StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Ethical Energy and the Ethical Considerations of Environment Technology Essay
8 pages (2385 words) , Download 2 , Essay
Free
Oil and LPG plants cause the emission of Sulphur intoxicants which are very harmful to the local ecosystem, natives, plants & animals. Nuclear Power plants do not cause greenhouse emissions or sulfur emission problems but have their serious hazards, especially in the disposal process of nuclear waste (radiation and soil contamination as the waste is buried deep in the ground as per current procedures).
Preview sample
Remotely Controlled Heating System Technology Assignment
6 pages (1724 words) , Download 2 , Assignment
Free
Automatic control over various equipments could be achieved using modern computer technology. Communication technology extended the range of automated control endlessly. The task to be completed is the design of an embedded distributed network system. The client hardware such as mobile phones or a Personal Digital Assistant (PDA), which is connected to mobile network, is to send and receive messages from a Personal Computer (PC) that is connected to the Internet.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Online Security Threats Removal Technology Essay
6 pages (1713 words) , Download 2 , Essay
Free
Although the internet is widely used to get specific information the facility of online shopping is nothing less than a blessing. But, it doesn’t matter if you use the internet to get information or to shop around, you have to face certain security threats as there is an overwhelming increase in cybercrime over the last few years.
Preview sample
Oil Exploration and Extraction Technology Essay
13 pages (3592 words) , Download 3 , Essay
Free
One of the greatest challenges of the present day that humanity facing, is to provide every human being on the earth access to a safe and sustainable environment and energy supplies. The use of energy has been a critical issue throughout history in the functioning and development of human societies. During the last two centuries, mankind has identified ways to harness the highly-concentrated forms of energy.
Preview sample
ICT and the Alternate Moral Order Technology Essay
4 pages (1000 words) , Download 2 , Essay
Social theorists do tend to argue that ICT has truly liberated the concept of human identity and thus must genuinely be considered to be the ultimate modernizing agent in the contemporary society. Technology has not only enabled the human mind to customize the notion of individual identity by offering variegated exposure with utmost privacy and respect, but also allows for the diversification of the concept of social identity by providing alternate platforms and associations like virtual space and online communities (MIT, 2006).
Preview sample
Information Systems Development Technology Assignment
5 pages (1330 words) , Download 2 , Assignment
Free
Here the Police Identity Parades system has two characteristics; first, not everyone can view all the data, and second and most important is that not ALL the information is locally saved for each agency but rather information is extracted from a central system Criminal Records Database (CCRD).
Preview sample
Technology at Workplace Technology Essay
5 pages (1250 words) , Download 4 , Essay
Free
According to the report the technology used has a significsnt influence on working relationships. An assembly line is not the same s a research laboratory, and a steel mill does not have the same working conditions as the hospital. The great benefit of technology is that it allows people to do more better work but also restricts people in various ways.
Preview sample
Comprehensive Design and Management Regulation Technology Essay
25 pages (6656 words) , Download 2 , Essay
The problems associated with implementing the Regulations are addressed, based on findings from practitioners. Client involvement is discussed in relation to the timing of appointments and the assessment of competence for principal contractors. Designer involvement is analyzed in relation to awareness and assessment of risk, the recognition of the planning supervisor's role, and transfer of requirements to operational safety on site.
Preview sample
Wireless Computing in School Technology Research Proposal
4 pages (1000 words) , Download 2 , Research Proposal
Free
Wireless base stations or access points complying with 802.11g wireless standards to cover 25 to 100 meters were installed. Installation of proper antenna that will greatly improve coverage. The wireless networking cards installations in computers and integration of existing LAN management structure. 
Preview sample
Biiomedical Engineering Technology Coursework
30 pages (8320 words) , Download 2 , Coursework
The precision pinch works to explain both the static and dynamic functions. The precision pinch fundamentally comes from the ability to move and place the fingertips on an object and manage appropriate fingertip force and torque. The function of the finger is a complex process that is not fully understood, however, there is much continuing work being done at this time.
Preview sample
Typology of Simulation Fidelity Technology Essay
6 pages (738 words) , Download 2 , Essay
Free
Provided the complexity and uniqueness associated with aviation education, particularly flight training, aviation education necessitates a different model as compared to models used for the education of young people. Whereas young people will look for and wait for instructions on what to learn and are more reliant on the experts.
Preview sample
Impact of Technology on Education Technology Coursework
8 pages (2289 words) , Download 3 , Coursework
Free
Education is the basic need for the young ones to learn about society and civilization. It is considered a fundamental human right, as has been set forth as an important element in the United Nation’s Universal Declaration of Human Rights and the International Human Rights Covenants, which have the force of international laws.
