Tech & Engineering Essay Examples and Topics. Page 49

5,909 samples

Children’s Game Analysis Project: The Sims

Being aimed at showing the daily activities of the family, the game is great in considering the roles of the family members and the distinguishing those in accordance with the gender roles.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 563

Hybrid Engines vs. Standard Engine

While it is true that the engines of the last decade are more efficient that the standard engines of the former decades, hybrid engines result in even greater fuel efficiency.
  • Subjects: Engineering
  • Pages: 10
  • Words: 1943

Non Experts: Artificial Intelligence

Regardless of speed and the complexity of mathematical problems that they can solve, all that they do is to accept some input and generate desired output. This system is akin to that found in a [...]
  • Subjects: AI
  • Pages: 14
  • Words: 3773

The State of Cloning in 2062

One of the concerns of those who are against cloning is that it is inhuman to collect, store and freeze the surplus embryos in order to use them later.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 840

Effects of Surveillance Technology on Privacy

The presence of surveillance devices and gadgets in public gathering places limits the use of the public places, as many people will tend to avoid such places in fear of exposing their privacy to their [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1660

Product Fetch: SprintMusic MP3 Player

5
Therefore, this product has triple features it is eco-friendly as it uses a unique form of energy i.e.kinetic energy, it provides the distance ran and speed, and allows the user to set the desired speed [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 859

“Capturing” in Culture and Beyond

The existence of the constant technological improvements in Europe as early as the thirteenth century validates Friedel's thesis on the existence of "a culture of improvement" in the western technology.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1099

Internet Tools for Dirt Bikes

The level of the technology that a company has impacts the profitability and the going concern of the business. Expenses related to the internal and external communication of the organization should be reviewed from time [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1126

Cancer Treatment by Nanotechnology

Nanotechnology will offer several advantages to the diagnosis, treatment and care of cancer patients in Saudi Arabia. Since nanotechnology is more efficient and fast in treating cancer, the future of cancer treatment in Saudi Arabia [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1628

High Power DVDs: Product Analysis

The High Power Subwoofer will always have you daring to move closer to the beat and the vibration mode is enough to turn your house into a club.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 662

Loud and Clear Mobile Communications

Virgin mobile Australia This is the youngest of the other service providers and is ranked fourth in the Australian telecommunication industry.
  • Subjects: Phones
  • Pages: 10
  • Words: 2760

Is Using Cell Phone Dangerous?

Research has further shown that "the side of the brain that is exposed to the ionizing radiations from the cell phone metabolizes more glucose than other parts that are not exposed to it".
  • Subjects: Phones
  • Pages: 4
  • Words: 1274

Utilitarianism Theory Application in Duelling Dilemma

The claimants in this scenario consist of the government of the PRC, those protesting against the censorship and the general public who might not be aware of such attempts by the government.
  • Subjects: Internet
  • Pages: 2
  • Words: 620

Nanotechnology Risk in a Nanogenerator

In the context of this essay zinc oxide is used in nanogenerator which acts as a transducer in the conversion of mechanical energy to electrical energy.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1367

Biotechnology Development and the U.S. Economic Hegemony

Biotechnology is understood by many to be one of the most promising areas of technological development and among the most probable to bring significant economic and societal gains to the United States in the 21st [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2014

Managing Pilot Fatigue

This is so because the duties performed by the pilot in the cockpit require a lot of vigilance, care as well as mental and physical well being.
  • Subjects: Aviation
  • Pages: 3
  • Words: 779

Subsidies in the Airline

A significant occurrence in the history of US commercial airlines was the enactment of the deregulation Act which removed most of the federal government's regulations imposed on the industry.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1652

Computer Networks and Security

The node and the server share the private or secret key known to the KDC and to the nodes and servers.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2659

Web Privacy – Reliance on Internet

Internet regulation imposes strict policies regarding the nature of the data collected, the specific purpose that does not serve to violate the interest of the users and using the data without the knowledge of the [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1665

Regional Airlines: SkyWest Airlines

In 1977, the SkyWest Airlines made agreements with American Airlines, United Airlines, Texas International and Hughes, and this allowed check-in and baggage transfers between the airlines for the passengers.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2205

