⚙️ Essays on Tech & Engineering

Any tech or engineering student knows these topics can be challenging to write a paper on. However, using a free database of essay examples can help you in that process. Use these examples to study how to structure your own paper, what kind of information to put in, and how to format your work.

By looking at how other students have tackled similar tasks, you can better understand what is expected of you and how to approach your own paper. In short, our free database of tech and engineering essay examples is an invaluable resource for any student working on a paper in these subject areas.

Tech & Engineering

The Negative Impact of Technology on Children

Introduction Technology has a significant impact on the growth and development of children, given the interaction they have with tech tools. Parenting has been an issue due to technological advancement over the years as children become engaged with technology. Technology has an immense reach in people’s and children’s lives. In...

Tech & Engineering

The DevOps Project Management Plan

Purpose of Document Planning makes it possible to ensure a high probability and a high level of achievement of goals based on the systematic preparation of solutions. Thus, it acts as a prerequisite for the effective implementation of the project. In this case, this document aims to demonstrate the implementation...

Tech & Engineering

Biometric Authentication: Advanced Networking and Applications

Personal identification has always been at the core of data security and access control. Before the technological era, physical identification documents were used extensively in security controls. With the rise in technological innovation and complexities within human-computer interaction, biometric identification was born to alleviate the challenges associated with physical identification...

Tech & Engineering

The Clemente Global Summit Project Management

Introduction The development of the Clemente Global Summit will have a lot of tasks that will require to take place simultaneously hence the application of the agile project management approach. The agile process involves continuous development and improvement of a project whereby the project manager breaks it into phases and...

Tech & Engineering

Technology Has Changed People’s Lives

There has been a swift change in technology that impacts society and transforms people’s lives. In almost all parts of the world, technology plays a pivotal role in thriving, evolving, and meeting population needs. Transformations have significantly affected education systems, and Zayed University, in particular, bringing new opportunities. Today, most...

Tech & Engineering

Self-Driving Machines and Related Safety Issues

The introduction of self-driving machines raised several questions about their safety and the manufacturer’s liability for accidents. While many people still prefer driving without any additional help to ensure full control, others already enjoyed the small implementation of partial automation, such as cruise control functions. However, the rapid development of...

Tech & Engineering

Effective Project Management: Sharp Printing

Effective project management is an important aspect of an organization since it helps prevent the emergence of negative results from various activities performed by the firm. Organizations also ensure the adoption of an effective project management structure to ensure that the resources allocated towards various projects are utilized appropriately through...

Tech & Engineering

Professional Issues in Information Technology

Ways of Protecting Customer’s Privacy The security of customers’ data is integral for the success of the business. It is important to use a secured socket layer (SSL) certificate to protect customers’ privacy. SSL is among the most effective methods of providing online security to a business’ customer. This solution...

Tech & Engineering

Technology and Mental Health of University Students

Abstract Technology and the internet play an increasingly large role in the lives of people. However, the effects of the online space on specific demographics are poorly explored, with contradictory results from different researchers. In particular, the effects of social media and IM software on the mental wellbeing of university...

Tech & Engineering

Accident Prevention and Safety Recommendations Units in Aviation

Introduction The aviation industry is one of the fastest-growing, and the increase in technological advances is the main reason for that. Safety is the main concern in general aviation and comprises of many numerous aspects and elements. Boyd (2017) defines general aviation as all the operations and aspects of civil...

Tech & Engineering

The Use of Technology in Distance Learning

Introduction The shift from traditional teaching methodologies to online learning requires integrating distance learning technologies that deliver teaching materials and learning to students enrolled in such programs. In this case, course content and educational materials are delivered through web-based applications over the internet, offering greater flexibility and convenience. However, the...

Tech & Engineering

Computer Hardware and Software Components

Hardware Components Central Processing Unit (CPU)- The CPU is a component responsible for enabling a computer to function as it serves as the computer’s brain. The CPU is composed of sub-components such as the arithmetic logic unit (ALU), instruction pointers, cache, memory management unit, control unit and random-access unit. Memory/storage–...