Preview sample
Distributed Systems Assessment Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
A fixed set of processes is created at program initialization, and one process is created per processor. These processes may execute different programs. Hence, the MPI programming model is also referred to as the Multiple Program Multiple Data (MPMD) programming model to distinguish it from the Single Program Multiple Data (SPMD).
Preview sample
Londons Millennium Bridge Technology Essay
5 pages (1347 words) , Download 2 , Essay
Free
Accordingly, massive building projects were undertaken to usher in the new millennium – according to the Christian calendar it should be noted, since for Jews, Muslims, Hindus, and Buddhists, January 1st, 2000 was a different day, year and month entirely – and London engaged in one of the largest, most impressive and arguably most controversial building projects to celebrate the new millennium. 
Preview sample
National Security and Science and Technology Policy Technology Coursework
8 pages (1833 words) , Download 3 , Coursework
Free
Although science and technology’s capabilities and scope are unlimited, there are certain conditions that the government should take into consideration such that it might eventually lead to an unexpected discomfort unconsciously affecting the society’s unity which might reflect as its weakness that will soon be attacked by the terrorists. 
Preview sample
Electronic Chart Systems and ECDIS Technology Essay
7 pages (2140 words) , Download 3 , Essay
Free
This article summarises the advantages of the ECDIS. One of the products which are available on the market is the Namaste from PC Maritime. This product is evaluated based on a set of criteria and recommendations for further improvement of the product are offered.Before a ship embarks on a voyage it is required under the SOLAS convention to carry adequate and up-to-date nautical charts and publications. 
Preview sample
Global Positioning Systems in Education Technology Research Paper
21 pages (5655 words) , Download 2 , Research Paper
Global Positioning System (GPS), a space-based radio-navigation system, consisting of 24 satellites and ground support, is operated by the United States military but open to civilian uses. GPS provides users with accurate information about their location and velocity anywhere in the world. GPS was initiated in 1973 to reduce the proliferation of navigation aids. 
Preview sample
The Pros and Cons of Different Scripting Languages Technology Essay
15 pages (3750 words) , Download 3 , Essay
Free
Not so long ago, the Internet was mostly the province of academics and programmers, and the World Wide Web was a vague idea in the minds of a few researchers. Today both are experiencing explosive growth and unparalleled interest. Web pages are being created at an astonishing rate.
Preview sample
The Keyboard Is the Primary Input Device Technology Essay
11 pages (3020 words) , Download 2 , Essay
Free
Twice the number of keys were present on the double keyboard which has the capitals above and lowercase letters below. Both of them claimed that they provided the fastest way to type. This dispute was resolved finally through a competition between Mr. McGurrin (an advocate of touch-typing) and Mr. Tubb using the two methods.
Preview sample
Security risks to on-line banking and e-commerce Technology Coursework
46 pages (10000 words) , Download 3 , Coursework
The author states that electronic commerce, especially in the form of online banking, poses many security risks that are specifically involved when trying to operate as an online-business. According to recent surveys, the number of destructive applications, that specifically target internet transactions, have considerably increased.
Preview sample
Braiding Machines and the Technique of Braiding Fibre Technology Essay
8 pages (2349 words) , Download 2 , Essay
Free
Adanur (1995) describes a circular braiding machine as one which is made up of two sets with an even number of spools that contain braiding yarns. One set of yarn runs in a clockwise direction around the center of the machine, while the other yarn set turns in a counterclockwise direction. While the yarn sets revolve in two opposite directions, the carriers are redirected to pass alternately inside and outside (under and over) one another.
Preview sample
Ergonomic Analysis of Computer Laboratory Technology Assignment
20 pages (5721 words) , Download 2 , Assignment
Free
Albert Einstein ([n.d.] cited in Glavanis 2008) once said, “I never teach my pupils; I only attempt to provide the conditions in which they can learn.” And after all these years, conditions for learning have yet to be perfected by learning institutions as they continue to build learning areas that have poor ergonomics.
Preview sample
Development of Employee Management and Monitoring System Technology Essay
12 pages (3526 words) , Download 3 , Essay
Free
Telecommunication and networking are some of the most important areas in modern-day communication systems. Diversification of communication systems to allow the provision of other services has been the focus of most researchers in the telecommunication industry. This essay evaluates the use of RFID tags to monitor employees working in a given company.
Preview sample
The Rolle Estate Office Technology Case Study
22 pages (5503 words) , Download 2 , Case Study
Unfortunately, the most effective sources of heat are also the very materials with high carbon concentration. Carbon is a component of the world around us; every event that occurs in our lives has a measurable carbon footprint. Every time an amount of carbon is used to create power, it has an impact on the environment, which we must consider.
