Tech & Engineering Essay Examples and Topics. Page 10

4,579 samples

Computing and Digital Media in 2050

The automation technique is based on the polar opposite and is integrated and decentralist, similar to how the machine structure human interactions.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1110

Smartphone Technology and Its Brief History

One of the ways that prove smartphone technology has impacted the global economy is the dramatic increase in the capacity to communicate and collaborate.
  • Subjects: Applications
  • Pages: 8
  • Words: 2212

Cybersecurity Dangers and Their Analysis

The officer clicks the file, and the malware attacks the system stealing the data and bypassing some security measures. The cyber security framework under the NIST is helping organizations to understand and manage cybersecurity.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2960

Data Buses: Definition and Key Features

The significance of the address bus is to assist the CPU in locating specific information in the memory, while the control bus regulates data processing.
  • Subjects: Data
  • Pages: 1
  • Words: 286

Analyzing the iPhone as an Artifact

At the time of the release of the first iPhone, it was a challenge for thinking and action for the whole world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1140

Sampling Resolution and Quantization

The spatial resolution of a digitized image is affected by the sampling rate, whereas the amount of grey levels in a digital snapshot is controlled by the quantization level.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 565

Maintaining the Temperatures for HFO Tank

There is the pump for supplying oil with the main function of enhancing the circulation of oil from the tank passing through a heater and back to the oil tank again; the temperature of the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1020

Top Microprocessors in Computational Biology

With the battle of which microprocessor is the best in the industry, the Intel Core i9-12900k and the AMD Ryzen 9 5900x stand out to take each other head-to-head.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 860

Trends in Embedded Systems

The area of embedded systems has received massive development because of emerging platforms dependent on computers and embedded systems for controlling and monitoring all matters autonomously. The evolution of IoT has occurred due to the [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1680

Phishing: Definition, Forms and Security Measures

A spear-phishing assault is when a hacker customizes an email using the victim's identity, role, organization, office phone number, and other details to fool the victim into thinking they are communicating with the actual sender. [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 617

The AutoCAD Software: Annotation and Tex

In relation to AutoCAD software, annotation as well as text aids in clarification and communication on the manner in which different types of information are displayed on drawings.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 282

Windows Server Installation and Configuration

The fourth stage is the configuration of Remote Access and Service. The logs are used to monitor the server activities and troubleshoot problems in the system.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 401

Pros and Cons of Distance Education

On the one hand, modernization of education allows it to expand the usual boundaries of transmitting and receiving information in the educational process while retaining all the integral components.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 512

Artificial Intelligence in Cybersecurity

The use of AI is regulated by a large amount of documentation, which should take into account the current legislation in the country of use and ethical issues related to AI, many of which have [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 585

Children Protection from Fire-Related Accidents

The city has an altitude of fifteen meters above the level of the sea and depends on lakes; Houston, Livingstone, and Conroe as the main sources of water.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1145

Metadata: Organizing Cars Photos

In that regard, the present report takes the subject photos of cars and provides an investigation of suitable methods for metadata organization of such collection.
  • Subjects: Data
  • Pages: 14
  • Words: 2634

Establishing a SOCC: The Best Practices to Follow

The role of the Security Operation Center is to prevent, detect, and respond to cybersecurity threats. The first practice that should be implemented at Sifers-Grayson is the establishment of a system for data extraction and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

Technological Innovation Effect on Urbanization

By the 20th century, as large-scale industrial production became effective, the idea of urbanization appeared, leading to the further growth of the world's leading cities. As such, the idea of urbanization is the cornerstone of [...]
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2475

Automated Catering Management System

It is a key part of future improvement as this information can be stored in the system and processed to promote positive change.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1104

Toyota Land Cruiser GXR: Model Description

The region and the use of the car will guide the owner on the required level of protection. The ballistic level of protection depends on the owner of the vehicle's requirements.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1118

The Importance of Database Design

It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
  • Subjects: Data
  • Pages: 3
  • Words: 548

Interactive Tools: Types and Its Benefits

In this modern day, it is important to remain competitive. Information technology and interactive tools are some methods which one can improve the online consulting process.
  • Subjects: Applications
  • Pages: 12
  • Words: 1586