Internet Censorship in Saudi Arabia

1
The censorship is charged to the ISU, which, manage the high-speed data links connecting the country to the rest of the world.
  • Subjects: Internet
  • Pages: 5
  • Words: 1471

Digital Technology in Modern Society

From the above analysis, it is more evident that digital technology has a wide range of effects to our culture and to the young generation.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1091

The Verichip as Medical Chip

In a way the advent of this particular type of technology could be thought of as a medical milestone, the future of medicine so to speak wherein doctors, EMTs, nurses and various other medical personnel [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 837

The Computer Microchip Industry

For instance, the company can decide to focus on durability and by doing so, the company will have a competitive advantage in the market.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 938

Benefits of the Internet

One of the uniqueness of using internet to communicate is that, there are no barriers, as people can connect easily at any place and all the time.
  • Subjects: Internet
  • Pages: 4
  • Words: 1123

Wireless Technologies

In a bid to improve technology in the building, it is important to implement the wireless security devices. The cameras are also easy to hack into since the level of their security system is low.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 554

Characteristics for Website Evaluation

The website has a clear purpose, and the purpose is to provide the users with information concerning weather conditions. The website is user-friendly it has guidelines and navigation tool that are appropriate and consistent and [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 549

Challenges of the Huge Data in the Day-to-Day Transactions

This paper addresses some of the challenges the huge data may pose in the day-to-day transactions."RFID protocol is a communication protocol that uses radio waves to enable the transfer of data from an electronic tag [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1268

Website Review: cio.com

They are carefully designed with few clicks to the main information the main purpose of the website is to provide information for CIO's and other IT professionals.
  • Subjects: Internet
  • Pages: 2
  • Words: 652

E-mail Spam: What it is and how it works

They also throw back the argument of accessing addresses back to recipients and claim that since it is in a public directory, then spammers should not be blamed for accessing and using the addresses.
  • Subjects: Internet
  • Pages: 3
  • Words: 829

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

Wind Turbines Manufacturers Overview

Sinovel has been a leader of the Chinese market in producing innovative turbine equipments in the sense that; it is the first to introduce an advanced wind turbine in the world, it was the first [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2729

PC Models Comparative Analysis

Design features are also quite strong in two of the computers; the 27inch Apple iMac as well as the HP Touchsmart.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1184

The Engineering Challenges of the 21st Century

The experiences in terms of the effects and the response measures used in the Chernobyl nuclear power plant accident can be considered by Japan to help it address the consequences of the Fukushima nuclear disaster.
  • Subjects: Engineering
  • Pages: 2
  • Words: 1958

Use of Simulation in Military

The first type of simulation used in the military is live simulation. The second application of simulation in the military is the use of virtual simulation.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

Why Developed Countries Should Not Produce Nuclear Power

Though nuclear power generation is slowly gaining prominence in the world, especially since the world is seeking more sources of green energy, nuclear energy is a unique source of energy because it bears unique characteristics [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1415

The Major Failure of the Apollo 13

The failure of the Apollo 13 was a big blow to the man in his attempt to explore the surface of the moon.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1690

Normative Ethics and the Right to Privacy

Recent advances in technologies have prompted a new consideration of e-mail, use of e-mail, and its relation to ethics. From the deontological perspective, the court's decision to give Ellsworth's parents legal access to his e-mail [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 892

Preparation of Correspondences by Typewriters and Computers

On the other hand, the computer relies on software program to generate the words encoded by the computer user. The typewriter user has to press the keys of the typewriter with more force compared to [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 891

Insights on Green Automotive Development

Basing judgment on affordability and availability of the EVs, the tax incentives and exemptions offered by some government agencies to purchasers due to the high initial costs seems to be an unsustainable venture in emerging [...]
  • Subjects: Engineering
  • Pages: 5
  • Words: 1414

Impact of Technology on Education

The history shows that technological progress and modernity are closely interconnected, arranging a tandem for the development of more sophisticated techniques for the cognition of the surrounding world.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1715

Information Technology and Low-Cost Airlines

This is made possible by many factors but it can be said that the most significant component is the use of information technology specifically the utilization of the Intranet and Extranet networking system.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1625