Preview sample
Nichias Blue LEDs Technology Essay
4 pages (1120 words) , Download 2 , Essay
Free
Is a type of device that emits visible light when an electrical current passes through it. An LED light is a type of light-emitting diode that emits visible light when an electrical current passes through it. A light-emitting diode (LED) emits light by applying a forward current to the pn junction of a compound semiconductor.
Preview sample
Bluetooth Application Development Technology Essay
12 pages (3381 words) , Download 2 , Essay
Free
With the advent of GPRS and CDMA and a number of other revolutionary modulation and transmission techniques, it is now possible to access the internet wirelessly using either a cellular phone or a PDA/Laptop at relatively high speeds. When it comes to synchronizing the PDA with the laptop or just exchanging information with a friend via laptop/PDA one would still need to either use cables to connect the two devices.
Preview sample
Soil Mechanics and Historic Techniques Technology Essay
8 pages (2319 words) , Download 3 , Essay
Free
Earth is extremely rich in soil and minerals and the terrain we find is of different types and kinds. Soil is made up of three components: solid particles, air, and water. The particles are classified by size as clay, silt, sand, gravel, cobbles, or boulders. The amount of air and water within a sample of soil affects its behavior.
Preview sample
Nuclear Power in Japan Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
The technological advancement that began from the industrial revolution has increased the demand for energy. If we look at the history of man’s usage of energy, the sun was the first energy source that provided light and heat too early humans. The discovery of fire resulted in the possibility of burning wood for cooking and heating.
Preview sample
The Integration of Special Effects in Films Technology Essay
25 pages (6596 words) , Download 3 , Essay
The term special effect applies to techniques that are used in film, television, and the entertainment industry to realize scenes that cannot be achieved by live-action. There are many different kinds of special effects available to filmmakers today. Traditionally they are divided into two main types. First, there are the optical effects that involve the manipulation of a photographic image.
Preview sample
Components of Cyber-Terrorism Technology Essay
8 pages (2206 words) , Download 4 , Essay
Free
But the basic, and perhaps the most important, part of any infrastructure today is ‘cyberspace’, which acts like the nervous system which connects and controls all the other functions of a country. Cyberspace is defined as “The electronic medium of computer networks, in which online communication takes place”.
Preview sample
Management of Cellular Phones Technology Essay
15 pages (3967 words) , Download 4 , Essay
Free
The telecommunication business is diligence that is fast globalizing since of marketplace pressures. It is a business where governments can till now set national telecommunication generalized standards. Any situation of worldwide telecommunication standards has got to depend on a mixture procedure of marketplace and board proceedings.
Preview sample
Culture and Technology Technology Coursework
4 pages (1183 words) , Download 3 , Coursework
Free
Technologies like Computers, Televisions, Mobiles, Video Games, Audio/ Video Players, are now getting a part of our culture rapidly. No doubt that time is no far when robots will be working as maids in the homes and people will be relaxing on the couch enjoying their families watching movies, games, etc.  
Preview sample
Modern Manufacturing Technology Assignment
6 pages (1588 words) , Download 2 , Assignment
Free
The performance of the entire machine can be improved through design optimization of the blades; the blades are exposed to drag which is responsible for the power and frictional loss. The design of the blade is a critical exercise and shall include desirable factors to cater to the power and frictional losses.
Preview sample
Information Security Risks Technology Essay
8 pages (2211 words) , Download 2 , Essay
Free
This analysis can bring to light the significance of the establishment of a management framework. An analysis and comparison of the existing framework and potential synergies will follow, to showcase what are the tools readily available for corporations to use in managing the risk. Regulatory requirements that have appeared over the last few years have complicated the risk management effort.
Preview sample
Artificial Intelligence in Terminator Movie Technology Book Report/Review
9 pages (2454 words) , Download 3 , Book Report/Review
Free
Cognitive learning theories emphasize the relationship between new information and previously learned information, and so the terminators with their built-in learning ability switched off are melded their deeds based on previous learning or set programmed data. Skynet is a big military computer in the film Terminator.
Preview sample
The Manufacturing Process for Plastic Bags, Pipelines, and the Propeller for an Outboard Maritime Motor Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
Primary manufacturing is when we make products which can be used as raw material for other products. This is when the raw material is changed into semi-finished products. Primary manufacturing has three processes: obtaining the material, refining the material, and creating industrial materials. (Teaching with Historic Places Lesson Plan, n.d)  
Preview sample
Personal Computer Industry Technology Essay
7 pages (1995 words) , Download 2 , Essay
Free
Economic theories, together with different strategic management tools will be very essential in unveiling these market forces. In line with this, this report will look at the factors which drive the growth, demand, trends, and development in the market for personal computers in the United States. The rapid technological innovation within the last decade has brought about the creation of personal computers.
