Tech & Engineering Essay Examples and Topics. Page 48

5,747 samples

Challenges of the Huge Data in the Day-to-Day Transactions

This paper addresses some of the challenges the huge data may pose in the day-to-day transactions."RFID protocol is a communication protocol that uses radio waves to enable the transfer of data from an electronic tag [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1268

Website Review: cio.com

They are carefully designed with few clicks to the main information the main purpose of the website is to provide information for CIO's and other IT professionals.
  • Subjects: Internet
  • Pages: 2
  • Words: 652

E-mail Spam: What it is and how it works

They also throw back the argument of accessing addresses back to recipients and claim that since it is in a public directory, then spammers should not be blamed for accessing and using the addresses.
  • Subjects: Internet
  • Pages: 3
  • Words: 829

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

Wind Turbines Manufacturers Overview

Sinovel has been a leader of the Chinese market in producing innovative turbine equipments in the sense that; it is the first to introduce an advanced wind turbine in the world, it was the first [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2729

PC Models Comparative Analysis

Design features are also quite strong in two of the computers; the 27inch Apple iMac as well as the HP Touchsmart.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1184

The Engineering Challenges of the 21st Century

The experiences in terms of the effects and the response measures used in the Chernobyl nuclear power plant accident can be considered by Japan to help it address the consequences of the Fukushima nuclear disaster.
  • Subjects: Engineering
  • Pages: 2
  • Words: 1958

Why Developed Countries Should Not Produce Nuclear Power

Though nuclear power generation is slowly gaining prominence in the world, especially since the world is seeking more sources of green energy, nuclear energy is a unique source of energy because it bears unique characteristics [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1415

The Major Failure of the Apollo 13

The failure of the Apollo 13 was a big blow to the man in his attempt to explore the surface of the moon.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1690

Normative Ethics and the Right to Privacy

Recent advances in technologies have prompted a new consideration of e-mail, use of e-mail, and its relation to ethics. From the deontological perspective, the court's decision to give Ellsworth's parents legal access to his e-mail [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 892

The iPhones Fourth Generation

It is the fourth generation of the iPhone, having succeeded the iPhone 3GS, the other two previous models are the original iPhone and the iPhone 3G.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Insights on Green Automotive Development

Basing judgment on affordability and availability of the EVs, the tax incentives and exemptions offered by some government agencies to purchasers due to the high initial costs seems to be an unsustainable venture in emerging [...]
  • Subjects: Engineering
  • Pages: 5
  • Words: 1414

Impact of Technology on Education

The history shows that technological progress and modernity are closely interconnected, arranging a tandem for the development of more sophisticated techniques for the cognition of the surrounding world.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1715

Information Technology and Low-Cost Airlines

This is made possible by many factors but it can be said that the most significant component is the use of information technology specifically the utilization of the Intranet and Extranet networking system.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1625

Electronic Books for Easter Washington University

For example, the electronic text center based at the University of Virginia is reported as the first institution to allow the downloading of classic books in the public domain.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1679

The Open Systems Interconnection Referencing Model

Layer 7: The Application Layer This layer is the interface between the user and the network. The layer "transforms the data from the session layer to provide a standard interface for the application layer and [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1508

Nanotechnology in Human and Animal Health

Nano-medical tools and instruments facilitate study and observation of the functioning and metabolism of minute living cells such as proteins and hormones. Such knowledge can contribute to the development of new medical approaches in the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 564

Technology: Being Digital

This has been achieved by the fact that the world is a global village thus transmitting information does not have to rely on time and money. A click of the mouse is enough to have [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 716

Technologically Advanced Baseball Bats Research

The purpose of this research study is to investigate the advantages of using technologically advanced, or high priced, baseball bats in the Little League Baseball.
  • Subjects: Engineering
  • Pages: 2
  • Words: 575

The Rationale of the Cryonics

The Egyptians hence tried to make sure that they preserved a person very close to immortality and this is the reason why they when to greater extent of building the pyramids and doing the mummification.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 2017

Hardcopies Versus Softcopies

Today it is possible to have the electronic versions of the physical reading materials such as the encyclopaedias, dictionaries or bibles, which are easy to access at any time or location as opposed to carrying [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1119

Rescue Operation for Trapped Chilean Miners

This helped the rescuers in knowing the conditions inside the mine, more importantly; the holes were used to send food, water and medication to the miners.
  • 1
  • Subjects: Engineering
  • Pages: 4
  • Words: 543

Effects of Word Processors on Writing Ability

Using word processors, I can retrieve pieces of writing written in the past and try to improve on them. Sometimes I am not able to spot my mistakes in writing when using word processors.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 568

Online Persona: Ethical Implications

For the purposes of this essay, let us accept that a fabricated online persona remains ethically unsound, as we consider the social harm this causes, namely, the perpetuation of crippling social stigmas, and the erosion [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 821

AECbytes “Building the Future”

The author commends the continued innovation and the production of new things and new ways of handling the tasks of building design, construction, and collaboration, despite the challenging economics times.
  • Subjects: Engineering
  • Pages: 2
  • Words: 702