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1175

Condenser Operation and Maintenance

The design of the surface condenser is such that steam is made to get its way into the condenser system through an opening at the top section of the condenser system after which distribution takes [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2202

Trusted Computer System Evaluation Criteria

The paper provides an overview of the concepts of security assurance and trusted systems, an evaluation of the ways of providing security assurance throughout the life cycle, an overview of the validation and verification, and [...]
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1399

Computer Technology: Databases

Databases are components of Information Systems that are used when the Information Systems have large amounts of a, especially when the interfaces in the Information System are interactive, and when users can access the system [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 576

Dependability of Computer Systems

In the dependability on computer systems, reliability architects rely a great deal on statistics, probability and the theory of reliability. The purpose of reliability in computer dependability is to come up with a reliability requirement [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3384

Computer Control System in a Laboratory Setting

In this case the iControl system is designed to control and monitor temperature variables of a hazardous liquid within a laboratory environment as well as other parameters such as smoke and light.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 786

Information Security and Privacy

At the dawn of the new technology and especially in this information age, protecting the same information is very crucial to it.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2546

Viruses and Worms in Computers

To prevent the spread of viruses and worms, there are certain precautionary measures that can be taken. With the correct measures and prevention, the spread of online viruses and worms can be controlled to a [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 521

Life, Achievement, and Legacy to Computer Systems of Alan Turing

Turing was quite influential in computer science development, in addition to setting the framework for the formalization of the algorithm concept, in addition to the use of the Turing machine that he developed, for computation.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 536

SAP Software Solutions Systems

The role of a Basis Administrator in an organization implementing an R/3 system is crucial as it is the Basis Administrator who runs the system, introduces it to the organization and all its employees, provides [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2318

Windows Vista vs. Windows XP

The new Windows Vista is highly recommended and it is mainly useful for a medium-sized information-service company and it rates higher than the current Windows XP for a number of reasons.
  • Subjects: Internet
  • Pages: 3
  • Words: 837

The Tractor Hydraulic System: Components

The valves also block fluid flow via the center when the hydraulic is in the aforementioned state. Valves also allow the flow of fluid through the center and into the reservoir during this particular.
  • Subjects: Engineering
  • Pages: 3
  • Words: 964

The Importance of Coding Analysis

In the survey conducted by the World Forum, about 91% of the employers involved in the study revealed the need for new staff with relevant technical proficiencies, and 51% reported the regular hiring of freelancers [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1111

The Rise & Fall of the Concorde

An investigation into the cause of the 2000 Concorde crash was crucial not only to the aviation industry but also to the assurance of the safety of future users of the aircraft.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1157

Whats Mean Robotics Welding

Epping and Zhang define robotic welding as the utilization of programmable systems and tools that mechanize and automate the way welding is done.
  • Subjects: Robotics
  • Pages: 2
  • Words: 601

Factors that Affect Control Valve Pressure Drop

Moreover, the pressure drop in a fluid that goes through a control valve is subject to numerous factors, relating to the design of aperture, type of fluid, piping system of fluid, temperature, and pressure.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1174

The Influence of Robots and AI on Work Relationships

In the early 20th century, Taylor's work focused on production management and labor efficiency, which led to the attention of managers to the problems of selection, the motivation of employees, and their training.
  • Subjects: AI
  • Pages: 3
  • Words: 903

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

File Sharing and Its Pros and Cons

The presence of file sharing enables businessmen and consumers to be aware of new products in the market. The presence of file sharing enables businessmen and consumers to be aware of new products in the [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 2221

Privacy Challenges in the Modern Age

Although proponents of these devices argue that their usage helps to acquire the necessary information regarding the customer use of their products and consequently enable them to improve on them, the use of RFIDS just [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 829

What Is a Flash Drive

This is not found in the other mentioned drives and hence when storing information it would be easy to know the size of free space left.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 765

Fire Safety Strategy for Multi-Storey Buildings

In serious fire outbreaks, the consequences can be very bad and often result in, business closure, the destruction of property worth lots of money, loss of livelihood, displacement, and damage of property, causality in human [...]
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2571

