Tech & Engineering Essay Examples and Topics. Page 9
The paper evaluates a con article on 'The impact of cybercrime on e-banking' [1]. H2: Identity theft will have a negative impact on the adoption of electronic banking.
The use of solar PV panels as sources of renewable energy has been gaining traction in the recent decades. This implies that the output of energy in PV solar panels is often unstable.
Since it is the ratio and agreement of the actions of bank employees and cardholders that is a critical element in the money security chain, so as a result, the method of interviews with the [...]
It was my conscious decision to limit the time spent on my smartphone due to the physical harm it causes to my body, eyes, and psychology.
In the contemporary technology-driven world of business, the use of information technologies is essential for the efficient and competitive implementation of business practices.
The paper will focus on summarizing the piece of work to comprehend the contribution of the authors in understanding the role of AI in modern HR practices.
Remote working is a form of arrangement where the employee does not have to commute to the workplace. The number of telecommuters increased to 2,000 in 1983, and the figure continued to grow in the [...]
Specific heat of a material is the amount of heat required to increase the temperature of unit mass of material by one degree Celsius and is denoted by the letter S.
Android Studio offers a range of testing tools and frameworks to help one in testing the app. Further, an XML file in the Android Studio enables one to create a layout and resources.
The concept of an object is broader than a data structure, and a data structure is essentially an object that contains data.
The relevance of cybercrime research is dictated by the fact that it is challenging to ensure the complete safety of data on the Internet.
Software-as-a-Service is a cloud computing model that suits eBay's needs outlined in the previous slide. As anyone can access the service without specialized hardware, software, or knowledge, it can be brought to a large audience [...]
Using a VPN can help to hide the real information from open access. Some VPN providers may expose the users to malware or steal private information.
In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
It is impossible to assess and determine when and how the stolen personal information will be used in the future. Moving forward, the company should invest in data security systems to ensure that clients' information [...]
The use of the created Boolean string yields 1726 results, which is a relatively large number of articles for manual selection of the most relevant sources.
Efforts by the elite members of the society enlightened the global countries about the benefits of renewable energy sources in conserving the environment prompting the need to consider wind energy.
All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
Planning using the EOP is critical to minimize the impacts of an incident and ensure preparedness, coordination, and rapid response from all relevant agencies.
To fulfill the frameworks of project management, human resources are required at managerial and project members level.
The Project Management Institute (PMI) defines a project as a one time work effort that has "a clear beginning and end and is intended to create a unique product or knowledge".
13% of the users rated the tool with the highest score" and mentioned that the app's usability "is a positive component that facilitates learning".
In 2014, Marriott recorded losses amounting to around 600 million USD due to cyber attacks while those of Target were around 162 million USD in 2013.
The plastic casing of the husky flashlight consists of a 5 inch cylindrical plastic container with a very thin spring or a strip piece of metal that is used to make the electrical connections between [...]
Input/ Output of data refers to the type of interface used to enter data and extract data. They are read/ write and can be made integral with the computer or used externally.
Two of the most influential and promising technologies in this age are the YouTube and Facebook, a social website. The impact of social media on business is remarkable and companies use YouTube to market their [...]
The setup in this experiment is as shown below: The below is a list of all the raw material and equipment used:
Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
A tutor also qualifies as a module coordinator and hence the primary key of any of the tutors is the ModCoord. The association between the module coordinator and the student table is a one-to-many type.
It is also capable of determining the ground speed and the time in relation to ground station when in "line of sight" of transmission. LORAN is capable of providing highly accurate bearing, distance, time to [...]
The major plan of 4G technology is to ensure that users can access and have a faster and more reliable internet access on their mobile phones and the mobile broadband services and combine all other [...]
In this prototype, the task is to design a robotic car that can be controlled by a computer using wireless communication technology.
I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
The latest version of the Microsoft Office system program is a 32-bit application and can run on a Windows 64-bit platform.
The main consideration, represented in the article is associated with the fact, that the new model of laptops for children is a very successful and highly potential solution of the educational issues, and the maters [...]
In this article, Sakurai and Murayama present examples of the application of information technology in various stages of disaster management, including preparedness, recovery, response, and risk reduction.
Consequently, the analysis will involve the interpretation of the respondents' responses provided on the questionnaires. In addition, a final analysis will be conducted to focus on the issues which arise after data collection.
The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
Recently, there have been many trends the security of information and communication technologies, in particular, due to the expansion of the reach of social media which increase the size of social network, which has taken [...]
Department managers share the requirements, recommendations, list of criteria, and deadline information for the developers. Processing of the online stored information is performed online, and hard copies are processed by workers responsible for processing any [...]
As one of the top management team members, I was involved in advertising a job for a suitable company to write a proposal report and present to us so that we could evaluate them and [...]
Text analysis in this discourse will focus on critically examining and analyzing the language structure in the document to identify the communication function of the discourse.
