Tech & Engineering Essay Examples and Topics. Page 10

4,317 samples

Cybercrime and Digital Money Laundering

The result of the investigation was the indictment of Western Express and a number of the company's clients for several charges including stolen credit card data trafficking and money laundering.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 574

Guitar Construction: Acoustical Features

It is at the front part of the guitar, and it is the most critical part of the instrument, because the back part and the sides of the guitar reflects the sound back to the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 891

Incident Command Models in the US, the UK, Qatar

The current paper will consider the basic features and the structure of the three incident command models or systems: the National Incident Management System, the Joint Decision Making Model, and The National Command Centre.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1903

The Printing Technology: Principles and Applications

It has been established that the thickness of the dead zone is in the range of tens of micrometres, which calls for a judicious estimation of the correct parameters to be used as conceptualised in [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1687

Cutting Tools, Their Failure, Use and Materials

Experts strive to develop materials that can work under high temperatures and forces while minimizing the proneness to wear of a cutting tool during machining operations.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1409

SmartProbe Air Data System and Its Advantages

The paper discusses the SmartProbe Air Data System in detail and the advantages that it has to a system. The system is additionally utilized due to the versatility that it presents and the adaptability to [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 834

Access Control System in the Dormitory Project

Also, the system must also capture any individual trying to access the door and relay that information to the cameras at the security control room. The project's scope involves the successful installation of the Access [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 711

Frequency Modulation, Its Applications and Future

The main reason the review of frequency modulation is the focus of the research is the rise in popularity of the digital media, which requires the novel approach and means of operation.
  • Subjects: Other Technology
  • Pages: 12
  • Words: 3371

Prescriptive Airport Security, Its Pros and Cons

It is also important to point out the fact that the current security procedures and protocols are based on a set of assumptions, one of which is that compliance with rules and regulations will allow [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3856

Automotive Industry’s Cybersecurity and Threats

It is significant to ensure the security of this system because it focuses not only on the audio and video entertainment but also allows to control navigation system and manipulate the behavior of the car.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1313

Kurzweil 3000 System Deployment

The awareness campaign should be focused on the key features of the product, its advantages over traditional learning methods, and the benefits of its implementation for the learners and, by extension, the improvement in the [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 923

Power Amplifiers: Aims, Classes and Theory

The main aim of power amplifiers is to transform a signal of a weak strength to a signal of strong strength and direct it into a load at significantly higher power.
  • Subjects: Engineering
  • Pages: 2
  • Words: 685

Pumps Concepts and History

The imbibing and suppuration nozzles in a single stage horizontal split centrifugal are integrally built in the lower half of the chamber and on the same horizontal centreline.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1344

Microsoft SharePoint as a Private Cloud App

The SharePoint allocation has the capability of efficiently replacing the sandbox and farm solutions thus, guaranteeing satisfaction to the administrators, users, and third-party application experts. In terms of the users' recompense, the SharePoint application enables [...]
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 602

The Information Technology Revolution

In order to set the stage for these discussions, it is imperative to clarify the meaning of ICT, as well as the meaning of revolutionary change.
  • Subjects: Technology Effect
  • Pages: 11
  • Words: 3090

Intrusion Detection and Prevention Systems

The First is the network-based IDPS, which monitors and analyses the packets in a particular segment of the network to identify incidents.
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1428

Technology Use in Classrooms: Pros and Cons

As long as the use of modern media by students is controlled by teachers and occurs as a part of the lesson and not the focus thereof, the specified tools can be viewed as a [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 856

Components and Aspects of Whistleblowing in Engineering

The purpose of this paper is to explore components of whistleblowing in engineering through case studies of notable cases in various fields and professions, including cases of Michael DeKort, Franz Gayl, and Diane Hartley.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4292

VPN Security Vulnerabilities

The functionality, security protocols, and management policies of the network facilitate the safe and secure dissemination of information among users. It facilitates the creation of a virtual dialup private network that connects users to other [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2283

