Tech & Engineering Essay Examples and Topics. Page 48

5,909 samples

Video Games Impact on Peoples Lives

These games have had a great influence in the minds of people, especially the children who have stopped playing the usual games on the fields to sticking on the computer and television screens playing video [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3703

The Internet Is a Powerful Force

In Nicholas Carr's book, What the internet is doing to our brains, he describes the impact the internet has brought to our capacity to concentrate and think deeply.
  • Subjects: Internet
  • Pages: 4
  • Words: 1142

Tablet PCs Popularity and Application

The main reason why people prefer the tablet PCs is the ease of mobility and operability compared to the laptops and the desktops.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2948

Ethical Issues in Network Regulation

In the case of network regulations, it is better to concentrate on two ethical theories: the deontological theory and the rights theory.
  • Subjects: Internet
  • Pages: 5
  • Words: 1358

The Impact of Technology on Global Business

The growth of the internet in the period between the early 1990s and today has seen the area of network for businesses spread to cover the entire world.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 797

Privacy and Safety on the Internet

5
The user should have knowledge of how his or her information is being collected, the purpose of collection and how the party is going to use the information. The final security measure to ensure safety [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1126

Tips on Project Management

Designing and understanding the processes to be used in the management of the project. This is important since wide research is required to enhance the level of understanding on the processes to be followed.
  • Subjects: Project Management
  • Pages: 2
  • Words: 561

Web linked Power Measuring Device Project Plan

The tasks were grouped according to the work package as follows: Team and project development Project design Construction Project assembly Marketing The internet linked energy measuring device was projected to cost $250.
  • Subjects: Project Management
  • Pages: 8
  • Words: 2126

Can Cell Phones Close Digital Divide?

On the other hand, there has been concern as to whether, radiofrequency energy from cell phones pose a cancer risk to cell phone users.
  • Subjects: Phones
  • Pages: 6
  • Words: 1970

Multitasking: BlackBerry v. Radio

It is important to disconnect the brain from the flow of the information for some time to give it a break.
  • Subjects: Internet
  • Pages: 3
  • Words: 1001

Blackberry Messenger and the Older People

As a more sensitized user of Blackberry messenger, I will use this paper to draw a comparison between my own habits with the Blackberry Messenger and the older people.
  • Subjects: Phones
  • Pages: 2
  • Words: 440

Aspects of Internet Censorship by the Government

When one try to access a website the uniform resource locator is checked if it consists of the restricting keyword, if the keyword is found in the URL the site become unavailable.
  • Subjects: Internet
  • Pages: 8
  • Words: 2145

Use of Technology for GE

Introduction - Under this section, the importance of technology in the efficient running of an organization is explored Discussion -This section examines the use of information technology by GE and how some of the policies [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1057

Recommendation for a relational database

The worst may happen in the case of loss of vital information of the business. This helps the users of the relational database system to visualize the information which is stored in the system.
  • Subjects: Data
  • Pages: 6
  • Words: 1623

The Evolution of the Personal Computer and the Internet

Due to the complexity of the subject matter it is necessary to digress once more and discuss briefly the history of the World-Wide-Web so that there is a clearer understanding of what it is all [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2435

An Innovation of Solar Charged Laptops

In addition, the general plan of the competitor in a bid to control the market is a vital toolkit which this company can use to estimate the competitive edge of the market.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4239

Designated Person Ashore: Ensuring Safety and Coordination

These factors are observed from several perspective of maritime work: the factor of fatigue among bridge team members that is based on human health conditions and working abilities; the factor of marine environment and human [...]
  • Subjects: Accidents & Protection
  • Pages: 11
  • Words: 2969

Relaxing Travel: Changes in the Airline Industry

From discussion in this report, on the changes in the travel industry, it will become clear that the travel agency has to work hard and re-invent self or be faced out of the industry.
  • Subjects: Aviation
  • Pages: 3
  • Words: 995

Soft System and Social Technical Approaches

The design of the information system should be able to address the challenges such as the ethical issues that have become a major headache to the researchers in the information and technology field.
  • Subjects: Project Management
  • Pages: 19
  • Words: 2989

Water Regional Police Services Project Implementation

The disputes arising in the CIMS project have put the project in jeopardy as the project had stopped and upon resuming, the disputes reignited forcing these disputes to be resolved at the level of the [...]
  • Subjects: Project Management
  • Pages: 5
  • Words: 1545

Excess Use of Technology and Motor Development

Research Question The purpose of this research proposal is to ascertain the relationship between the ability of the sense organs to process information and the excessive use of technology.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1254

Constituents of an Information System

During the staging of the data, a projector can be used to highlight the data hence it is considered as a constituent of the system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 545

