Tech & Engineering Essay Examples and Topics. Page 10

4,380 samples

Attilio Ievoli Accident and Human Errors

The aim of this report is to present actual finding on the probable cause of the accident in which the 4,450 chemical tanker to run aground just some few moments after the change of guard [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2220

Space Shuttle Challenger’s Explosion Factors

A fault tree analysis can be used to identify and examine the major factors that led to the failure of the O-rings in the Solid Rocket Boosters. The failure of the O-rings led to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 836

Fire Incident in India

Fire codes aimed to maintain and inspect the use of different fire protection items to sustain active fire safety measures. Fire codes provided effective measures that encouraged residents to minimize the chances of causing fire [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 633

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1162

Civil Aviation Safety Authority Corporate Plan

Such issues as the current strategic position described in the document, the adequacy of the plan to the existing Australian aviation safety performance, the plan's strengths and weaknesses, are investigated; also, safety standards and guidelines [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 3384

PlayStation Product: Innovation Analysis

A specific technological innovation is the console used in PlayStation in the video games industry. The inclusion of the software in the PlayStation led to improved visual quality of the consoles.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1714

Education Technology Resources

However, it is not recommended to use it with elementary school students due to the complexity of the interface. It is possible to highlight some sections of the paper and leave a comment that will [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1725

Emergency Response Planning in the Airline Industry

The goal of this paper is to provide information about the concepts surrounding this issue and to look into the impact of emergency response on the reputation of an airline and legitimacy based on real-life [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 3558

Aviation Logistics Internship in the UAE

As a trainee in the department of aviation logistics, I was supposed to supervise the procurement and shipment of varied military resources.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3177

Manufacturing Industry Accidents: Causes and Protection

The first direct cause of the accident was the inexperience of the crane operator and the injured worker. The second direct cause of the accident was irresponsibility by the employees involved in the accident.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 617

Agencies’ Cooperation in Airport Security

The airport personnel is the first agency that has the responsibility to ensure security in the airport. The first thing that the airport personnel have to do is to confirm the identity of the passengers.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1636

Underwater Welding and Safety Measures

In the past decades, the safety of the underwater welding practice has been put into question, thus prompting the need to address the issue. The purpose of this paper is to provide a detailed report [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2773

Technological Development and Dependency

With rapid technological developments, many people are today concerned with the impact of technology in the life of the modern man.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 622

Artificial Intelligence and the Associated Threats

Artificial Intelligence, commonly referred to as AI refers to a branch of computer science that deals with the establishment of computer software and programs aimed at the change of the way many people carry out [...]
  • Subjects: AI
  • Pages: 14
  • Words: 3704

Remix Culture on the Internet

Thus, it is inevitable for a remix to face legal issues when a part of the original piece is copied, adapted, or reproduced without the agreement and permission of the copyright owner through a Creative [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2213

Technology Use among Children: Ethical Issues

The use of technology has triggered innovations and enhanced the skills of children and adults. Some of the contents in the internet are very dangerous to the children.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1378

Ethical Behaviour in the Engineering Workplace

In the engineering environment, the general quality of any role execution matrix is dependent of the culture of such organization since it drives the morale and action of those participating in the production function.
  • 5
  • Subjects: Engineering
  • Pages: 12
  • Words: 3300

Avianca Airlines Flight 052 Crash

The subjects to the controversy are the causes of the accident and whether it was at all preventable, the investigatory details and comments, the role of culture barrier, and the lessons learned.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 833

System and Application Software Difference

Both system software and application software are programs for the computers, but system software includes the programs that are provided together with the installation of the operating system for the computer.
  • Subjects: Internet
  • Pages: 2
  • Words: 581

Internet Evolution and Structure

The creation of the network was meant to be a security measure to ensure that data and information belonging to ARPA remained within the system.
  • Subjects: Internet
  • Pages: 5
  • Words: 1406

Singapore’s Cyber Crime Scene

The significant cybercrime perpetrators in Singapore are the youths who are techno-savvy, and about 80% of the whole population has been the victim of cybercrime.
  • Subjects: Internet
  • Pages: 3
  • Words: 798

Computer Hardware: Past, Present, and Future

Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1123

Components and Aspects of Whistleblowing in Engineering

The purpose of this paper is to explore components of whistleblowing in engineering through case studies of notable cases in various fields and professions, including cases of Michael DeKort, Franz Gayl, and Diane Hartley.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4292

Aircraft Instrumentation and Systems

The report will explore the instrumentation used in aircraft and flight instruments. Through these discussions, hopefully, we will be able to understand the significance of the instruments and systems in the aircraft and the entire [...]
  • 4.5
  • Subjects: Aviation
  • Pages: 12
  • Words: 3310