Preview sample
Internet Information Systems Management Technology Essay
6 pages (1772 words) , Download 2 , Essay
Free
Whether it is B2B or B2C, the methodologies adopted by the companies more or less have been the same. B2C auctioning has been adopted by companies like eBay and yahoo. They have been resorting to glamorous marketing campaigns to get people to their websites to quote in the auctioning that is happening there.
Preview sample
Implications for Science, Technology and Innovation Technology Essay
9 pages (2562 words) , Download 4 , Essay
Free
However, the innovative course of action is not constrained to advanced technologies alone. The innovations being introduced in diversified disciplines of science such as biotechnology and nanotechnology, however, are not recognized while conversing on the theme of technological developments.
Preview sample
History of Internet and Music in UK Technology Essay
4 pages (1000 words) , Download 2 , Essay
That was the beginning of Internet basic ideas, which gave birth to the idea of 'Gateway networks'. In the meanwhile File Transfer Protocols (FTP) were specified. (Internet, 2006a) In 1974 Transmission Control Protocol (TCP) was specified which further modified with the advent of Packet network Intercommunication - the basis of Internet Communication.
Preview sample
Intrusion Detection System Technology Essay
11 pages (3056 words) , Download 4 , Essay
Free
Systems that create traffic among the network are identified and blocked. Intrusion Detection is used to manage the system and the network in a secured manner. Intrusion may occur from various sources. (Endorf 2004).IDS must be capable of identifying the security threats and prevent them from affecting the system or network.
Preview sample
Network Infrastructure Assignment Technology Assignment
12 pages (3300 words) , Download 3 , Assignment
Free
Please consider that ambiguity of this scenario gives you freedom of choice and should be seen as a basis for your creativity. The existing network infrastructure consists of standalone LANs in both headquarters and not networked computer systems in other locations.here is no remote access to the company’s data. Both headquarters have an urge in establishing reliable and cost-effective printing solutions.
Preview sample
Bank Call Center Cybercrime Technology Essay
5 pages (1405 words) , Download 2 , Essay
Free
Criminal activities which involve the use of computers are referred to as cyber crimes. Cybercriminals see such operations as stealing financial information and hacking into other networks as a profitable business. There has been an explosion in breaches of computer securities which are employed in stealing financial information and money.
Preview sample
A New Computer System for Staples Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
This paper tells that with 65,000 talented associates, the Staples Company is committed to making it easy to buy a wide range of office products, including supplies, technology, furniture, and business services. With 2004 sales of $14.4 billion, Staples serves consumers and businesses ranging from home-based businesses to Fortune 500 companies in 21 countries.
Preview sample
Security in Computer Networks Technology Research Paper
5 pages (1580 words) , Download 2 , Research Paper
Free
Apart from the Internet that is the largest public data network, there are private networks such as Wide Area Networks (WANs) of companies connecting their offices located remotely as well as billions of Local Area Networks (LANs) within the premises that connect computers in a local environment.
Preview sample
Geographical Information Systems Technology Essay
12 pages (3000 words) , Download 2 , Essay
Free
During the last decade, there has been a sharp increase in awareness of the adverse impacts of mankind’s technological development on the environment. These actions are generating growing amounts of information on the phenomena and problems concerned and this is leading, in some areas of activity, to information management problems (Eden, 1992).
Preview sample
Appropriateness of E-Learning - ASDA and Telco Technology Essay
4 pages (1275 words) , Download 2 , Essay
Free
Generally, it is quite essential to highlight that with the advent of various effective courses in e-learning by Online Shopping giants like ASDA and TESCO, E-learning has become an effective means of education, providing varied services in the form of educational games, e-books, audio, videos, etc.
Preview sample
Virtual Agent Technology Technology Essay
7 pages (1750 words) , Download 3 , Essay
Free
According to the report technological advancements have come up with such skyrocketing techniques that can formulate the speech and can understand nuances of human languages. Thus it brought about Virtual Agents. The limitations are the various technologies that are required, to set this up in any organisation.
Preview sample
Computer Culture Development Technology Essay
4 pages (1236 words) , Download 2 , Essay
Free
These include information systems and many others which the innovation of computer devices replaces. It also includes the net, art, and Email, which are used forms of a communication system in modern technology. Berge states that technology changes both what we can do and what we decide is best to do; big shifts in culture cannot occur.
Preview sample
Hacking with Hacktivism Technology Essay
15 pages (4151 words) , Download 3 , Essay
Free
Hacktivism is the emergence of popular political action, of the self-activity of groups of people, in cyberspace. It is a combination of grassroots political protest with computer hacking. Hacktivists operate within the fabric of cyberspace, struggling over what is technologically possible in virtual lives, and reach out of cyberspace utilizing virtual powers to mold offline life.
Preview sample
1901 - 1950 results of 2683 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us