Tech & Engineering Essay Examples and Topics. Page 8

5,366 samples

Use and Benefit of Computer Analysis

The introduction of computers, therefore, has improved the level of service delivery and thus enhances convenience and comfort. Another benefit accruing from the introduction of computers is the ability of the world to manage networks [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 550

Computer Financial Systems and the Labor Market

This paper aims to describe the trend of technological progress, the causes and advantages of developments in computer financial systems, as well as the implications of the transition to digital tools for the labor market.
  • Subjects: AI
  • Pages: 7
  • Words: 2013

The Social Implications of the Blackberry Technology

The uniqueness of the Blackberry in relation to the PDA phones is its ability to deliver e-mails in real-time. The introduction of the blackberry, as it is with new communication technology, has numerous impacts on [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1426

Project Management Development: Importance in Practice

Development can not be attained through the individual's choices and there must be well managed involvement of the organizations and corporations in the process so that the development can progress An important concern for the [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 3063

Windows XP Operating System’s Installation Process

The windows XP installation will continue without interference since you are installing from a full version windows XP CD. The installation will restart the computer and this time it will take you back into the [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 522

Electricity Hazards for Human Body

The main points of this article are to offer the reader with an awareness of the generally dangers of electricity, and to provide some insight into the physiological effects of electrical shock on the human [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1641

British Airways: Information Security Management

The purpose of this paper is to analyze the fundamental principles and practices of information security management within British Airways, considering the requirements for managing digital data.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2041

Runway Incursions and Safety in Aviation

Runway incursions are widely recognized as the most significant challenge to the safe operation of the runway systems. Modern researchers pay focused attention to the development of tools helping to exclude any runway incursions, but [...]
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 316

Mobile Wireless Internet vs. Wi-Fi

The following paper will compare and discuss the advantages and disadvantages of regular 3G and Wi-Fi connections to the World Wide Web.
  • Subjects: Internet
  • Pages: 3
  • Words: 902

Effective Power Transmission Systems

After accentuating the necessity of the new transmission system and the associated planning, the authors focused on the benefits of transmission systems in general.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1677

IPhone 5S Instructional Manual

As indicated in Figure 1, the phone has a total of 12 features. In point form, the features are as follows: A face time camera.
  • Subjects: Phones
  • Pages: 5
  • Words: 956

The Enable Talk Gloves: Invention’s Pros & Cons

The gloves have special sensors that turn the signs into texts on a smartphone that also turns the texts into speech. This invention will impact the participation of people with speech problems in the activities [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 205

ATN Corporation’s Cloud Computing Mechanisms

The second mechanism expected to be a part of the described solution is the virtual server. Finally, the third mechanism likely to be leveraged as a part of the described solution is a cloud usage [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 828

The Detailed Network Design and Layout Implementation

The internal network is connected to the external network with a T-1 link from Verizon using a dynamic NAT router installed and tested and overloaded with PAT to support a higher number of clients with [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 827

Safety in Elevators and Escalator Maintenance Contracts

The controller also regulates the opening and closing of the doors, indicating to the passengers the position of the elevator in the hoist-way and indicating the direction towards which the elevator is moving.
  • Subjects: Accidents & Protection
  • Pages: 15
  • Words: 4192

Power Backups as a Solution to Outage Problem

Unless there is a solution to the situation, the project will be late. A technician will not be able to handle the outages alone, and thus, the problem will not be solved.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 848

Educational Technologies and Their Integration

The primary goals of technology include 1) orientation of the learners of the widespread of the educational technology; 2) information on how the educational technology can be used as the media opportunities of the teaching [...]
  • Subjects: Technology in Education
  • Pages: 13
  • Words: 3641

Char Davies’ Osmose as Virtual Reality Environment

On the following position, the installment suggests the invitees a chance to trail the discrete interactor's voyage of imageries from end to end of this counterpart of natural surroundings.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 628

Electrical and Electronics Engineering Career

The main aim of the report is to enable the career consultants who will be acting as career advisors to be able to understand my career field and in the process, they will be able [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 621