Electronic Books for Easter Washington University

For example, the electronic text center based at the University of Virginia is reported as the first institution to allow the downloading of classic books in the public domain.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1679

The Open Systems Interconnection Referencing Model

Layer 7: The Application Layer This layer is the interface between the user and the network. The layer "transforms the data from the session layer to provide a standard interface for the application layer and [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1508

Application of RFID Technology

The silicon chip in the transporter tag contains object such as the exact place of location, the date of manufacture, the color of the product, the price, or any other relevant information.
  • Subjects: Applications
  • Pages: 5
  • Words: 1595

Nanotechnology in Human and Animal Health

Nano-medical tools and instruments facilitate study and observation of the functioning and metabolism of minute living cells such as proteins and hormones. Such knowledge can contribute to the development of new medical approaches in the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 564

Data Integration and Data Quality

Data quality is one of the protective measures that is highly valued by most companies because the records that are stored in databases can be used to trace events and for the referencing to be [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1565

Technology: Being Digital

This has been achieved by the fact that the world is a global village thus transmitting information does not have to rely on time and money. A click of the mouse is enough to have [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 716

Technologically Advanced Baseball Bats Research

The purpose of this research study is to investigate the advantages of using technologically advanced, or high priced, baseball bats in the Little League Baseball.
  • Subjects: Engineering
  • Pages: 2
  • Words: 575

The Rationale of the Cryonics

The Egyptians hence tried to make sure that they preserved a person very close to immortality and this is the reason why they when to greater extent of building the pyramids and doing the mummification.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 2017

Hardcopies Versus Softcopies

Today it is possible to have the electronic versions of the physical reading materials such as the encyclopaedias, dictionaries or bibles, which are easy to access at any time or location as opposed to carrying [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1119

Rescue Operation for Trapped Chilean Miners

1
This helped the rescuers in knowing the conditions inside the mine, more importantly; the holes were used to send food, water and medication to the miners.
  • Subjects: Engineering
  • Pages: 4
  • Words: 543

Effects of Word Processors on Writing Ability

Using word processors, I can retrieve pieces of writing written in the past and try to improve on them. Sometimes I am not able to spot my mistakes in writing when using word processors.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 568

Online Persona: Ethical Implications

For the purposes of this essay, let us accept that a fabricated online persona remains ethically unsound, as we consider the social harm this causes, namely, the perpetuation of crippling social stigmas, and the erosion [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 821

AECbytes “Building the Future”

The author commends the continued innovation and the production of new things and new ways of handling the tasks of building design, construction, and collaboration, despite the challenging economics times.
  • Subjects: Engineering
  • Pages: 2
  • Words: 702

Biometric Technologies and Security

To achieve this, the assumptions that biometrics facilitate the invasion of privacy, may have dangerous health effects on the users, are discriminatory and are unnecessary expenses need to be laid to rest if the full [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2830

Hunter Institute of TAFE

Project description: the main purpose of this project is to open a new computer lab at Hunter Institute of TAFE. The necessity of this project can be explained by the fact that many computers in [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1366

The iPhone’s Main Features and Productivity

The sophistication of the iPhone is reiterated by Jacko who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 728

Is Technology Neutral?

3.5
Rather than attribute the loss of jobs to adoption of technology, it is more appropriate to blame the loss of jobs on the decision to adopt technology.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 975

The Efficiency Resulting From Utilizing Information Systems

When reporting and querying technology is incorporated in most databases, it allows employees to easily generate reports and interpret the same for execution of plans in the organization. To embrace information technology fully and benefit [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1377

Computer Communication Network in Medical Schools

Most medical schools have made it compulsory for any reporting student to have a computer and this point the place of computer communication network in medical schools now and in the future.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1743

Relational Database Systems

This is a business report, personally addressed to the manager of the Easy Drive School of Motoring explaining why and how a relational database system will address the problems of the organization.
  • Subjects: Data
  • Pages: 6
  • Words: 1702

Fitness and Performance in Aviation

The physical fitness and vigorous health of aviation workers are critical aspects in their performance, in aviation, because of the nature of some of their jobs that may be physically demanding.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2183

The Policies and Documentation: IPv4 vs. IPv6

Ipv4 addresses are supposed to be run out in the next two years that is why it's alternative which is Ipv6 is needed for the proper arrangement of the messages.
  • Subjects: Internet
  • Pages: 7
  • Words: 1880