Space Exploration Accidents: Challenger and Columbia

The failure in the joint of the elements of the rocket motor caused the Challenger catastrophe. The analysis of the accidents led to the development of a number of recommendations.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 828

Humanities and Computer Science Collaboration

Much attention has over the years been given to IS as a social science, and much has been published on the application of IS in the humanities, however, the gap in the reflection and theory [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3679

Salesforce.com: Cloud Computing

The firm also faced the challenge of demonstrating to its clients that it was dependable and safe enough to manage their corporate data and applications remotely.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 553

Technological Advances in US

The United State is the country that made the most significant technological contributions in the 20th century. The US underwent significant changes in the postwar period of 1946 to 1960.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 574

Is the Robotics Development Helpful or Harmful?

Robots remain the best option, as they will connect the children with the happenings in the school. They will dress the robot with their favorite clothes, communicate with the teacher using the robot, and swivel [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1172

Skype: All you Need to Know

A number of features of Skype comprise Skype to Skype calls, SMS messaging, video calls, immediate messaging, and the capability to forward calls to cell phones of the users when the user is offline.
  • Subjects: Phones
  • Pages: 5
  • Words: 1390

Computer-Based Technologies That Assist People With Disabilities

The visually impaired To assist the visually impaired to use computers, there are Braille computer keyboards and Braille display to enable them to enter information and read it. Most of these devices are very expensive [...]
  • Subjects: Computer Security
  • Pages: 7
  • Words: 1995

Discouraging and Eliminating Cyber Bullying

Resources Role of the resource/input Statement forms To facilitate information transfer to the staff Counseling Personnel To arm students against the problem Bullying report system To create efficient internet enhance report system Regulation implementation documents [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Database Management Systems in Charities

In conclusion, the research will identify issues associated with the use of database management systems in charities as well as churches and effective ways to handle these problems.
  • Subjects: Data
  • Pages: 7
  • Words: 1928

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Subjects: Computer Science
  • Pages: 35
  • Words: 2834

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

The Software Engineering Debate

The second reason the author adduces to his view that software development is not an engineering activity is the lack of standardized approaches to software development.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1148

Digital Signatures in The Business World

A digital signature is a cryptographically designed code that is attached to an electronic file to verify the authenticity of the sender.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 948

Pipeline Installation Elements

This must take into account the line size of the pipeline and the length of the barrel. Design Pressure The design pressure must serve as a basis for determining the thickness of the wall of [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2790

Webinars in Education

When it is night-time, some participants may be very exhausted and will not have the enthusiasm required to actively participate in the seminar sessions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 265

Construction Safety in Latino Community

The study seeks to: Examine the prevailing status of construction safety and accidents among male workers in the Latino community, especially in the construction industry.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3914

Voice Over Internet Protocol (VoIP)

For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2838

Legal and Ethical Issues in IT

The fact that technology keeps changing adds to the complexity of the ethical and legal issues surrounding information technology. One of the most significant ethical issues in information technology is that of appropriate use.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Article Review on Technology in Education

Teachers have employed digital teaching and learning methods to meet the needs of the students; however, a lot of problems that come with the adoption of technology in education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 590

Cyber Theft and Its Consequences

This research paper will address the usage of internet and how internet theft has continued to thrive as the technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3150

Bioinformatics and Biotechnology

The purpose of this study is to provide an overview of bioinformatics and to illustrate how bioinformatics can be utilised in the design of drugs and the enhancement of agricultural products.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2598

The Educational Promise of Social Media

The use of social media can only be useful if the students or children are closely watched and guided on how to make use of it for positive development.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 588

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

From Common Things to the Best Ideas

This was the beginning of the discovery of the concept behind gravitational pull. This is how Newton got the idea that there was something that makes things fall and this thing was a kind of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1013

Data Communication and Networking

So as to expound on this topic, this paper shall discuss: the term Internet; the three networks that were involved in the first test of TCP/IP protocol and conduction of the test; the standard used [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2821

Internet Key Exchange Protocol

On the other hand, a symmetric data encryption, also referred to as conventional data encryption, uses a common key to encrypt and decrypt data.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 828