Biometric Technologies and Security

To achieve this, the assumptions that biometrics facilitate the invasion of privacy, may have dangerous health effects on the users, are discriminatory and are unnecessary expenses need to be laid to rest if the full [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2830

Dangers of Texting while Driving

The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • 5
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1267

Best Methods for Oil Clean Ups

The reports cover issues ranging from causes of oil spills to the effects of oil spills on the environment. Thus the main sources which lead to the release of oil into the ocean are related [...]
  • Subjects: Engineering
  • Pages: 11
  • Words: 3033

Hunter Institute of TAFE

Project description: the main purpose of this project is to open a new computer lab at Hunter Institute of TAFE. The necessity of this project can be explained by the fact that many computers in [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1366

The iPhone’s Main Features and Productivity

The sophistication of the iPhone is reiterated by Jacko who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 728

The Efficiency Resulting From Utilizing Information Systems

When reporting and querying technology is incorporated in most databases, it allows employees to easily generate reports and interpret the same for execution of plans in the organization. To embrace information technology fully and benefit [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1377

Computer Communication Network in Medical Schools

Most medical schools have made it compulsory for any reporting student to have a computer and this point the place of computer communication network in medical schools now and in the future.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1743

What Are the Causes of the Increased Lack of Internet Privacy?

Although every individual has the right to accuse the government and internet service providing companies over their failure to protect their customers' privacy, individuals should recognize, they have a crucial duty to play as far [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 712

Relational Database Systems

This is a business report, personally addressed to the manager of the Easy Drive School of Motoring explaining why and how a relational database system will address the problems of the organization.
  • Subjects: Data
  • Pages: 6
  • Words: 1702

Impact of the Internet on Information Systems Ethics

Privacy of information involves ability to confine the confidential personal information in a specified domain area. The architecture of the internet is meant to enhance sharing of information and not to conceal or defend its [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 851

Fitness and Performance in Aviation

The physical fitness and vigorous health of aviation workers are critical aspects in their performance, in aviation, because of the nature of some of their jobs that may be physically demanding.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2183

The Policies and Documentation: IPv4 vs. IPv6

Ipv4 addresses are supposed to be run out in the next two years that is why it's alternative which is Ipv6 is needed for the proper arrangement of the messages.
  • Subjects: Internet
  • Pages: 7
  • Words: 1880

Sample of Chart or Graph

While the stacked bar chart is very helpful in understanding the overall votes by respondents as well how many considered each focus area as critical or high, it does not give an idea of the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 559

The Role of Intranet in Health and Human Services Organization

Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. Individuals ought to be empowered to control the collection, use, and distribution [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 982

Data Warehoisung: Composite Bicycle Frame

The production of the composite bicycle frame that combines a metal spine in the midst of a fibre reinforced plastics have been in the market for quite a while but the materials keep changing to [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 675

Computer Fraud and Contracting

The law does not provide the consumers with measures to enforcing the online contracts because the argument is that, it is impossible to tell the intention and the consent of the consumer when they signed [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1836

Security Requirements Engineering

There are a number of approaches to the study of security requirements engineering, for instance, the elicitation method is likely to provide a framework for ordinary functional requirements which are more often than not oriented [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1181

Electronic Range Finder Technology Application

In the early 1960s, the devices were actively fitted in the most expensive cameras. Although more sophisticated auto-focus devices later outnumbered the range finders, some of these cameras are still in use today.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 546

Rogue Security Software: Digital Crime Scenario

This rogue security software can appear on a website in the form of an advertisement which in most of the time informs that internet user of their win for being a visitor to the website [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

The differences between e-readers and tablets

The spread of the innovative technologies pushes some people on the idea that books are going to disappear. First, the ancient books as the reminder of human history are going to remain.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 583

Organizational Vulnerability Assessment

The man-in-the-middle attack is also known as integrity attack since the actions of the system operators are based on the integrity of the data.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1324

Recommendation for a web server software package

When the software offers a wide range of product designs for the clients, they may feel that they are delayed from accessing the services. This is not convenient to clients who are particular in the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 543

Phishing threats and counter measures

In this case, the attacker sends emails to the bank customers promoting them to change their account information such as the password and username.
  • Subjects: Internet
  • Pages: 2
  • Words: 574

Société Générale Bank: Effective Security Controls

The management of the bank revealed that Kerviel exploited every loophole to hack the computer operations at the bank. It is also important to list the potential risks because it enables the security personnel to [...]
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1619

Evolution of Power Production

The goal of this paper is to review the evolution of power production as the basis for considering the future options of power for the planet.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2534

Information System and Modern Business

For instance, the Enterprise Resource Planning System is currently used to address business challenges such as linking strategic objectives of the organization and performance.
  • Subjects: Data
  • Pages: 3
  • Words: 821

Sephora: The Offers of Sephora.ca

The main particular feature of the campaigns is the fact that the offers are almost not available in stores, and the products are presented in the limited series.
  • Subjects: Internet
  • Pages: 5
  • Words: 1396