Tech & Engineering

Authorization and Access Control

Introduction System authentication is the verification of a user’s identification by a computer coordination. When a user asks access to a certain resource, authentication is required to ensure that the user’s identity is verified. Credentials, such as a username and password, are used to verify a person’s identity. If a...

Tech & Engineering

Project Management and Operational Failings

Executive Summary After the information technology meltdown at the TSB bank, about 1.9 million customers were locked out from accessing their bank accounts. This problem resulted from the bank’s information technology system migration from its former parent company Lloyds banking group. In my previous report, it was clear that the...

Tech & Engineering

Data and Information Management and Administration

Introduction The administrator aims to incorporate GIS to provide precise data visualizations and mapping to manage the database. A “geographic information system” (GIS) refers to generating, accomplishing, examining, and plotting all kinds of data. It attaches information to a plan, assimilating location facts (where possessions are) through all categories of...

Tech & Engineering

Problematic Gaming and Addiction Among Children

Introduction To begin off, how many of you enjoy playing video games? What are your thoughts after watching this video? Do you have any resentment for your character’s death? How often would you play the game before giving up and turning it off? It is, after all, human nature to...

Tech & Engineering

Information Assets Management: Security Program and Policies

Information assets management is the field that illustrates the approach to the security, governance, and realization of the value of information assets. In case information has value for an organization that stores it, it is to be managed efficiently to maximize opportunities of its profitability and reduce risks that correlate...

Tech & Engineering

Preventing Identity Theft Among Adolescents

Introduction Social media has undoubtedly entered the public consciousness in more ways than one. In 2021, there are none but a few groups limited to older people, those without Internet access, or individuals deliberately rejecting digitization who do not use Facebook, Instagram, or Snapchat. Social applications such as the ones...

Tech & Engineering

Mobile Devices and Cybersecurity

Medical state structures and commercial organizations have daily access to many personal data, including date of birth, first and last name of patients and staff, marital status. The issue of security is particularly acute in front of medical institutions, where data such as diagnoses, research results, and medical histories are...

Tech & Engineering

Intrusion Detection and Prevention Systems

Introduction Intrusion detection and prevention systems (IDPS) are security tools that are often utilized to mitigate potential security violations and ensure that the computers and the whole network are safe. Most cases of intrusion occur when hackers intend to compromise the system and gain access to the most sensitive areas...

Tech & Engineering

Group Project Management Aspects

Abstract Group projects are often more productive and successful than individual ones because various skills and ideas are incorporated into a single team. However, adequate preparations and management are required to ensure the assignment is completed satisfactorily. Consequently, it was only appropriate that we followed the right steps of forming...

Tech & Engineering

Impact of Technology on Society and Various Fields

Currently, technology has dominated most sectors of the economy such that operations can’t take place without its involvement. Due to this abrupt growth of technology, there has been an imbalance between everyday life activities, resulting in positive and negative outcomes. The advantages of technology are numerous to society because of...

Tech & Engineering

Methods of IT Project Management

The fashion industry is one of the most dynamic sectors around the globe, and the dynamism arises from the diverse needs of the client base. Fashion is a personal statement and a symbol of societal status that also defines a person’s culture and individuality. As a result, clients are always...

Tech & Engineering

The Effect of Technology on Aviation Security

Abstract The study examined the adoption and implementation of technology in the aviation industry and how this affects security in the industry. The purpose of this research is informed by the threats that the aviation industry continues to experience since the 1960s, when over 130 hijackings were recorded, especially for...

Tech & Engineering

Technology and Evolution of Communication

Technology has transformed people’s lives to a considerable extent in all spheres, including communication. Two hundred years ago, people had to write letters or meet personally to communicate. One hundred years ago, people could communicate with little attention to distance as they had telephones. Nowadays, people are constantly in contact...