Accidents and Ramp Damage – Aviation

In order to prevent substantial expenses described afore, it is undoubtedly worthwhile for airlines and aviation companies to invest in ground operations safety and train all the staff working in the ramp and gate areas.
  • Subjects: Aviation
  • Pages: 2
  • Words: 560

Surveillance Cameras and Information Technologies

Certainly, the use of surveillance cameras presents those responsible for the management of information technology systems with data and information that would otherwise be difficult to come by.
  • Subjects: Internet
  • Pages: 5
  • Words: 1467

Online Research and Web Based Survey Methods

They are well-constructed surveys that take to account most of the requirements that credible research entails. These surveys are conducted over the internet and they involve samples of the exact population of interest.
  • Subjects: Internet
  • Pages: 4
  • Words: 1124

“The Most Human Human” by Brian Christian

In the introduction, the author outlines the genesis of his choice of the book's title by discussing the origin of the term, 'the most human.' Therefore, the introductory chapter gives the reader a strong base [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 843

Using E-Tools in Education

To be more exact, the teachers' ability to use the designated site and the tools provided by it to create an adequate assessment for the learners of Arabic language will be tested with the help [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2099

Information Technology Administrator Occupation

The tasks this person is involved with entails, discussing matters about information needs, the flow of information in the organization and definition of the system with the management/administration and the technical personnel.
  • Subjects: Internet
  • Pages: 2
  • Words: 885

“It’s a Flat World, After All” by Thomas Friedman

Information technology was and has remained critical in the realization of a global virtual village, which is marked by the ease of access to information from all corners of the world and the ability to [...]
  • 1
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2214

Technology in Modern World

Human cloning will lead to singularity in the sense that there will be no difference between the natural process of production and artificial production.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 604

Engineering and Teton Dam

In the case of the State of Idaho and the town of Rexburg, engineering innovation was needed to deal with the growing needs of an expanding township. The purpose of the dam was for the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1974

Pros and Cons of Waterfall Model

When the engineer and the client identify all requirements and the design, then the model can enhance superiority and security of the product.
  • Subjects: Programming
  • Pages: 7
  • Words: 2008

Steam Digital Software Distribution System

The relative successes of such companies create a competitive pressure for Steam as they either force the company to re-invent its products, or forces the company to consider reducing the price of its products, thereby [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 2011

Computer-Based Technologies That Assist People With Disabilities

The visually impaired To assist the visually impaired to use computers, there are Braille computer keyboards and Braille display to enable them to enter information and read it. Most of these devices are very expensive [...]
  • Subjects: Computer Security
  • Pages: 7
  • Words: 1995

PC Network Troubleshooting

For instance, simple restart of the program, sending the signal to the system in order to reload the initialization file restores the problem.
  • Subjects: Internet
  • Pages: 10
  • Words: 2780

Metadata and Tools in American Express

The ETL tool is used in the data integration section of the master data management implementation to alternate, standardize and transfer data to the master data management hub. Another factor that companies should consider in [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1478

Google Docs Challenges and Opportunities

In this paper, I will discuss the Google Docs as a one of the prominent tools for collaboration, and try to present the challenges that are faced in its implementation, and how they are overcome.
  • Subjects: Applications
  • Pages: 5
  • Words: 1483

The Global Revolution in Mobile

As earlier pointed out, users are currently able to use mobile phones with cameras and a huge amount of memory, and it is possible owing to the existence of 5G technology.
  • Subjects: Phones
  • Pages: 5
  • Words: 1392

Cryptology and Data Protection

The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 955

You Cannot Live Without Mobile Phones

Certainly, total refusal to use mobile phone in daily life is impossible, particularly for the representatives of Generation Y and Generation Z.
  • Subjects: Phones
  • Pages: 4
  • Words: 857

The Key Features and Objectives of an Incident Command System

In response to the disaster that occurred, the framework involved executing the activities that fell under the responsibilities of the incident commander, one of them being to establish the incident response program.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 828

Cloud Computing and Virtualization Technologies

Through cloud computing, the organization is in a position to access complex applications and enormous computing sources through the internet. Through cloud computing and virtualization technologies, the organization is likely to benefit from economies of [...]
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1109

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1864

Archives Unique Collections

The difference between the archival materials and the library materials is that in the archives,the materials are arranged in groups on the basis of their information content.
  • Subjects: Data
  • Pages: 10
  • Words: 2750

Advantages & Disadvantages of Using Technology in Education

One of the significant advantages of using technology is that it enables teachers to design and implement interactive course materials that could be used to enhance learning experiences that are more pleasurable and meaningful to [...]
  • 2.5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 571

The Infrastructure of Cloud Computing as a Service

Typically, the entire system of cloud computing drawing from its definition provides the infrastructure for organizations to offer clients services dynamically responding to their needs based on the pay-as-use basis, and the economic benefits which [...]
  • 5
  • Subjects: Cloud Computing
  • Pages: 15
  • Words: 4383