In a general sense, computer hacking involves the intrusion of the computing privacy of other people, damage of the computing property of other people like files, software etc.or the theft of private information by unauthorized [...]
Politics has hampered efforts to spread the knowledge of the risk society. It is noted that scientists have also failed to come up with a rational solution to the risks of modernity.
MMC includes; Make use of more effective material Speed up hiring delivery Enable high standards of design quality Can help to reduce resource consumption It has often been regarded as a mean of improving quality, [...]
And what is the most important and precious in "The Right Stuff" is that throughout the book the author tries to explain the concept of the "right stuff".
This problem led to the invention of mobile phones which foster true communication in the following aspects. The radio enhances communication because one is capable to get world news despite the compactness of the phone.
This report discusses the causes of security vulnerabilities in the products, risks involved in the disclosure of a vulnerability, and the position of white, grey, and black hat hackers on the discovery and disclosure of [...]
Biomedical engineers join sound skills of engineering and biological science, and so tend to have a bachelor of science and superior degrees from major universities, who are now recovering their biomedical engineering program as interest [...]
For instance, in training their leaders and the staff, you find that these people are in a position to learn online through the use of the internet and this has helped these organizations to reduce [...]
Accessibility and suitability: most of the school and student do not have computers that imply that they cannot use computer programs for learning, lack of availability of internet facilities' availability also makes the students lack [...]
To begin with, one should mention that the time lag is one of the essential characteristics used to distinguish between real-time and batch systems.
Hence, it is crucial to discuss Google Glass and its features, including what the future holds for this technology. The only problem is that Google Glass has not been demonstrated to be a lasting solution [...]
The three key processes of accounting are record keeping, analysis, and finalizing transactions to present them to the users of accounting and financial reports.
It may be expressed in a variety of ways, from peaceful attempts to attract attention to the issue to violent and criminal activities.
Although the above examples explain how humans can use AI to perform a wide range of tasks, it is necessary for stakeholders to control and manage the replication of human intelligence.
With the rise of the Internet and citizen journalism, everyone is capable of having a voice and swaying the opinions of millions with solid facts, innovative ideas, and moving imagery.
Firstly, it is critical to study the importance of science and innovation because the fields high influence the life of people by making it more convenient such as the usage of elevators.
The process of project controlling is a complicated system of various actions which requires a lot of experience and efforts. This type of control meets some challenges as it is not always easy to identify [...]
The rest of the tag is an antenna that transmits data to a reader using radio waves. 0 tools by organizations in a bid to foster a relationship with the main stakeholders, including associates and [...]
Studies have shown that the use of multimedia is a technological phenomenon because its applications involve the use of technology. The implication is that multimedia has a theoretical basis for both teaching and learning.
From the very beginning, to lower the costs of the project, the construction companies were forced to agree on the 6.
It shows that criminals may use the same methods as police officers and also indicates that the storage of personal information in cyberspace is related to major safety risks.
In his book A Whole New Mind, Daniel Pink focuses on a discussion of one of the major changes in the modern society that have occurred under the influence of such professes as industrialization and [...]
The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
Drones are an emerging sector of the aviation industry that has been received differently by the public primarily due to the possibility of misuse, infringement of privacy, and military use in combat.
It is assumed that one of the major factors that currently affect and will be affecting sales in the future is the artificial intelligence.
The engineer is responsible for achieving the goals of the organization he works for, as well as, answering the concerns of the public safety.
The system discharges the customer's card, and when the customer collects the bank card, the system then hands out the requested amount of cash to the customer.
The core purpose of any multi-touch interface is to detect and process the users' intuitive gestures. The first and foremost advantage of multi-touch interfaces is that they can be adjusted to virtually every situation where [...]
Figure 1 presents the WBS developed for the Horse Hill Project concerning these stages. The proposed WBS is appropriate to describe the work and activities associated with the realization of the Horse Hill Project.
Because of globalisation and the heightened competition, the airlines of the current world regard the essence of joining strategic alliances as crucial for bolstering their competitiveness.
The goal of this paper is to provide information about the concepts surrounding this issue and to look into the impact of emergency response on the reputation of an airline and legitimacy based on real-life [...]
With the advent of the internet, online courses have sprouted resulting in the debate on the two options, traditional class setting, and the online class.
There are several integration testing levels: Component Integration Testing checks the interaction between the system components after their testing. System Integration Testing checks the interaction between different systems after the system testing.
This paper is a critical analysis of the crisis communication surrounding the marooning of the Carnival Triumph Cruise ship. The contribution of the Carnival's PR in addressing the Triumph crisis is subject to analysis to [...]
However, it is necessary to remember that apart from obvious issues with gambling, it is also associated with higher crime rates and it is inevitable that online gambling will fuel an increase of crime rates [...]
The fulcrum shank of a hex nut screwdriver is a metallic rod that is attached to the handle of the screwdriver and ends with a blade.
The personalization of web services has been seen to improve the interaction that the user will have with the information presented by the machine.