Tech & Engineering

Violent Video Games and Children’s Empathy

Introduction People’s pastime has changed significantly over the past decades due to technology. Video games took one the critical places among children and adolescents’ hobbies. Video games are controlled by electronic equipment launched on special platforms using game consoles, computers, or other devices (Funk et al., 2003). The content of...

Tech & Engineering

Data Mining Algorithms for Business Intelligence

Abstract Data mining joins computer science and statistics used to discover trends from the information bank. The main objective is to generate useful information from large data and mold it into understandable structures that can make key decisions and predictions for the future. Data mining algorithms have been used for...

Tech & Engineering

Information Technology Project Risks

Successful initiation, implementation, and conclusion of a project are necessary, especially when implementing Information Technology (IT) projects. The project team needs to ensure that the IT project is conducted well and the deliverables are delivered within the budget, on time, and fulfill the stated project scope that should offer the...

Tech & Engineering

The Chunnel Tunnel: Engineering Project

Introduction One of the marvels of modern engineering is the 50.5 km long undersea rail tunnel commonly referred to as the “Chunnel tunnel” linking northern France and the United Kingdom. The American society of civil engineers (ASCI) identifies the channel as one of the seven wonders of the modern world....

Tech & Engineering

Migrating Technical Infrastructure to Cloud

Project Description Viability Cloud Computing to Companies project aims to substantiate why associations should have an urge to shift their infrastructure to the cloud. This shift includes the recommendation of the best cloud service providers. Organizations should also be aware of the merits and demerits of each product supplier. This...

Tech & Engineering

Project Management: Project Management Principles

Project management is a process of applying various skills, methods, and knowledge to accomplish certain project objectives. A project manager typically regulates the whole process and allocates the budget for the expenses. Project Management Institute provides 12 principles of leading a successful project (see Appendix A). From these principles, adaptability...

Tech & Engineering

Use of Data in Business. Knowledge Management Systems

Data is a key aspect in business intelligence and analytics. Business intelligence focuses on the present, taking data to apply it towards enhanced decision-making through aggregation, visualization, and analysis which can improve operational efficiency. This paper continues building on the example of a medium-sized business offering business development education services....

Tech & Engineering

Creating and Effectively Managing a Virtual Team

Introduction Global technological advancements have greatly revolutionized the way human beings interact and work the changes being witnessed are on the rise. This has left organizations with no option but to style up look so as to leverage on the numerous opportunities that have become available. Faced with increased pressure...

Tech & Engineering

Artificial Intelligence Overview

Introduction The quantity of data generated by humans and machines currently far exceeds the ability of human beings to absorb, interpret and make complex decisions. Therefore, machine learning forms the foundation and perspective of complex strategic planning in computer learning (Shabbir and Anwer 1). AI is, therefore, a multi-faceted, interdisciplinary...

Tech & Engineering

Open Data Policies: Benefits, Issues, and Best Practices

Introduction The Open Data Policy is a U.S. policy governing the management, storage, and publication of data by government agencies. Although initially presented in an Executive Order by Barack Obama’s administration in the U.S., similar policies are being adopted internationally. It requires that data collected or created by such agencies...

Tech & Engineering

Data Mining Algorithms: Applications

Over the years, technological advancement and the competitive business world have necessitated the development of various data mining algorithms. These different techniques have proved useful in obtaining important data from large sets of raw data. Data mining, therefore, is the processes through which different algorithms and software are used to...

Tech & Engineering

Discussion of the UK Huawei Ban

The article at the center of this discussion has been posted online by Business Standard – a popular free business newspaper. It covers the details of the recent decision of the United Kingdom government to ban all Huawei equipment from the country’s 5G network. The decision to prohibit the purchase...

Tech & Engineering

Policies Enhancing Information Security of Global Distribution, Inc.