Code switching and millennial generation

Although the Millennial generation has learnt to code switch between the two versions of English depending on audience, it is unquestionable that technologically- inflected version of English is affecting standard written English.
  • Subjects: Internet
  • Pages: 2
  • Words: 564

Lockhart River Plane Crash

It is also clear that the radar squad did not continuously observe the position of the plane; furthermore, it was fathomed minutes later that the plane was absent Systems and Methods The cause of the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2761

Description of Global Positioning System Device

Image 1 shows the positions of the various satellites that constitute the GPS. It is done to establish satellite clock and orbits profiles in order to update the navigational information of individual satellite.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Technology Siri for Submission

5
Voice recognition and generation, whether in the form of Siri or some other software, is a welcome and useful part of users' lives now.
  • Subjects: AI
  • Pages: 2
  • Words: 614

Drone Technology and the Future

The author focuses on individuals whose level of success goes beyond the imagination of most people and challenges the reader to analyze the interplay of factors such as family, culture and friendships in influencing the [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 825

How a Magnetic Train Works

Due to his reputation, he is a member of both the Japan Physics Society and the Cryogenic Engineering Association. Due to the presence of the static magnetic field and the eddy currents, a powerful force [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 840

The information Divide (NBN)

The purpose of this paper is to discuss the state of internet connection in Australia after the implementation of the NBN.
  • Subjects: Internet
  • Pages: 4
  • Words: 1099

The best phone in the year 2013

Despite the stiff competition from other models such as the iPhone 5 and Samsung galaxy S4, the HTC-One Smartphone is ranked as one of the best Smartphones in the market.
  • Subjects: Phones
  • Pages: 4
  • Words: 1102

Standardized Configurations across the Network

As such, this report will address the configuration issues which pertain to the various elements of the network. The IP address to be used in this case will reduce chances of overlapping or duplicating the [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 918

Commercial Uses of Data Mining

Data mining process entails the use of large relational database to identify the correlation that exists in a given data. The principal role of the applications is to sift the data to identify correlations.
  • Subjects: Data
  • Pages: 4
  • Words: 1172

Nanotechnology: “Cell Repairing Nanorobots”

The structure of nanorobots and body cell the body cell has a nucleus that is considered as the largest organelle. The main function of a nuclear is the storage of genetic data of a person.
  • Subjects: Robotics
  • Pages: 3
  • Words: 724

Process Description: 3D Printing

The material is the string-like strand of plastic coiled in the back of the printer. In turn, the movement of the print head is directed by the 3D file sent to the printer.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 539

Instapaper Program Features

Ways a teacher can use this tool to support learning Teachers can save the course materials on their Instapaper accounts, and share them with the students who can then access them from anywhere.
  • Subjects: Applications
  • Pages: 4
  • Words: 1173

Advantages and Disadvantages of Online Dating Essay

3.6
Advantages Unlike offline dating, online dating allows the user to interact with millions of people without having to travel. Similarly, with the use of online dating some people have been able to lie about their [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1449

Cyber Security in Private and Public Sectors

The US has the Health Insurance Portability and Accountability Act that ensures that patients' data remain accessible only to the authorized segment of the staff.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 826

Evaluation of Devices Used To Enhance Texts

Dehnart argues that the plagiarism checker embraces an odd way of doing business by announcing the crime and leaving the recipient of the report to analysis whether the outcome is justified or not.
  • Subjects: Applications
  • Pages: 3
  • Words: 806

Computers in the Classroom: Pros and Cons

Teachers will need to be able to teach kids how to think critically and apply the information that is available to them in solving problems.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 928

Print Your Gun at Home

Modern researchers and public safety professionals agree that, coupled with the enormous information-disseminating power of the Internet, 3-D printers have the potential to turn gun manufacturing into a home-based industry, and banning 3-D-printed guns would [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1650

Information Technology Acts

It also covers the use of computers to commit crimes related to illegal access or use of computers of financial institutions or the federal government.
  • Subjects: Internet
  • Pages: 3
  • Words: 910

Information System

Office automation systems in this type of information system, tools or electronics improve on the efficiency of the employees and reduce the amount of work in an organisations office.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 660

Americans and Digital Knowledge

With the extinction of the old creative generation, the US is yet to face the worst of intellectual disability. In addition, due to 'copy pasting' of class work from the internet or fellow students, the [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1110

Applications of Intelligent Agents

Bots may also be used in tasks that require very high speeds that cannot be achieved by humans, or in situations where the emulation of human activity is needed, for instance, a company can use [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 541

Computer Cookies: What Are They and How Do They Work

Data stored on server machine without the help of the cookies can be disastrous because it can be a near impossibility to retrieve specific user information without having to login each time the user visits [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 556