Blu-Ray Triumph Over HD-DVD

HD-DVD war, Sony had an upper hand in their Blu-Ray discs that store 25GB on a single layer compared to HD-DVD having a capacity of 15GB on a single layer.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 702

Ethics in the IT Practice

These are among the issues which have necessitated the governments across the globe to collaborate and develop comprehensive and detailed laws regarding the use of information technology.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1416

Concepts of HP Laptops

The quality of HP laptops is not a selfish guarantee of aggressiveness in the market, but rather market protectionism and increased sales.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 665

Evolution of Fire Protection Codes

With regards to the findings in this research paper, the following hypothesis seems relevant: despite the gradual improvements made to fire protection codes, noncompliance and the challenge of dynamic nature of fire disasters continue to [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3864

Application of Technology in Education

Therefore, it is vital for educators to use the above spheres of learning in the application of technology in education. However, the spheres of learning are in constant conflict with each other in the lives [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1107

3D Printing Industry and Market

One can understand the industry of 3D technologies in terms of the software technology, the hardware and the nature of the products.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1672

IT on Everyday Life

Many people have become too dependent on IT as a means of life, and this has made IT a major human need in many areas of the world.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1165

Turbo Charged Engines

The working principle of the Turbo charged engine A turbo charger used by an automotive is made up of a turbine, a compressor and a couple of common shafts.
  • 3
  • Subjects: Engineering
  • Pages: 12
  • Words: 3226

Can Educational technologies improve learning?

From this perspective, amid considering various arguments and counter-arguments for and against the roles of educational technologies in the modern society in improving learning in schools, the paper argues that educational technologies can serve to [...]
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1964

Ethical Hacking: Bad in a Good Way

Introduction of personal computers led to the increase in the number of hackers as well as hacker targets were widened. Many hackers lack the skills to damage network systems in a major way.
  • 3
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1718

Effects of Internet Use in Society

Excessive use of the internet causes a person to feel lonely and depressed. The internet has provided the society with a lot of information both good and bad.
  • Subjects: Internet
  • Pages: 3
  • Words: 879

Apple MacBook Pro

The development of Apple MacBook Pro can be seen as a great milestone in computer technology and specifically for the MacBook family and MacBook Pro line.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 792

Virtual Reality Technology

The third negative impact of virtual reality is that it causes human beings to start living in the world of fantasy.
  • 5
  • Subjects: Other Technology
  • Pages: 2
  • Words: 610

Globalization and Digitalization

The tools that are necessary in the technological exodus from the traditional mode to higher fashions have posed a challenge in the labor force in relation to the level of expertise.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Importance of Chemical Engineer Profession

Most of the schools claim to lack some important resources to handle science lessons well, and that is one of the reasons of this campaign to influence both the teachers and the students to have [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1187

Internet Files Sharing

The tutor and the student are now able to communicate and exchange file over the internet in form of lessons, instructions, and assignments online.
  • Subjects: Internet
  • Pages: 4
  • Words: 1079

Improper Internet Use at Work

However, every company has written or unwritten policy for the use of internet and the employees must ensure that they: Comply with the policy Use internet in an acceptable way Do not create unnecessary risk [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1418

Technology and Negative Effects

The unfortunate part is that people do not pay attention to the growing concern and continue using the social networks. All of this is impossible to see and feel over the internet or texting.
  • 1.5
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1442

The best phone in the year 2013

Despite the stiff competition from other models such as the iPhone 5 and Samsung galaxy S4, the HTC-One Smartphone is ranked as one of the best Smartphones in the market.
  • Subjects: Phones
  • Pages: 4
  • Words: 1102

Technological Advances in Education

One of the biggest advantages that technology has brought in the field of education is global learning. It is a fact that technology has brought about massive improvement in the field of education.
  • 3
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2999

Ethics in Computer Technology: Cybercrimes

The first one is the category of crimes that are executed using a computer as a weapon. The second type of crime is the one that uses a computer as an accessory to the crime.
  • 5
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1334

Creating a Strong Password

Users should create a password that contains secure relations to certain applications or tasks so that it will be easy to remember.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 605