Executive Summary The increase in demand for data driven service at GDI is the source of emerging security and system integrity risks. The firm needs to implement policies to address these issues to reduce the impact of the associated risks. The critical assets requiring policy protection include the 81 remote...

Tech & Engineering

State Government IT Security Policies

Introduction Having a clearly articulated information technology (IT) security policy is crucial for any organization, including state agencies and offices in the executive branch. A well-established IT security policy prevents unauthorized disclosure, access, use, or modification of information assets of an organization (Briffa et al., 2020). Illinois Department of Innovation...

Tech & Engineering

Information Systems and Software Application

Introduction Streamlining business processes with appropriate information technology software’s is critical towards success in the world of today. This streamlining has been transforming businesses to operate in modern information age discarding the traditional way of conducting business or managing organizational resources. This has been important to many organizations because it...

Tech & Engineering

The Future of Voice over Internet Protocol

VoIP is a technological solution which allows users to maintain telephone connection over cyberspace. It implies transferring audio signal using Internet Protocol networks. How VoIP Works VoIP transforms analog signal into digital one by utilizing various codecs. Codecs process voice signals and create data packages which are then sent out...

Tech & Engineering

Testing Software and Web Application Performance Tool

Introduction The given literature review will primarily focus on the topic of Web Application Performance Tool (WAPT), which is utilized in order to test web-based interfaces and related applications. Aside from general background, this literature review contains sections of load testing and stress testing comparisons and the section discussing gaps...

Tech & Engineering

Knowledge Management Tools in the 21st Century

Introduction Many scholars acknowledge that the knowledge management field is an emerging field that has not developed to its full potential. Nonaka &Takeuchi (1995) says that knowledge management is the creation, dissemination, use of knowledge through processes that have been put in place by stakeholders in the field (p. 67)....

Tech & Engineering

Advantages of the Computer Games

Introduction A computer game refers to an electronic game that entails contact with a user interface to produce image response on a video gadget. Other references given to computer games are PC games or video games. The electronic gadgets employed in playing computer games are referred to as platforms. Illustrations...

Tech & Engineering

Digital Forensics Research Pape

Introduction When designing local networks’ IT architecture, whether it is a large enterprise, a small company, or a home network, security is a key performance criterion. Protecting networks from outside interference, regular checks, and optimizing computational processes and node links are priorities for creating a quality system. Nevertheless, it is...

Tech & Engineering

Security Analysis: Findings & Recommendations for Air Force Reserve Command

Introduction The Air Force Reserve Command (AFRC) – Is an exceptional branch of the forces that tenders their support to the Air Force in the United States. Specifically, this body monitors communications, intelligence and natural disasters aftermaths such as aerial spray of mosquitoes and hurricane occurrences (Air Force Reserve Command,...

Tech & Engineering

4G Wireless Networks: Overview

3G wireless networks and 4G networks Both 3rd and 4th generations are mobile communication standards set to define the general airwaves utility. They are both forms of transmissions that carry information in form of voice and data. The most notable difference between the two transmission networks is the speed and...

Tech & Engineering

Project Quality Management for Project Managers

Project Management In the present world of fast-changing technology coupled with varying user needs, it is challenging for project managers to achieve project objectives. According to Khan (2019), leaders should consider “smarter planning and new concepts to help their projects succeed” (p. 693). Therefore, project management entails using different know-how,...

Tech & Engineering

Artificial Intelligence in the Information Technology Industry

Introduction There are numerous debates on the topic of artificial intelligence (AI) algorithms and devices in the business environment and the global economy today. That is not a surprise, considering the recent progress, success, and demonstrations of AI in e-commerce, healthcare systems, and cybersecurity (Parry & Battista, 2019). These aspects...

Tech & Engineering

Nuclear Power Plant

Abstract At the present nearly 20% of Kuwait’s entire oil production goes immediately towards supplying its various power plants into order to meet the energy requirements of its populace. The inherent problem with this lies with the fact that the oil reserves in Kuwait are a finite resource and eventually...