Project Time and Costs Estimation and Reduction

To begin with, bottom-up estimating can be defined as tracking individual cost elements of the project for estimating the sum cost of the entire project.
  • Subjects: Project Management
  • Pages: 2
  • Words: 709

Computer Hardware Components and Functions

Hardware is the physical components of a computer, while the software is a collection of programs and related data to perform the computers desired function.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 251

Internet for Learning and Knowledge Acquisition

Due to manifold effects of technological innovations, education has undergone significant and positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1376

Web-Based School Management Mobile Application

The implementation process was scheduled to commence with the infrastructural development of the web-based system and upload all school data into the system.
  • Subjects: Technology in Education
  • Pages: 35
  • Words: 9824

Aircraft Navigation History

First, people had to use the tactics they utilized moving on the land, but the use of radio, radar, and, finally, satellites enabled people to improve navigation significantly.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1097

Avoiding Technological Determinism: Aspects and Challenges

For instance, Volti specifically warns the reader that the perspective on the technology that is presented in the chapter "Winners and Losers" may be "a bit negative" and makes sure to mention the positive effects [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1644

Virtual Reality’s Main Benefits

The rapid development and the growing popularity of virtual reality raise a logical interest concerning the advantages and disadvantages that are related to the application of this new technology in various spheres of knowledge and [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 909

Computer Viruses, Their Types and Prevention

A memory-resident virus is one of the most resilient types of viruses out there since it resides in the RAM of the computer and comes out of stasis every time the computer's OS is activated.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1108

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
  • 5
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1413

Heinrich’s Domino Safety Theory

In other cases, some employers tend to ignore the safety needs of their employees by providing unsafe working conditions, which eventually contribute to accidents within the workplace.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 298

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1162

Global Positioning System: Drawbacks and Solutions

The reason for the scope of the paper is the success the system has had so far, the possibilities it offers in a multitude of fields and the impressive list of achievements already made possible [...]
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4087

Nintendo Wii as an Innovative Product

The paper aims at analyzing the case and answering the questions regarding the nature of the innovation, aspects of the value proposition, and details of the used business model.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 879

Prescriptive Airport Security, Its Pros and Cons

It is also important to point out the fact that the current security procedures and protocols are based on a set of assumptions, one of which is that compliance with rules and regulations will allow [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3856

The Oil and Gas Industry: Project Management

Figure 1 presents the WBS developed for the Horse Hill Project concerning these stages.  The proposed WBS is appropriate to describe the work and activities associated with the realization of the Horse Hill Project.
  • Subjects: Project Management
  • Pages: 2
  • Words: 425

The Carnival Triumph Cruise Ship’s Crisis Management

This paper is a critical analysis of the crisis communication surrounding the marooning of the Carnival Triumph Cruise ship. The contribution of the Carnival's PR in addressing the Triumph crisis is subject to analysis to [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2838

Power Amplifiers: Aims, Classes and Theory

The main aim of power amplifiers is to transform a signal of a weak strength to a signal of strong strength and direct it into a load at significantly higher power.
  • Subjects: Engineering
  • Pages: 2
  • Words: 685

How Technology Has Destroyed Jobs in Our World Today?

As pointed out by Rotman, the same technology that is apparently making work easier and helping to increase the level of productivity in business enterprises is responsible for killing jobs and getting rid of humans [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 850

Software Bugs Types, Causes and Consequences

A software bug is a term that is used to denote a fault, error, or failure in a piece of computer software, which yields an undesirable result such as a software crash, incorrect behavior of [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 681

Collection of Environmental Data: System Designing

The scope of the study will be limited to data collection by the government agencies and members of the public. Engaging the public in collection of environmental data will help the government to identify some [...]
  • Subjects: Data
  • Pages: 22
  • Words: 5320

Internet Gambling and Its Impact on the Youth

However, it is necessary to remember that apart from obvious issues with gambling, it is also associated with higher crime rates and it is inevitable that online gambling will fuel an increase of crime rates [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 830