IT & Networks for Business

The main characteristics of the net generation are, they communicate using voice or data while on the move, they are internet savvy and are always connected either through WAP on the cell phones or Wi-Fi [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 272

The Role of Intranet in Health and Human Services Organization

Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. Individuals ought to be empowered to control the collection, use, and distribution [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 982

Data Warehoisung: Composite Bicycle Frame

The production of the composite bicycle frame that combines a metal spine in the midst of a fibre reinforced plastics have been in the market for quite a while but the materials keep changing to [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 675

Security Requirements Engineering

There are a number of approaches to the study of security requirements engineering, for instance, the elicitation method is likely to provide a framework for ordinary functional requirements which are more often than not oriented [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1181

Electronic Range Finder Technology Application

In the early 1960s, the devices were actively fitted in the most expensive cameras. Although more sophisticated auto-focus devices later outnumbered the range finders, some of these cameras are still in use today.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 546

Rogue Security Software: Digital Crime Scenario

This rogue security software can appear on a website in the form of an advertisement which in most of the time informs that internet user of their win for being a visitor to the website [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

Organizational Vulnerability

The man-in-the-middle attack is also known as integrity attack since the actions of the system operators are based on the integrity of the data.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1324

Recommendation for a web server software package

When the software offers a wide range of product designs for the clients, they may feel that they are delayed from accessing the services. This is not convenient to clients who are particular in the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 543

Phishing threats and counter measures

In this case, the attacker sends emails to the bank customers promoting them to change their account information such as the password and username.
  • Subjects: Internet
  • Pages: 2
  • Words: 574

Société Générale Bank: Effective Security Controls

The management of the bank revealed that Kerviel exploited every loophole to hack the computer operations at the bank. It is also important to list the potential risks because it enables the security personnel to [...]
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1619

Evolution of Power Production

The goal of this paper is to review the evolution of power production as the basis for considering the future options of power for the planet.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2534

Information System and Modern Business

For instance, the Enterprise Resource Planning System is currently used to address business challenges such as linking strategic objectives of the organization and performance.
  • Subjects: Data
  • Pages: 3
  • Words: 821

Sephora: The Offers of Sephora.ca

The main particular feature of the campaigns is the fact that the offers are almost not available in stores, and the products are presented in the limited series.
  • Subjects: Internet
  • Pages: 5
  • Words: 1396

Digitally Based Information Age

The new environment has influenced people's health and the way people treat information. In the first place, it is necessary to consider people's health or rather the way the digital world affects humans.
  • Subjects: Internet
  • Pages: 2
  • Words: 562

Hydraulic Engineering

One of the disadvantages with using canals for transportation was that the boats were easily damaged while on the double slipways.
  • Subjects: Engineering
  • Pages: 2
  • Words: 550

Machinery and Modern Industry

The main thrust of the essay though was not to point out how effective machines are in increasing the means of production, rather, it was the intention of Marx to reveal how the use of [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1737

On Becoming a Cell Phone Junkie

Although I must admit that cell phones have earned their merits as essential tools of existence in the new millennium, I do not subscribe to the idea that my life should depend on it.
  • Subjects: Phones
  • Pages: 2
  • Words: 604

Applying Cloud Computing in the Corporate Area

In the software-as-a-service, the retailerprovides the software product,the hardware infrastructure and networks with the user via a front-end portal. In conclusion, software as a service cloud computing is not going to dominate the next several [...]
  • Subjects: Cloud Computing
  • Pages: 5
  • Words: 1276

Use Software as a service

The software industry is a dynamic industry which has undergone several changes and one of the current trends in the industry is cloud computing.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 566

Enterprise Architecture Center

According to Hayles,the main objective of EA is to enhance the performance of an organization by reducing the instances of faults in the tasks that are performed by their employees.
  • Subjects: Data
  • Pages: 5
  • Words: 1353

Open Source Systems: the Risks and Ethical Issues

In this paper, the risks and ethical issues associated with open-source systems are outlined and additionally, a one-page audit plan for an open-source system for Global Airline Co.prepared in order to boost the company's confidence [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1261