Tech & Engineering

Impact of New Technologies on Oil Production

Introduction The oil and gas industry is one of the most important and crucial industries in the world. Because of the availability and affordable cost of production in mining of this resource, oil and gas has been the primary source of energy globally for many decades now (Fenwick, 2011). The...

Tech & Engineering

Information Technology Code of Ethics

Introduction Professionals in the Information Technology sector are usually expected to adhere to a particular code of ethics. These (I.T.) workers often process sensitive information aided by methods and equipment with high sophistication. They are therefore expected to adhere to a given ethical code. Information technology workers usually play a...

Tech & Engineering

Project Management: Strategies, Challenges, Communication

Introduction Human Resources (HR) management is a crucial aspect of leading a business as success depends on how people cooperate and apply their skills to achieve goals. For broad, global, or digital projects, HR generalists for different units effectively maintain employees’ performance. However, such a strategy is expensive, and the...

Tech & Engineering

Choosing a Research Question and a Statistical Test for the Data

Introduction In statistical analysis, it is critical to properly formulate a research question and to determine the variables to be measured and the tests to be run. This paper offers a research question that could be answered using the “WK1.spss.Dataset.New.sav” dataset, and explains which test needs to be carried out...

Tech & Engineering

The Managing Virtual Teams

Introduction Technology innovation in organizations has changed how team work and managed. Increasingly, organizations are using virtual teams in their operations; virtual teams are teams whose members are separated by time and/or space and they interact electronically and few occasions face-to-face meetings. Virtual teams are beneficial to organizations since they...

Tech & Engineering

Intellectual Property Protection in the Information Age

How should intellectual property be protected in the information age? The arrival of computer technology has led to a faster access to information and ideas through digital networks typical of the information age. The information age has also radically changed how people collect and manipulate information especially through the use...

Tech & Engineering

Symmetric and Asymmetric Encryption

Introduction Data encryption on the Internet is a common practice that allows users to transmit and store data securely. Encryption is required by many different functions and applications, from paying for purchases on the Internet to using gadgets such equipment as smart electrical appliances or smart homes. For this reason,...

Tech & Engineering

A Systems Approach to Planning, Scheduling, and Controlling

The significance of project pricing estimations can hardly be overrated; providing a strong foundation for the further financial strategy of the organization, it serves as a means of locating the financial issues that may possibly emerge and impede the process of the company development. Moreover, the estimations in question contribute...

Tech & Engineering

Cyber-Security Threats to Educational Institutions

Abstract The government of Saudi Arabia has made a significant investment in improving the infrastructure in the education sector in the recent past. It has directly supported the digitization of learning in both public and private schools. These institutions have redefined their operations in line with the emerging technology trends....

Tech & Engineering

Discussion of IT Project’s Aspects

Abstract Projects related to information technologies are very popular in modern society. They are characterized by ease of implementation in any conditions. Moreover, the development of the IT industry is an assistant for the company in solving complex tasks as they appear. Effective management and detailed development of projects in...

Tech & Engineering

Protection Against Malware Attacks

Introduction The modern world is characterized by a high level of informatization in human activity. Information technology (IT) is used in the economy, healthcare, law enforcement, government, and many other important areas. As a result, the quality of decisions made by various individuals and the effectiveness of activities largely depend...

Tech & Engineering

Research Agenda in Project Management

Introduction Project management provides an established plan for problem-solving as well as overall control. The existing knowledge on project management is directly dependent on the amount of prescriptive research available on various project management disciplines (Ahlemann et al., 2012). Prescriptive research regarding project management has allowed for the development of...

Tech & Engineering

Disparities in Education Regarding the Use of Technology

Research Problem E-government processes refer to the transformation of government processes using interactive communication tools. The Internet is an appropriate way of improving interactive communication processes among people and institutions. Disparities in students’ learning in the New York City public schools have been caused by inequitable access to learning opportunities....