Children’s Game Analysis Project: The Sims

Being aimed at showing the daily activities of the family, the game is great in considering the roles of the family members and the distinguishing those in accordance with the gender roles.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 563

Aviation Fire Risks and Safety

The major difference in standards of competence between the two branches is that, the personnel of Aviation Fire Rescue Services, have a deeper knowledge in aviation matters that the Local Authority Fire Rescue Services.
  • Subjects: Aviation
  • Pages: 9
  • Words: 2456

Evolution of Fire Fighting Gear

The traditional shape of the helmet was created with a short brim on the front and a long brim on the back to keep embers and hot water from going down the back of the [...]
  • Subjects: Accidents & Protection
  • Pages: 12
  • Words: 3236

Fire sprinkler system

Objectives Ascertain the history of fire sprinkler system Portray the role of fire sprinkler system Establish the recommendations for improvement of fire sprinkler system Significance of Study This study is significant in identifying the growth [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3314

Subsidies in the Airline

A significant occurrence in the history of US commercial airlines was the enactment of the deregulation Act which removed most of the federal government's regulations imposed on the industry.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1652

How to Use an Automatic Gas Cooker

Place the gas control knob on to the gas cock axis and push it inward firmly. Maintenance of your gas cooker Always clean the top of your gas cooker with soap and water and dry [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 623

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

The Open Systems Interconnection Referencing Model

Layer 7: The Application Layer This layer is the interface between the user and the network. The layer "transforms the data from the session layer to provide a standard interface for the application layer and [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1508

Online Persona: Ethical Implications

For the purposes of this essay, let us accept that a fabricated online persona remains ethically unsound, as we consider the social harm this causes, namely, the perpetuation of crippling social stigmas, and the erosion [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 821

Dangers of Texting while Driving

The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • 5
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1123

The iPhone’s Main Features and Productivity

The sophistication of the iPhone is reiterated by Jacko who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 728

Is Technology Neutral?

Rather than attribute the loss of jobs to adoption of technology, it is more appropriate to blame the loss of jobs on the decision to adopt technology.
  • 3.5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 975

Are Hybrid Cars Worth It?

First and foremost what must be understood is that hybrid vehicles on average cost more than their primarily gasoline based counterparts, while it may be true that the hybrid car industry focuses on the fact [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2008

Machine Learning in Medical Imaging

Therefore, the clarification of the basic processes of the different topics of medical imaging, including X-rays, MRIs, and CT scans, will provide context for our investigation of machine learning in the next section.
  • Subjects: AI
  • Pages: 5
  • Words: 1250

Efficient Windows 10 Implementation Guide

The firm needs to upgrade and use the Windows 10 Enterprise operating system once it decides to upgrade. The first part will show the upgrade matrix and the security features of Windows 10.
  • Subjects: Applications
  • Pages: 5
  • Words: 1287

The Need for Physical Security in the Modern World

The adoption and integration of Internet of Things and Industrial Internet of Things devices have produced a network of Cyber-Physical Systems that is more interconnected than before, increasing the attack surface and hiding features of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1183

The Histogram Concept Definition and Examples

For example, through the creation of a histogram with the frequency of purchases and the class interval of age that shows the range of age groups in comparison with the number of purchases, marketers receive [...]
  • Subjects: Data
  • Pages: 2
  • Words: 596

Queuing Theory at Heathrow Airport

The arrival time, service and departure processes, the waiting regulation, the lineup size, and the customers being serviced are the six components that make up a line as it is studied employing queuing theory.
  • Subjects: Aviation
  • Pages: 3
  • Words: 946

The Aspects of the Artificial Intelligence

The goal of artificial intelligence, a subfield of computer science and engineering, is to build intelligent machines that can think and learn similarly to people.
  • Subjects: AI
  • Pages: 2
  • Words: 572

Aspects of the Fire Prevention and Safety

According to the 2019 International Building Code, materials and features in buildings need to be structurally fire-resistant to safeguard against the spread of fire and smoke.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 613