Airplane Boarding System Project Management

The development has seen the manufacture of large capacity planes and the introduction of new routes over the years. The data will be used in reviewing the success of the project.
  • Subjects: Project Management
  • Pages: 20
  • Words: 5998

Virtual Private Network’s Project Management

The projects have become important due to the need to adapt to the advancements in technology. Despite the organization's success in the industry, data and network security issues have greatly affected its operations.
  • Subjects: Project Management
  • Pages: 3
  • Words: 880

Voice Recognition Technology: Definition and Usage

It is against this backdrop that this report explores the concept of voice recognition technology in terms of disadvantages and domain of its use, impacts of this technology on individuals and organizations as well as [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1826

Presentation Importance in the Business

In my future presentations, I will consider some of the techniques mentioned in this article that include creating client newsletters, marketing postcards and presentation folders to enhance efficiency and exhibit a level or organization.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 550

The Systems Development Life Cycle

The Systems Development Life Cycle is a conceptual model for IT specialists to institutionalize system development through the conventional phases of planning for defining system development resource requirements, analysis for determining end user requirements, and [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 483

Project Management: A Pillow with a Vibrated Alarm

Once the filling is ready for use, the alarm agent is introduced into it so that the device could be incorporated into the design of the pillow. The production of a pillow with a built-in [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 840

Information Technology: Peer-to-Peer Computing

At the same, users also want the ease of use and anonymity in P2P computing. Users must learn the technical aspects of P2P computing in order to collaborate and communicate.
  • Subjects: Internet
  • Pages: 8
  • Words: 2215

How Technology Has Changed Lives?

Although most of the music sold in online stores is copyrighted, there are people who manage to pirate and make a living out of it.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 669

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

Foundation Engineering in Difficult Soils

The challenge with planning building foundations on moderate to highly expansive clay soils are the probable damaging effects of differential movements of the foundation structural elements owing to volumetric changes of the underlying and adjoining [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1737

Technology Evolution in The Modern Society

Service perspective - which holds that e-commerce constitute a tool that fulfills the needs and desires of companies, customers and management with aim of reducing the transaction costs while at the same time being able [...]
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4289

Apollo Program and Project Management

The program also contributed greatly to the establishment of the image of the USA as a superpower. One of the stakeholders was the NASA that can be regarded as the project manager of the Apollo [...]
  • Subjects: Project Management
  • Pages: 5
  • Words: 1387

The Software Engineering Debate

The second reason the author adduces to his view that software development is not an engineering activity is the lack of standardized approaches to software development.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1148

You Cannot Live Without Mobile Phones

Certainly, total refusal to use mobile phone in daily life is impossible, particularly for the representatives of Generation Y and Generation Z.
  • Subjects: Phones
  • Pages: 4
  • Words: 857

Advantages & Disadvantages of Using Technology in Education

One of the significant advantages of using technology is that it enables teachers to design and implement interactive course materials that could be used to enhance learning experiences that are more pleasurable and meaningful to [...]
  • 2.5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 571

Monopolistic Competition of Smart Phones

In the flurry of the responses that followed, there was concern whether the smart phone market was becoming monopolistic. This was a clear indication that the competition in the smart phone market was becoming monopolistic.
  • 4
  • Subjects: Phones
  • Pages: 3
  • Words: 863

The Infrastructure of Cloud Computing as a Service

Typically, the entire system of cloud computing drawing from its definition provides the infrastructure for organizations to offer clients services dynamically responding to their needs based on the pay-as-use basis, and the economic benefits which [...]
  • 5
  • Subjects: Cloud Computing
  • Pages: 15
  • Words: 4383

Video Game Effects: Good or Bad?