Tech & Engineering

Implementing Network and Personnel Security Measures

Background Data is accessed every day by several persons, each with different needs. Numerous factors contribute to the security of data and networks. By establishing a well-conceived security strategy that addresses the most vital parts of the danger, it will be possible to minimize data loss and corruption. Hardware safety...

Tech & Engineering

Types of Data Analysis in Business

Types of Statistical Test Used The data analysis utilized various types of statistical tests to reach a conclusive decision on the implications of the data. These tests include paired sample t-test, independent sample t-test, chi-square (independent) test, Mcnemar (paired) test, Mann Whitney U test, and Wilcoxon Z test. Firstly, the...

Tech & Engineering

Researching of Big Data and Privacy

Introduction Information has become such a significant commodity that owning and managing it is now analogous to power. In the digital age, information remains the point that connects people from all over the world in such a way as to ensure virtually seamless interaction in real-time. At the same time,...

Tech & Engineering

Cloud Computing and Major Data Breaches

Introduction Cloud computing can be defined as the online delivery of computing services, including tools and applications such as data storage, networking, processing power, databases, software, and servers. Instead of storing data on a local device, could-based storage offers storage on remote databases that have enhanced security and larger capacities....

Tech & Engineering

Data Management and Database Analysis

Introduction Data management is a managerial process that involves obtaining, confirming, storing, protecting, and processing the required data to ensure adequate availability, reliability, and timely access to information to its end users. The computer system is a technological aspect that helps in simplifying data processing activities and improving reliance on...

Tech & Engineering

The Project Execution: Implementing Changes and New Technologies

Abstract Aims and Objectives: The primary aim of this research is to explore how project managers and teams deal with changes and new technologies occurring during the project execution phase. Many projects are implemented following a plan where such basic aspects as time, costs, and actions are predetermined and scheduled....

Tech & Engineering

The Resilience of Austria to the Threat of Cyber-Attack

Executive Summary The study focuses on examining the resilience of Austria to the threat of cyber-attack. The approach includes a qualitative study and a review of government sources and academic literature. The main sections entail introduction, literature review and methodology, key findings and discussions, conclusion, and recommendation. Under the introduction,...

Tech & Engineering

E-Business Technology and Security Measures

About the project The main aim of this project is to show how an organization can effectively secure their e-business. The introduction to e-business, the threats coming under it, and the necessary measures needed are also explained. The steps under developing e-business, validation and testing are also included in it....

Tech & Engineering

Accounting and Information Technology Impact

Introduction Digital Accounting or e- accounting has become the meaning of modern accountancy. In other words information technology has affected the accounting in its every form and design. The impact of information technology is so strong that those, who worked overtime against its introduction, are now feeling its comforts. Most...

Tech & Engineering

Physical View: The Intelligence Transportation System

The information exchanges and transportation systems that back up the Intelligence Transportation System (ITS) are collectively known as the Physical view. The architecture of this outlook is shown as an integrated set of physical objects, consisting of terminators and subsystems that interrelate and exchange data to support the ITS service...

Tech & Engineering

Self-Service Checkouts as Technological Innovation

Introduction The research process involved various data collection methods that included both primary and secondary procedures. The scope of the study was to investigate the technological innovation and customer interface of self-service checkouts using suitable study demographics and study settings. The research process involved aspects such as the assessment of...

Tech & Engineering

Trends in Information Technology Project Management

Introduction Project management has been a common approach to accomplishing tasks within specified constraints such as time, scope, quality, and cost. Since project management gained interest from various fields of construction, engineering, and government, it has been advancing at a constant rate. Today, several companies depend on project management to...

Tech & Engineering

Comparison Between Laser Scanner and Total Station

Introduction The archeological, architectural and environmental surveying fields have continued to experience a lot of changes with the ever-developing technology. The latest entrant in technological advancement as far as these fields are concerned is the Laser Scanner (Curles 2000). This gadget is said to have taken the world by storm...