Optus Solutions: Facebook as a Communication Medium

This information was gathered and documented for use in the report to determine if the company was using the right channels and media of communication to reach existing and potential new customers to the company.
  • Subjects: Internet
  • Pages: 11
  • Words: 2962

Aeronautics industry of Canada

The increase in growth and development of the aviation industry in Canada is attributed to the aeronautic research but in lower scale.
  • Subjects: Aviation
  • Pages: 3
  • Words: 783

Information systems: safety of wireless networks

This paper provides an analysis case study in Australia concerning the security issues during the deployment of wireless networks for organizations and overview of the effect of "war driving" and 'war chalking" on the uptake [...]
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1880

The Mobile Phone as an Electronic Wallet

Based on this it is possible to conclude that the penetration of mobile phones within the Abu Dhabi area is very widespread given that it is the largest of the emirates.
  • Subjects: Phones
  • Pages: 6
  • Words: 1772

Organizational Management and Experiential Computing

Without experiential computing, humans would view the world in a symbolic form; but relating the world with human experience gives a deeper meaning to the relationship because the world is part of life and humans [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1364

Business Intelligence and Data Warehousing System

The name business intelligence is a name that was formed in the mid 1950s to describe the act of changing un-grouped data from a company's or an organization's contrasting functional data into a common data [...]
  • Subjects: Data
  • Pages: 9
  • Words: 2636

Software Solutions in Web Design

Joomla is reportedly among the most popular tools in web design and is based on the PHP and MySQL technologies. Interspire is a proprietary shopping cart development solution that is rich in many of the [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 569

The Go-Phone by AT&T Company

This then results in a long process of verification where the representative asks the caller to provide some form of verification on the account aside from the pass code which can consist of either the [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2990

Evaluating Security Software

Some of the antispyware software examples include; MacAfee internet security and Kaspersky internet security. The antispyware software examples are Webroot secure anywhere antivirus and stozilla.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 533

GPS Technology Pros and Cons

GPS Navigation technology Navigation technology uses a GPS receiver and internal road database, which provides the user with a clear view of the surrounding in real time.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 632

Fibre Reinforced Plastic

Secondly, it is important to consider the change in the stiffness of the member to be strengthened. This requires the use of FRP composite, which is bonded to the tension face.
  • Subjects: Engineering
  • Pages: 2
  • Words: 370

Technological Advances in Education

1
One of the biggest advantages that technology has brought in the field of education is global learning. It is a fact that technology has brought about massive improvement in the field of education.
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2999

Where is writing taking us?

The big question of discussion at this particular juncture is evaluation and examination of the impact of the new technologies and how they affect the core purpose of writing. Important to note and mention is [...]
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2586

Internal Combustion Engine

It is responsible for the transfer of power produced by the exploding gases in the combustion chamber, to the crankshaft through a connecting rod that is usually attached to it.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1868

Ethical Debate on our Information Privacy

However, with the high reliance on the internet technology as the superior channel of communication, governance, business process and information storage, a number of questions have emerged regarding the safety of the internet as a [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2196

A Discussion on the Acceptability of Data Mining

Today, more than ever before, individuals, organizations and governments have access to seemingly endless amounts of data that has been stored electronically on the World Wide Web and the Internet, and thus it makes much [...]
  • Subjects: Data
  • Pages: 2
  • Words: 608

The Technology’s Influence on Lives

In this essay, I will demonstrate the influence of technology in our lives first by looking at the current phenomenon of phone addiction and proceed to show its continued significance in the developing field of [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 810

Global Finance Inc.: Assets Risks and Mitigation

In addition, the report also addresses the CEO's concerns about the mobility security and design for secure mobile computing for portable devices with regard to authentication technologies and protection of data.
  • Subjects: Cyber Security
  • Pages: 20
  • Words: 5340

The collapse of the twin towers

Most reports have so far indicated that the main cause of the collapse of the buildings, were the fires that erupted following the explosion, upon impact of the airplanes.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 549

Six-Sigma Implementation in Information Technology

The six phases assist the management to avoid overlooking the factors that affect the quality of target aspects. Software opportunities and defects are identified in order to allow for the calculation of six-sigma performance indicators.
  • Subjects: Project Management
  • Pages: 7
  • Words: 1944

Design of ICT For Disaster Management Systems

The design of the system was based on software functionality deemed critical based on extensive knowledge, experience, and tacit knowledge of the Office of Emergency Preparedness. The functionality of the system is critical in enabling [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 531

ICT for Disaster Management Systems

The purpose of this research is to establish the conditions for successful design of ICT for disaster management systems in ICT and emergency services.
  • Subjects: Applications
  • Pages: 6
  • Words: 1642