Phone Manufacturing Industry

In the next five years, the industry is expected to be affected by macro-economic factors as follows: With increase in population, the industry is likely to have an increased number of people with varying needs [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 631

Miniaturization Process Associated Risks

Miniaturisation is the process of continued minimisation of the sizes of devices and products. Privacy The reduction of the size of technological devices has made stalking and invasion of privacy an easy process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1539

Effects of the Internet

The dawn of the internet phenomenon has completely changed the way people conduct their daily activities. The above statements exemplify and amplify the benefits of the internet revolution.
  • Subjects: Phones
  • Pages: 3
  • Words: 746

Lean Burn Engine Technology

First, the excess air used in lean burn technology reduces the temperature of the combustion process and this lowers the amount of oxides of nitrogen produced by nearly half, compared to a conventional gasoline engine.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2773

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2970

Data Communication and Networking

So as to expound on this topic, this paper shall discuss: the term Internet; the three networks that were involved in the first test of TCP/IP protocol and conduction of the test; the standard used [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2821

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

Geotechnical Failure

The purpose of the preliminary study is to examine suitability of the study for the proposed construction, economize the design, assess ground conditions, and evaluate impact on the pre-existing neighbouring structures.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1964

The Popularity of Video Games and Their Benefits

Are the benefits of playing violent video games, on the one hand, and the benefits of playing pro-social video games, on the other, can be considered qualitatively different?
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3122

Blackberry Smartphone Consumer Behavior

Description of Internal Variables Consumer Personality: the personality of the consumer especially that of the middle class has a significant influence on the purchase decisions. With the brand and the specific outlet in mind, a [...]
  • Subjects: Phones
  • Pages: 7
  • Words: 2249

Extranet and B2B E-Commerce for Business

The risks to be considered by the Top Breadz team studying the solution are the following: Retail partners might not possess the proper or compatible Information Technology background to gain advantage of Top Breadz's new [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 1842

IT on Everyday Life

Many people have become too dependent on IT as a means of life, and this has made IT a major human need in many areas of the world.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1165

Turbo Charged Engines

The working principle of the Turbo charged engine A turbo charger used by an automotive is made up of a turbine, a compressor and a couple of common shafts.
  • 3
  • Subjects: Engineering
  • Pages: 12
  • Words: 3226

A Review on Cloud Computing: Concepts and Benefits

According to Rodriguez, several organizations establish community cloud to have common requirements and need to share infrastructure to understand the benefits and aspires to assemble ideologies of a digital ecosystem with the use of a [...]
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2768

Impact of Information Technology on Customers

Most businesses in the globe have adopted the digital way and businesses are sacrificing their time and finances to bring in advanced technologies to tackle and manage their processes within the business effectively and efficiently.
  • Subjects: Applications
  • Pages: 6
  • Words: 1642

Ethics and Nanotechnology

Although the development of nanotechnology is significant for the general technological progress of the contemporary science and it can meet the people's needs, from the perspective of their impact on humans, the achievements in nanotechnology [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1884

Hotels Cooling and Heating Systems

The first essential part of the system is the source of warmed or cooled air. It is the origin of all gases distributed within the system and in the rooms.
  • Subjects: Engineering
  • Pages: 3
  • Words: 831

Occupational Health and Safety Theories: La_Camera Restaurant

The recommendations offered for La_Camera include the use of more positive methods of enforcing occupational health policies, reduction in the use of the punitive measures, and the implementation of the measures to mitigate not just [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2729

Installing a Power Supply Back Up System

This is because, power required to run the oven and freezers for long should be available and if a power supply cannot produce that equivalent of power the tests will be invalid.
  • Subjects: Engineering
  • Pages: 3
  • Words: 811

Apple MacBook Pro

The development of Apple MacBook Pro can be seen as a great milestone in computer technology and specifically for the MacBook family and MacBook Pro line.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 792

Ethics and Computer Security

The introduction of computers and the internet in the 1970s marked the end and the beginning of a new era where human labour was no longer required in the production of goods and services.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1549

Smoke Alarm “Smart Smoke Detector”

Smart Smoke detectors will allow customers to evade the smoke detector and to reduce the annoyance of the alarm. This report examines extensively and pinpoints the expected process that Global Engineering will follow to achieve [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1092

Information Security of Information Technology

With the growth of information technology and its increased access, information security is a point of concern especially in regard to the transmission of the same.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2335

Security of Your Computer and Ways of Protecting

Authentication is used to mean that the information in the computer is only available and accessible to the authorized parties. This method is more effective as it can include hardware using multiple versions of software [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 545

System Administrators in Information Technology (IT)

As a technical IT officer you are the lowest level of the career and at this level you are in direct contact with the organizations computers and devices. There are a number of IT courses [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 893