Tech & Engineering

The Impact of Technologies

Over the past decade, technology has taken a big step forward and has become an integral part of many people’s lives. People spend time on the Internet, communicating with each other, being at a distance, ordering groceries at home, and making purchases. People have gained access to information that helps...

Tech & Engineering

Cloud Computing Security Framework

The term ‘cloud’ denotes a network. Cloud computing is the systematic delivery of various hosting services provided to clients over the Internet. It aids in the creation, configuration, and customization of commercial applications online. It allows firms and enterprises to easily outsource IT processes, hence giving them ample time to...

Tech & Engineering

Home Office Networking With Wi-Fi

Project Description In today’s business environment, computers are essential. Without computers, it would not be possible to efficiently run any organization, particularly the home office. Individuals have to set up systems that can enable them to carry out their duties within the house as well as respond to customer/client requirements...

Tech & Engineering

Mainframe Migration: Challenges of the Process

Introduction Mainframes have for a long time been the most popular forms of data storage. This is majorly because compared to other systems, mainframes have been proven to be secure and are generally stable even under the harshest of conditions. They also have the potential to handle large volumes of...

Tech & Engineering

Windows as a Perfect Network Operating System

Introduction A network operating system (NOS) is an operating system (OS) that allows essential functions of a computer. The operating system manages the computer’s resources, organizes a user interface, and provides and performs services for applications software. The OS also handles network users, maintains a network connection to the server,...

Tech & Engineering

Project Management Practices in Managing Project Life

Introduction One of the major challenges in project management is meeting the objectives under varied conditions. Every project is subject to scope, time, and budget constraints (Golmohammadi, 2019). The secondary challenge is how to optimize the allocation of inputs needed to meet predefined objectives. The project manager, therefore, has to...

Tech & Engineering

Quality of the Project Management Process

Executive Summary Quality of the project is defined based on how well the outcomes correspond to the initial requirements. This assignment focuses on project management, specifically the domain of quality management. The first section of this paper is an overview of literature including ISO and PMBOK standards, which provide project...

Tech & Engineering

Seismic Activity and Its Effect on the Built Environment

Abstract The history of earthquakes is as old as the earth itself. It is a phenomenon that has occurred in different places of the earth and the results have been the deformation of the earth, destruction of buildings, and the loss of human lives. The reason for the occurrence of...

Tech & Engineering

Construction Methods in Earthquake Susceptible Regions

Introduction Over the course of many centuries, there have been numerous instances of natural earthquakes causing great catastrophes to human beings and destroying infrastructure, which has proved to be very costly (Booth 1994). According to Booth (1994, p. 45), the combined monetary value of the damage caused cannot be easily...

Tech & Engineering

Unauthorized Access to Computer and Information

Gary McKinnon, a British citizen, is regarded in the computer software business as a ‘superhacker’. From 2001 up to 2002, Gary is believed to have infiltrated into the computers of the US Army, Air Force, Navy, and NASA. In total, Gary led to a loss that amounted to $ 700,000...

Tech & Engineering

Malicious Software and Network Security

Malicious software is the software built for the purpose of destroying data or to cause dysfunction of the computer. The malicious software can reach a computer through data transfer from an external interface such as network connection or external storage device. In order to protect a computer the security software...

Tech & Engineering

A Needs Analysis in Developing a New Website

Introduction This paper will apply needs analysis to the process of a new website development. It is a vital step in beginning stages of website design as it helps to identity user groups, needs, and company goals. Needs analysis can be important to provide a logical backbone to the development...

Tech & Engineering

Petrol and Diesel Engines: History and Development

Abstract This is a study report on the historical development of petrol and diesel engines. As the development of these engines is closely related to the automobile industry, the paper tries to correlate the developments in automobile industry with that of the Internal Compression engines. The developments in the various...