How Infographics Make it Easier to Receive Information

Some of the limitations to the use of images in infographics include the visual impairment of the intended subjects, lack of clarity in the presentation of the message, and existing personal viewing preferences such as [...]
  • Subjects: Computer Science
  • Pages: 19
  • Words: 5180

ICT Disaster Management Systems

The role of ICT in the management of disaster is enormous in the current world. The events of the beginning of the 21st century has witnessed an unprecedented capacity of ICT to solve the emerging [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 526

Overview of the Internet Age

Although the young tech-savvy generation has been closely associated with the fast growth of digital crime through the internet, it is understood that individuals who are above 35 years account for nearly 45% of all [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 598

United Airlines Flight 173 Accident

Although the problem with landing gears was determined and overcome successfully, the crewmembers were inattentive to the fuel state, and the error resulted in the accident.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 546

Risking Life to Take Footage: Article Analysis

The article goes through the event as taken in the footage. In the end, the article reaches a consensus on the issue by noting that over time, it is upon survivors to decide when to [...]
  • Subjects: Phones
  • Pages: 3
  • Words: 819

Open Systems Interconnection model

The layers are arranged in a stratum whereby layer 7 is in the top and the bottom layer is 1. This layer is also responsible in the delimitation of the network type and the packet [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 518

Network Topology Design Process

The network design used the allocated company address space of 150.10.0. PART OF NETWORK NETWORK USED New York subnet 150.10.0.
  • Subjects: Internet
  • Pages: 5
  • Words: 962

Social Implications of Computer Technology: Cybercrimes

In reading the discussion above it becomes clear that the term cybercrime actually refers to computer-related crime; however, some consider computer crime to be a subdivision of cybercrime that warrants its own definition and understanding.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 547

Cybersecurity in the Energy Industry

5
In this regard, in the event that a cyber attack is launched against the energy sector, it is bound to have far reaching consequences.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 580

Information Technology Project Implementation Failures

A taskforce is appointed by the organization to be at the forefront of the system. Therefore, it is necessary for the organization to be orderly by clearly highlighting the extent and expectations of the technology, [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 661

Tablet Computer Technology

It weighs less than 500g and operates on the technology of AMOLED display with a resolution of WVGA 800 480 and a detachable input pen.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 540

Adoption of Cloud Computing in the Company

The internet is the major method of accessing the external network. The rapid pace of innovation on cloud computing is expected to continue in the near future.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 549

History of the Cellular Technology

With the developments in the cellular technology, electrical engineering has been affected by the changes and development of this technology. Ever since the introduction of the first mobile phones in the 1980s, electrical engineering experts [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 563

BlackBerry: Customer Behavior Analysis

Also, Blackberry has cut a market niche as a business device, enabling the company to get hold of the corporate users and distinguishing itself from the rest of the market.[1] Consumer behavior attempts to evaluate [...]
  • Subjects: Phones
  • Pages: 5
  • Words: 1378

Ethics in Computer Hacking

Hacking by no means follows ethics; the infiltration is to the benefit of hacker and loss of users of computer system, network or website.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 655

Security Technology Evaluation of Bank Solutions

However, through the utilization of the power of performance efficiency of decentralized systems and the possibility of elimination of distance through virtual connectivity of users, the centralized solution is the best choice for the data [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1485

Computer Forensics and Investigations

It is crucial in the investigation of crimes that are related to the manipulation of computer systems. For digital evidence to be admissible in court, investigations should be conducted in a manner that adopts the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 798

Preparing a Computer Forensics Investigation Plan

However, if the information is thought to be contained in the permanent storage, then a computer has to be shut down before transporting it to a laboratory for forensic analysis. The first step in the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Basic Operations of Computer Forensic Laboratories

All computer forensic laboratories in the US have to adhere to the national standards before they could be certified. Standard computer forensic equipment is used to support standard procedures and conditions in the laboratories.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 834

The Relational Model for Database Management

3
Relational Database Management systems have powerful applications that can analyze and manipulate data in the system to serve the needs of the intended users.
  • Subjects: Data
  • Pages: 4
  • Words: 1118

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 780

Unified Modeling Language (UML)

UML was created to be used in modeling of software intensive systems by use of diagrammatic models making it easy to introduce more objects to an existing project.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 616

Forestry and paper-product industries

Some of the challenges occur due to the relationship that exists between the industries and electrical engineering sector in the country.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2281

Cloud compounding impact on businesses

Efficient management of the virtualization process is possible through the integration of systems that enhance stability and security of the cloud. The main hurdle for both consumers and businesses in adopting cloud compounding are lack [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 864

Technology of Human Resources and the Human Systems

The invention of printing, the slide ruler, the mechanical calculator, analog devices as well as algorisms between 0 CE and 1700s all culminated to the development of the computer by the start of the 1800s.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1355