Digitally Based Information Age

The new environment has influenced people's health and the way people treat information. In the first place, it is necessary to consider people's health or rather the way the digital world affects humans.
  • Subjects: Internet
  • Pages: 2
  • Words: 562

Hydraulic Engineering

One of the disadvantages with using canals for transportation was that the boats were easily damaged while on the double slipways.
  • Subjects: Engineering
  • Pages: 2
  • Words: 550

On Becoming a Cell Phone Junkie

Although I must admit that cell phones have earned their merits as essential tools of existence in the new millennium, I do not subscribe to the idea that my life should depend on it.
  • Subjects: Phones
  • Pages: 2
  • Words: 604

Applying Cloud Computing in the Corporate Area

In the software-as-a-service, the retailerprovides the software product,the hardware infrastructure and networks with the user via a front-end portal. In conclusion, software as a service cloud computing is not going to dominate the next several [...]
  • Subjects: Cloud Computing
  • Pages: 5
  • Words: 1276

Use Software as a service

The software industry is a dynamic industry which has undergone several changes and one of the current trends in the industry is cloud computing.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 566

Enterprise Architecture Center

According to Hayles,the main objective of EA is to enhance the performance of an organization by reducing the instances of faults in the tasks that are performed by their employees.
  • Subjects: Data
  • Pages: 5
  • Words: 1353

Open Source Systems: the Risks and Ethical Issues

In this paper, the risks and ethical issues associated with open-source systems are outlined and additionally, a one-page audit plan for an open-source system for Global Airline Co.prepared in order to boost the company's confidence [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1261

Are Hybrid Cars Worth It?

First and foremost what must be understood is that hybrid vehicles on average cost more than their primarily gasoline based counterparts, while it may be true that the hybrid car industry focuses on the fact [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2008

Nanotechnology and its Perspectives in Connecticut

According to a report by Office for Workforce Competitiveness of Connecticut, efforts to advance nanotechnology in Connecticut began in 2003 with a detailed assessment of the benefits of nanosciences to the state and the state's [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 629

Technology Help – American Become More Knowledgeable

Despite the fact that technology came to the rescue of several areas in the society, youths, especially those in the universities and high schools, rely heavily on the technology.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1173

The Role of Design in the Website Performance

The main purpose of the work is to assess the key design features to attract the targeted audiences and improve the performance of the website for an organization established in an area viewed as being [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 762

Information Networking as Technology

Mozilla Firefox, Opera mini, and Seamonkey are the three web browsers covered in this project paper. Opera mini browser is by far better than Mozilla Firefox is; Opera mini is very efficient in terms of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 591

Computer Crimes Defense and Prevention

Naval Academy and he said that the security of the United States is threatened by a new breed of adversaries that has found a way to harass and terrorize America.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 541

The Best Social Networking Tool for Me

Rating of each alternative It is better to explore each tool, analyze the benefits of each tool before making a decision. Nevertheless, a good decision process will always lead to the best social networking tool.
  • Subjects: Internet
  • Pages: 3
  • Words: 757

Discourse of the Information Society

World Wide Web as a cybernetic phenomenon The World Wide Web, the graphical-interface Web browser, and the search engine tools have really shaped the face and the capabilities of the internet we enjoy to-date.
  • Subjects: Internet
  • Pages: 6
  • Words: 1595

Digital Technology – The Use of the Internet

Looking back, in retrospect, the computer that I first encountered was incomparable to the computers of today. The ultimate advancement in computer technology, for me, was the mainstream use of the internet.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Database Application at Amazon

A row contains data of one or more columns according to the design of a database; it describes a single instance of an entity.
  • 5
  • Subjects: Data
  • Pages: 4
  • Words: 419

Case Project Information Security

An even bigger risk that the virus poses is that it uses the host machine to perpetrate denial of service attacks over the internet.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 786

Club IT’s Data Management

The central issue inherent in data management, particularly in the case of Club IT, is that the data will be coming in from multiple sources and rapidly.
  • Subjects: Data
  • Pages: 4
  • Words: 384

Security System: Information and Property within Business

Information security system Business information may include but not limited to information on employees, consumers, commodities offered, financial status of the business, business policies and also future plans of the business hence such information should [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 979

Rubber, Rise of an Essential Commodity

Rubber was introduced in Europe in 1492 and used for the manufacture of erasers and balls. Furthermore, there were controversies that it melted in the sun, it also had a bad smell and became brittle [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 419

The Bates Numbering System of Document Branding

In summary, it can be said that Bates numbering is a basic system of document organization operating on the principle of clearly embedding documents and images with unique digital or manual identifiers.
  • Subjects: Data
  • Pages: 2
  • Words: 544

Security Threats in Social Sites

Contrasting speculations that the sites lack security or privacy, the involved firms recognize benefits of investing in Information Security, thus the need to understanding methodologies behind risks experienced by the clients.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 622

Data Analysis and Maintenance

The hypotheses of the research have been developed with the operationalization of the variables done. The other personal data such as the age, weight, height and personal characteristics of the employees shall be obtained from [...]
  • Subjects: Data
  • Pages: 2
  • Words: 712