: A Patent Lawyer’s Guide

In page 5 of the book, the significance of persistent empirical research in technological advancement is demonstrated. Pasteurization is used in the exemplification of these different technological themes and applications.
  • Subjects: Engineering
  • Pages: 2
  • Words: 521

Entrepreneurship, Creativity and Innovation

According to Freeman, the national system of innovation is defined as, "The network of institutions in the public- and private-sectors whose activities and interactions initiate, import, modify and diffuse new technologies".
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1575

Internet Security Practices in Organization

Internet information access policy: This policy should contain guidelines for allowing and disallowing access to an organization's information resources via the Internet.
  • Subjects: Internet
  • Pages: 3
  • Words: 701

Abu Dhabi Airport Information Technology

Another department present at the airport is the Strategic and International Affairs department. This department is responsible for the internationalization of the airport's services.
  • Subjects: Aviation
  • Pages: 5
  • Words: 977

Aircraft Conceptual Design

It involves the approximations of the size dimensions, weights and the selection of aerodynamic properties suitable for the satisfaction of the requirements as described in the proposal of the aircraft design.
  • Subjects: Aviation
  • Pages: 15
  • Words: 3706

White Paper on Cloud Computing

Cloud providers and services vary and it is important to select a model that suits the operations of an organisation. The organisation needs to assess functions that are to be performed through a cloud system.
  • Subjects: Cloud Computing
  • Pages: 6
  • Words: 1645

Aircraft Data-link Technologies in Congested Skies

NextGen system is popularly used to refer to the National Airspace System, which is to be implemented in the due course in various parts of the US, between the year 2012 and 2025.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2161

Laying Pipelines Under the Sea

The paper seeks to assess the effects of the hydrodynamic forces on the piggy back bundle and on the single pipelines forming the bundle.
  • Subjects: Engineering
  • Pages: 15
  • Words: 3903

Legal Aspect of IT

One of the ethical dilemmas that the internet users face is the need to protect the information received from unauthorised people.
  • Subjects: Internet
  • Pages: 4
  • Words: 1166

Control over Personal Information

In this section I would like to speak about the policies of such a company as Twitter since I often use their services. Admittedly, I may not contact the management of Twitter and ask these [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 801

Multiple Dimension of Value: Blu-Ray v. HD-DVD

The paper also outlines some of the techniques that a firm can apply to improve the overall performance of its technology and design. The Blu-ray technology, due to its compatibility with a number of technologies, [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1632

A Review on Cloud Computing: Concepts and Benefits

According to Rodriguez, several organizations establish community cloud to have common requirements and need to share infrastructure to understand the benefits and aspires to assemble ideologies of a digital ecosystem with the use of a [...]
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2768

Technological Access, Literacy and Fluency

However, not all members of the community surrounding the University are technologically literate. To improve access to digital technology in Michigan Technological University and the surrounding areas, various measures should be put in place.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 792

Impact of Information Technology on Customers

Most businesses in the globe have adopted the digital way and businesses are sacrificing their time and finances to bring in advanced technologies to tackle and manage their processes within the business effectively and efficiently.
  • Subjects: Applications
  • Pages: 6
  • Words: 1642

The Invention of Television

According to Street, Paul Nipkow developed the Nipkow disc in 1884, which was capable of transmitting pictures by use of a cable. In the earlier times, it was hard to send a message for its [...]
  • Subjects: Other Technology
  • Pages: 14
  • Words: 424

Benefits and Dangers of Ethical Hacking

The advantages of ethical hacking The following are some of the advantages associated with the use of ethical hacking in an organization.
  • 5
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1613

The Flexible Use of Information Technology

The extent of the impacts can be used as a guide to address the requirements. The system is a patient centered IT system with composite care plans that can increase the efficiency of the services [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 494

IT for Users in Organizations

Subscribers should be entitled to terminate the services of a CSP and to recover all the data that they had entrusted with the CSP.
  • Subjects: Internet
  • Pages: 7
  • Words: 1940

The Curious Case of Gary McKinnon

In this case, the author uses the alleged computer hacker who was identified as Gary McKinnon from the United Kingdom in the case study to address the complex types of criminal activities that do take [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1375