Video Games Impact on Peoples Lives

These games have had a great influence in the minds of people, especially the children who have stopped playing the usual games on the fields to sticking on the computer and television screens playing video [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3703

The Evolution of the Personal Computer and the Internet

Due to the complexity of the subject matter it is necessary to digress once more and discuss briefly the history of the World-Wide-Web so that there is a clearer understanding of what it is all [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2435

Information Retrieval Methods

The search mechanism is the system that allows for the searching of the database for the retrieval of the information stored in it.
  • 4
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2493

Technology Siri for Submission

Voice recognition and generation, whether in the form of Siri or some other software, is a welcome and useful part of users' lives now.
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 614

Technology and Negative Effects

The unfortunate part is that people do not pay attention to the growing concern and continue using the social networks. All of this is impossible to see and feel over the internet or texting.
  • 1.5
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1442

A Review of Dover AFB C-B Crash 2006

The essay reviewed the chain of events that led to the mishap and measures that the pilot could have taken to prevent it.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2827

Information System

Office automation systems in this type of information system, tools or electronics improve on the efficiency of the employees and reduce the amount of work in an organisations office.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 660

The Technology’s Influence on Lives

In this essay, I will demonstrate the influence of technology in our lives first by looking at the current phenomenon of phone addiction and proceed to show its continued significance in the developing field of [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 810

BlackBerry: Customer Behavior Analysis

Also, Blackberry has cut a market niche as a business device, enabling the company to get hold of the corporate users and distinguishing itself from the rest of the market.[1] Consumer behavior attempts to evaluate [...]
  • Subjects: Phones
  • Pages: 5
  • Words: 1378

Creating a Strong Password

Users should create a password that contains secure relations to certain applications or tasks so that it will be easy to remember.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 605

Smart Grid Technology

The most common application of smart grid technology is in electricity distribution. In conclusion, smart grid technology has changed the way power is generated and transmitted.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

The History of Relational Database Technology

In 1980's the disadvantages associated with relational database systems and the need to increase capacity of manageable objects led to the invention of commercial object-oriented database systems.
  • 5
  • Subjects: Data
  • Pages: 8
  • Words: 2179

The Issue of Privacy

In the magazine article named 'Privacy and the Limits of Law', the author Ruth Gavison has pointed out that perfect privacy is impossible to be achieved most of the times with the emerging technologies in [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2208

Evolution of Fire Fighting Gear

The traditional shape of the helmet was created with a short brim on the front and a long brim on the back to keep embers and hot water from going down the back of the [...]
  • Subjects: Accidents & Protection
  • Pages: 12
  • Words: 3236

Nanotechnology Risk in NanoBatteries

When the nanobatteries are exposed to fire, the inhalation of the fumes may cause severe respiratory tracts inflammation in the upper region of the respiration systems, which can lead the damage of the lungs.
  • 4
  • Subjects: Engineering
  • Pages: 5
  • Words: 1524

Analysis of Boeing and Airbus

The strategy to meet the needs of the global market done by Airbus and Boeing companies has been on the basis of organizing its local Genuine Assets to work better than other companies, confronting the [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 1075

How to Use an Automatic Gas Cooker

Place the gas control knob on to the gas cock axis and push it inward firmly. Maintenance of your gas cooker Always clean the top of your gas cooker with soap and water and dry [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 623

PC Models Comparative Analysis

Design features are also quite strong in two of the computers; the 27inch Apple iMac as well as the HP Touchsmart.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1184

Global Information Systems (GIS)

Information on the country in which the organization operates is relevant to the organization because it provides the relevant information regarding the existing business opportunities in the country and the possibility of their exploitation.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2773

Impact of Modern Technology on Human Communication

However, this paper has also illustrated that there may be hindrances to communication which can arise from the abuse of modern technology in communication efforts by individual.
  • Subjects: Internet
  • Pages: 3
  • Words: 808

Is Technology Neutral?

Rather than attribute the loss of jobs to adoption of technology, it is more appropriate to blame the loss of jobs on the decision to adopt technology.
  • 3.5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 975

Relational Database Systems

This is a business report, personally addressed to the manager of the Easy Drive School of Motoring explaining why and how a relational database system will address the problems of the organization.
  • Subjects: Data
  • Pages: 6
  • Words: 1702

Computer Fraud and Contracting

The law does not provide the consumers with measures to enforcing the online contracts because the argument is that, it is impossible to tell the intention and the consent of the consumer when they signed [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1836

Hydraulic Engineering

One of the disadvantages with using canals for transportation was that the boats were easily damaged while on the double slipways.
  • Subjects: Engineering
  • Pages: 2
  • Words: 550

Inventions That the World Would Do Without

For instance, the invention of communication technology has been of great help to the entire world because of the convenience and reliability it has come with.
  • 5
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 568