Given the fact that there is indeed a logically sound rationale to such a suggestion, throughout the course of conducting my study, I remained thoroughly observant of the article's classification-related suggestions, in regards to the [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1290

Establishing a Project Management Office (PMO)

Establishment Role, Scope and Office The initial set up of the PMO will involve the establishment of the organizational role and scope of the office.
  • Subjects: Project Management
  • Pages: 8
  • Words: 2238

The Advantages and Disadvantages of PMA

The difference between the licensed and independent PMA is in the character of the cooperation between the companies and the features of producing the PMA parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 553

From Common Things to the Best Ideas

This was the beginning of the discovery of the concept behind gravitational pull. This is how Newton got the idea that there was something that makes things fall and this thing was a kind of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1013

Multi-disciplinary stakeholder analysis

It is left to the development practitioner to ensure that the marginalized stakeholders gain the recognition they deserve during problem identification, formulation of objectives, establishing the relevant approaches to addressing the problem and evaluating the [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 2830

Effects of Technology in Education

The invention of computers and the Internet technology have brought a major revolution in the education field. This is quite a big development in the field of education and it can all be attributed to [...]
  • 1
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 873

Objectives of Project Management

It must be noted though that objectives are not immovable sets of goals that need to be followed exactly, rather the unique aspect of project management objectives lies in the fact that they can be [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1241

Evolution of the Clock

In this light, the paper tracks changes in the operation mechanisms of the clock in the quest to provide theoretical records of evolution of engineering.
  • Subjects: Engineering
  • Pages: 12
  • Words: 3255

Acceptable Use Policy

Owners have the authority to change the policies regarding the use of the internet or intranet. Acceptable Use Policy covers the provisions for network etiquette, which is the limitation to the users of network and [...]
  • 5
  • Subjects: Data
  • Pages: 2
  • Words: 655

Cheating in the Internet

The presence of ecommerce has increased the number of fraudulent deals in the internet. However, with the increasing number of transactions in the internet, fraudsters are taking advantage of the situation.
  • 1
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Solar Energy in the United Arab Emirates

The success of the solar power initiatives in the UAE is largely attributed to the wide range of financial incentives that the UAE government has offered to the companies that are prepared to advance the [...]
  • 5
  • Subjects: Engineering
  • Pages: 5
  • Words: 1352

Apple MacBook Pro

The development of Apple MacBook Pro can be seen as a great milestone in computer technology and specifically for the MacBook family and MacBook Pro line.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 792

Ethics and Computer Security

The introduction of computers and the internet in the 1970s marked the end and the beginning of a new era where human labour was no longer required in the production of goods and services.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1549

Virtual Reality Technology

The third negative impact of virtual reality is that it causes human beings to start living in the world of fantasy.
  • 5
  • Subjects: Other Technology
  • Pages: 2
  • Words: 610

Smoke Alarm “Smart Smoke Detector”

Smart Smoke detectors will allow customers to evade the smoke detector and to reduce the annoyance of the alarm. This report examines extensively and pinpoints the expected process that Global Engineering will follow to achieve [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1092

Channel Tunnel between England and France

To begin with, the analysis of the project takes us through the initial stages of the project, the commencement phase. To this end, the office necessitates the availability of accountability reports on funding and the [...]
  • 3.5
  • Subjects: Project Management
  • Pages: 11
  • Words: 3095

Privacy and Safety on the Internet

The user should have knowledge of how his or her information is being collected, the purpose of collection and how the party is going to use the information. The final security measure to ensure safety [...]
  • 3
  • Subjects: Internet
  • Pages: 4
  • Words: 1126

Technology Siri for Submission

Voice recognition and generation, whether in the form of Siri or some other software, is a welcome and useful part of users' lives now.
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 614

Prezi vs. PowerPoint

In making presentations, the choice of presentation software to be used will be dictated by the amount of information the presenter wishes to pass to the audience, as well as the format of data the [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1702

A Review of Dover AFB C-B Crash 2006

The essay reviewed the chain of events that led to the mishap and measures that the pilot could have taken to prevent it.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2827

Effects of Surveillance Technology on Privacy

The presence of surveillance devices and gadgets in public gathering places limits the use of the public places, as many people will tend to avoid such places in fear of exposing their privacy to their [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1660

PC Models Comparative Analysis

Design features are also quite strong in two of the computers; the 27inch Apple iMac as well as the HP Touchsmart.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1184

Use of Simulation in Military

The first type of simulation used in the military is live simulation. The second application of simulation in the military is the use of virtual simulation.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

The Internet’s Good and Bad Sides

On the other hand, the internet is the root of some of the bad evils that have befallen many people, true and the internet is the beginning of what Gibson described as a place to [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1632

Is Modern Conveniences and Technology a Curse or a Blessing?