Social Aspects of Information Technology

The activities of the group began in week 2 with the brainstorming of ideas for the search and choice of a brand that we wanted to promote through the use of a social media platform.
  • Subjects: Internet
  • Pages: 2
  • Words: 697

Telecommunication Project: Bluetooth

This technology has the ability of overcoming the challenge of synchronization since it has the potential of connecting a myriad of devices.
  • Subjects: Internet
  • Pages: 2
  • Words: 668

Puplmaster 3000 Business Model

After identifying our intended area of research for a business model, we went ahead to formulate a proposal in order to showcase how we would conduct research in a business model analysis, and also estimate [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 851

Cloud Computing and Corporate IT Infrastructure

It is important to recognize that the application of cloud computing has led to the development of new security threats. The organizations must consider the possibility of engaging the services of technical and experienced IT [...]
  • Subjects: Cloud Computing
  • Pages: 5
  • Words: 1342

Intel and Advanced Micro Devices

Of the two companies, AMD was the first to introduce a 64-bit chipset with a clocking capability measurable in gigahertz. Although Intel chips resist over-clocking, the location of the L2 cache memory facilitates faster memory [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Technological solutions for human services

The use of technology becomes very critical to offer the services to the clients who are widely spread in the inaccessible parts of the country.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 909

West Gate Bridge Project

When the two contractors were given the green light to start the construction, again a clear lapse was evident in the structure and management of the project.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1102

Can Educational technologies improve learning?

From this perspective, amid considering various arguments and counter-arguments for and against the roles of educational technologies in the modern society in improving learning in schools, the paper argues that educational technologies can serve to [...]
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1964

Technology vs. Humans: Exploring the Benefits of Cursive Writing

Because handwriting is a unique interpretation of personality type, it should also render specific qualities and ideas that are subjective to this personality. First of all, it allow to express your personality because handwriting is [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 622

Contingency Plan for Generation Next Airport

In the event that all lavatories become inoperable during a tarmac delay, the airline will return to the gate as soon as practical or make other arrangements to immediately service the aircraft to return the [...]
  • Subjects: Aviation
  • Pages: 22
  • Words: 5807

Material of Safety Rolling

Specifying the shape limits the option of material and process, similarly, specifying the process restricts the materials to be used and the types of shapes they form.
  • Subjects: Engineering
  • Pages: 11
  • Words: 3005

The Comparison of iPhone, Droid, and BlackBerry

The purpose of the report is to compare iPhone, Droid, and BlackBerry in relation to such features as the peculiarities of the operating system, usability, apps and tools, the technical characteristics, and the price of [...]
  • Subjects: Phones
  • Pages: 5
  • Words: 1445

Smart Cities: Masdar and New Babylon

The Masdar project is an initiative of the Abu Dhabi government that aims to use it enormous resources in the world energy markets so as to promote the rising technologies of the future.
  • Subjects: Project Management
  • Pages: 11
  • Words: 2943

Ethics and Nanotechnology

Although the development of nanotechnology is significant for the general technological progress of the contemporary science and it can meet the people's needs, from the perspective of their impact on humans, the achievements in nanotechnology [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1884

Hotels Cooling and Heating Systems

The first essential part of the system is the source of warmed or cooled air. It is the origin of all gases distributed within the system and in the rooms.
  • Subjects: Engineering
  • Pages: 3
  • Words: 831

Different Types of Cement

The other types of cement include the blended and the hydraulic cement. Type one and Type one-A constitute of the Portland cement used for most of the basic construction.
  • 5
  • Subjects: Engineering
  • Pages: 3
  • Words: 853

Evaluating Security Software (Firewall)

This is very important as far as network security is concerned since the proxy automatically prevents direct and risky connections between systems found on each side of the firewall. Why? UTM is the best firewall [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 583

Benefits and Application of Database Packages

Furthermore, "database process is a tool which is beneficial to build effective applications like inventory and sale ordering management in business operation". The use, collection, and processing of information is important in business operation.
  • Subjects: Data
  • Pages: 2
  • Words: 663