The SharePoint allocation has the capability of efficiently replacing the sandbox and farm solutions thus, guaranteeing satisfaction to the administrators, users, and third-party application experts. In terms of the users' recompense, the SharePoint application enables [...]
It was a legal and ethical obligation of this firm to pay the penalties as a consequence to its act of negligence.
Thus, it is inevitable for a remix to face legal issues when a part of the original piece is copied, adapted, or reproduced without the agreement and permission of the copyright owner through a Creative [...]
This is proven by the fact that he has gone beyond his limits to investigate the impacts of technology on America's young people.
It is obvious that many programs and applications greatly help collect, organize and store data and statistics, as well as manipulate information, represent it graphically and send it to a distant location, and this has [...]
The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
The encryption key is kept public and is known as the "public key" while the decryption key is kept secret and is known as the "private or secret key".
The relative successes of such companies create a competitive pressure for Steam as they either force the company to re-invent its products, or forces the company to consider reducing the price of its products, thereby [...]
Internet usability refers to the design and positioning of a website for ease of interaction with the users. The branding of domain names also leads to enhanced internet usability.
The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
Consequently, the following is the work breakdown configuration: Work Breakdown Configuration for the Development and Implementation of the e-Commerce Application Project Preliminary Study/Survey Understanding the Apparel Market and its trends in marketing and selling Evaluation [...]
It also discusses the importance of such systems in the context of the need to handle big data. For transaction processing system, the appropriateness of the dealings is overly dependent on the accurateness of the [...]
The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
The issue of keeping of information by governments does not hold because as the government leaves the internet open to no filtering, it only protects the rights of a few individuals.
In the advert, the artist uses the element of space to illustrate the background thus indicating to the viewer the probable setting of the image.
Automatic fire alarm systems have either smoke or heat detectors that sense the presence of the smoke and heat respectively and sound the alarm to alert occupants to evacuate.
In a computer system using cloud computing, the workload of running applications is shifted from the local computer to the cloud, which consists of network computers.
In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
Windows XP ensures that any free memory in the RAM is allocated to a certain process so as to help in improving the performance of the operating system.
The skills and training that the airline staff get is necessary to ensure security and effectiveness of the flight and thus make the operation and management of the airline easier. The preferences and the needs [...]
The teacher is the key individual to using technology in education, and should help the students in acquiring education with the use of technology.
In addition, the improvement in technology has resulted in devices and equipments that can assist the disabled to access facilities and services that other people can access.
An interesting offshoot of the Information Revolution is Information of Society, on the one hand, and the commoditization of information on the other.
Presently, the increase in the number of accidents due to poor maintenance and inspection is a major concern to many stakeholders.
So as to discuss the ethical, lawful, and ethical inferences of this concern, people need an understanding of the phrase ethical hacking.
Significant technologies as developed with respect to two Egyptian revolutions, one in the year 1952 and the other in the year 2011 are discussed in line with the roles that these communication technologies played in [...]
The above information on the Boeing 787 is crucial as it has given the quest to explore the power behind the success of the aircraft in the market.
In making presentations, the choice of presentation software to be used will be dictated by the amount of information the presenter wishes to pass to the audience, as well as the format of data the [...]
Second, the fiber optic cables are smaller and lighter as compared to coaxial cables. From the above discussion, it can be concluded that fiber optic cables are more efficient and effective in data transmission as [...]
Assessment of market requirements: Here, the service provider, the broker, and the organization must study the features of cloud computing to instill trust among them and on the new product.
When the nanobatteries are exposed to fire, the inhalation of the fumes may cause severe respiratory tracts inflammation in the upper region of the respiration systems, which can lead the damage of the lungs.
Once retrieved, the contents of the site are checked in order to get a proper way of indexing in the search engine.
The equipment running under the UPS gets supply of power for several minutes before switching the power to an alternative or emergency power options such as batteries in case of electric failures.
Although every individual has the right to accuse the government and internet service providing companies over their failure to protect their customers' privacy, individuals should recognize, they have a crucial duty to play as far [...]
The spread of the innovative technologies pushes some people on the idea that books are going to disappear. First, the ancient books as the reminder of human history are going to remain.
A computer virus is a software program designed to interfere with the normal computer functioning by infecting the computer operating system.
The resent and the most influential invention in the life of people is the creation of the Internet. Nowadays, the invention of the Internet allows people monitor the work of the departments abroad, run relationships [...]
The crew was able to land the plane without conventional control at the airport of Sioux City, but the right-wing of the airliner hit the runway, and the plane broken into several parts.
In comparison to the uncertainties and challenges of the 19th and 20th centuries, the goals of the people who live today, in the 21st century, are rather clear and definite.
The barcode reads at the cash register, while the data of inventory sales transmit the information to a wider system that calculates the statistics.
Among the goals of hackers in attacks on the critical IoT of smart cities, there is the intentional organization of accidents or power outages, theft of personal information of users, interception of control of devices [...]