However, although modern conveniences and technological innovations have some negative effects, the benefits of such conveniences and innovations overshadow such effects; hence, modern conveniences and technological developments have greatly improved the quality of life; hence, [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 845

Design a helper

Therefore, personal robots in addition to making life easier should be able to perceive and understand the surroundings. However, robots are a source of worry in the future as they can be risky to humans.
  • Subjects: Robotics
  • Pages: 4
  • Words: 1091

Fitness and Performance in Aviation

The physical fitness and vigorous health of aviation workers are critical aspects in their performance, in aviation, because of the nature of some of their jobs that may be physically demanding.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2183

Pros and Cons of Information Technology

Some of the disadvantages of the improved technology include new forms of pollution that are as a result of the gadgets used to access the resource.
  • Subjects: Internet
  • Pages: 2
  • Words: 609

Evaluation of Internet Sources

In the era of digitalization, much information is available online, and attention is paid to evaluating the appropriateness of the source and the quality of the offered material.
  • Subjects: Internet
  • Pages: 1
  • Words: 300

Electrical Multimeters: Overview and Application

It is a crucial tool for the electrical and electronics industries because it enables electricians and techs to identify electrical issues, analyze circuitry, and test electrical parts [1].
  • Subjects: Other Technology
  • Pages: 2
  • Words: 589

Powerful Impacts of the Use of Gadgets and the Internet

Overall, researchers highlight both the advantages and disadvantages of smartphones and the Internet, but most tend to focus on the bright side of the situation, and I support their view.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 836

Melbourne Royal Show: Project and Event Management

The organization plans the Melbourne Royal Show that brings together farmers and all stakeholders in the agricultural and Australian economic sectors. Therefore, the Melbourne Royal Show is crucial for the agricultural production and promotion of [...]
  • Subjects: Project Management
  • Pages: 13
  • Words: 3275

Tracking: More Advantages Than Disadvantages?

In this case, tracking helps the authorities to identify the exact location of criminals and apprehend them. This is because criminals might track the location and behavior of a person they intend to harm.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 293

Guidelines for Evaluating Research Articles

The title is a topical heading that captures the focus of the research paper. It highlights the purpose of the paper, the key concepts discussed in the paper, or the outcomes of an experiment/study.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1133

CAQDAS: Software Programs Analysis

This paper provides concrete advantages and disadvantages of using qualitative software programs in general (CAQDAS).
  • Subjects: Applications
  • Pages: 10
  • Words: 2848

Submerged Arc Welding

But in the case of welding, the by-products of the welding process can be hazardous to the health of the workers.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2010

Project Risk Analysis and Management

The Project Management Institute (PMI) defines a project as a one time work effort that has "a clear beginning and end and is intended to create a unique product or knowledge".
  • Subjects: Project Management
  • Pages: 20
  • Words: 2243

Computer Network: Data Flow and Protocol Layering

The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

The Sports Report Information System (TSRIS)

The Sports Report Information System is designed for the AllSports Sport Club specifically with the goal of ensuring that the club's newsletter is prepared and distributed in time, information access is done with efficiency and [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2141

Software Engineering: Data Modelling and Design

It may be physical e.g.a toy car representing a real car or it can be conceptual, only represented on paper to bring a good description of the operation of the real object."A data model is [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1210

Cisco Packet Tracer: A Simulation Tool

The administration usage of the computers is represented by A. 255 as the address range of F Administration = 176.16.1.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 1326

What Is a Flash Drive

This is not found in the other mentioned drives and hence when storing information it would be easy to know the size of free space left.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 765