Tech & Engineering

Surveillance and Society in the United Kingdom

Introduction The use of CCTV surveillance has become commonplace in the United Kingdom. Hardly can citizens and tourists move through several blocs without being recorded by several cameras. Fact that these cameras have found their way into private properties is causing much worry to members of the public whose every...

Tech & Engineering

Strategic Vision and Planning Importance for Effective Project Management System

Introduction Strategic vision and planning are important elements of any project which determine the project outcomes. The development of effective project management becomes important in the maintenance of human relationships and ensuring the physical well-being of employees so that they give the maximum contri­bution to efficient working. Historically, project success...

Tech & Engineering

Security of the Wired and Wireless Networks

Introduction First of all, it is necessary to mention that in spite of the development of IT, and increase of the comfort of using the latest achievements of the humanity, the issues of safety stay eternally the hot problem for any user. The case study only revealed the fact that...

Tech & Engineering

Intranet and Extranet Networks

Intranet refers to the network that facilitates communication among the staff of an organization. It is comprised of several private computers in an organization interconnected with each other through a network or networks (Mitchell par. 1). An intranet allows efficient communication and information sharing, thereby enhancing the “knowledge base” of...

Tech & Engineering

Hajj Diary in Saudi Arabia

Introduction Diary as a term may be defined as a record providing space for discrete entries, arranged by date; recording what has transpired over the course of a day or other period. Until the last several decades, all diaries were kept in handwritten or typed form. The word comes from...

Tech & Engineering

Interactive White Board (IWB) in Education

Information and Communication Technology For generations that are evolving from traditional values and adopting a modern lifestyle, education serves as a critical part of the transition. Contemporary school systems are faced with the task of creating strategies aimed at preparing students to easily adapt to the information era (Bingimlas, 2009)....

Tech & Engineering

The Communication Systems

Introduction Digital communication systems Digital communication systems are undoubtedly the most commonly used nowadays. They are irreplaceable practically in every sphere of human life: studying, work, entertainment. This is due to several factors, which include: their accessibility; simplicity in use; their mobility. In general digital communication deals with transmission of...

Tech & Engineering

Liability of Internet Service Provider

Introduction The first chapter of this dissertation will consider the justification of the study, formulate research questions and discuss the objectives and background of the problem, for instance, controversial issues, different type of violation of the copyright act, loopholes of the entire system, liabilities of the internet service providers to...

Tech & Engineering

Mobile Homes, Tents, and Fire Safety in Qatar

Abstract The paper considers the problem of fire safety for mobile homes and tents, as well as camping areas in the Qatar. Possible fire threats to these objects are identified, and measures for their diminishing or elimination are suggested, based on literature review on the research topic. Mathematical model for...

Tech & Engineering

Project Schedule Management Plan

The project schedule management plan covers all the work that has to be done to deliver the project on time. Specifically, the project concentrates on the following objectives: the creation of RFP, assessment of vendors, creation of a high-level implementation plan, and procurement and installation of new server and software....

Tech & Engineering

Resilience Building Against Natural Disasters in the Caribbean Islands

Abstract Resilience is an ability to recover from an adverse impact, which in the context of Hurricane Irma and the British Virgin Islands means the practices of building construction, materials and preparedness plans that allow restoring previous activities on the territory. In general, hurricane Irma was the most impactful natural...

Tech & Engineering

Elements of Project Management

Project management is a broad study area within the academic and educational aspects of conducting practical projects. It contains components that are resourceful to frontrunners in the field of project management. Therefore, this assignment addresses the role of project management elements and incorporates the use of a case study in...

Tech & Engineering

Properties of Cloud Computing Services

Questions Asked This paper is aimed at cutting through the hype of cloud computing to evaluate if CU-IT services should adopt it. Emphasis will be given to the explanation of how cloud computing integrates with CU-IT’s basic business competencies. Also, this paper will be aimed at assessing how cloud computing...