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

The Review of xDSL Technologies

The transceivers usually installed at telephone exchanges or central offices must be able to separate the voice and data traffic, the voice traffic is usually sent over the PSTNs while the data traffic may be [...]
  • Subjects: Phones
  • Pages: 11
  • Words: 3098

Technology and Lifestyle in the United States

The people of America has made well use of it and extracted the cream of these blessings to produce energy and speedy transport; all of which led to the building up of capital that has [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1449

Ethics of New Technologies

On the other hand, the right and duties act is of the opinion that ethical acts are the ones which acknowledges other individuals rights and duties imposed by such rights.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 826

Fire Prevention Measures and Technology

Most preferable, the alarm system should be installed in every floor of the building to alert the fire fighters incase of an emergency of fire In his article about fire prevention measures, Gary Taylor says, [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1320

Digital Storytelling Projects

As the author of the site noted, the project is the online meeting place for community digital storytelling advocates and facilitators.
  • Subjects: Internet
  • Pages: 3
  • Words: 815

Computer Security: Bell-Lapadula & Biba Models

Cybersecurity policies require the formulation and implementation of security access control models like the Bell-LaPadula and the Biba, to successfully ensure availability, integrity, and confidentiality of information flows via network access.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 882

Full Disclosure of the Vulnerability

This report discusses the causes of security vulnerabilities in the products, risks involved in the disclosure of a vulnerability, and the position of white, grey, and black hat hackers on the discovery and disclosure of [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2630

Oxford English Dictionary and the Wordnet Analysis

A number of other boxes are also provided and these boxes help to refine the search. So it is possible to set the search for a sequence such as first Operation A and then operation [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2147

The Cyberspace Behaviour of People

With it, the internet connection helped the organization know their employees more, helping them assess the working efficiency of each of the employees.
  • Subjects: Internet
  • Pages: 5
  • Words: 1297

Safety Management Systems in Aviation

Passengers booking non-refundable and unchangeable flight tickets do not have any incentive to notify the airline of their no-show, and the total weight of passengers are difficult to estimate before the date of check-in.
  • Subjects: Aviation
  • Pages: 2
  • Words: 1074

Disruptive Technology and Its Implications

As a result, their extensive use of smartphones denies them the opportunity of understanding the way they relate with these groups of people.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 580

Evie.ai: Artificial Intelligence and Future Workforce

That is why it is crucial to analyze some trends in artificial intelligence that are being adopted by many businesses for better functioning, in particular, the implementation of Evie.ai, its functions, and the consequences.
  • Subjects: AI
  • Pages: 4
  • Words: 1215

Evie.ai Company in Artificial Intelligence Market

The application of artificial intelligence to manufacturing and agriculture is gradually expanding from the commercial and service industries. The global demand for AI is high, and it is expected to grow exponentially.
  • Subjects: AI
  • Pages: 6
  • Words: 2455

Information Security Concepts and Policies

In addition, she argues that there has been an increase in the complexity of computers attached to these large networks; therefore, this has become a serious challenge because it is not easy to analyze, secure, [...]
  • Subjects: Computer Security
  • Pages: 20
  • Words: 336

Supercomputer Design, Hardware and Software

The advantage of shared memory is that it implies the existence of a unified space from which all the necessary data can be retrieved; however, different processors usually need access to certain kinds of data [...]
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1960

Cyber Theft and Internet Security Measures

This research paper will address the usage of the internet and how internet theft has continued to thrive as technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 595

Ship Unloaders and Belt-and-Bucket Elevators

These systems have an automatic sink-in device found in the HL-SKT as a component of the marine leg to ensure the best position when the unloader starts operations and, therefore, automatic unloading can be achieved [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1531

Electrical and Electronics Engineering Career

The main aim of the report is to enable the career consultants who will be acting as career advisors to be able to understand my career field and in the process, they will be able [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 621

Computer Technology in the Student Registration Process

The registration process became more efficient due to the reduction in the number of registration staff because they are only tasked with the transfer of the students' information to their respective departments.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 591

Pressure Drop and Full Models in Filtration Technology

Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2599

Office Automation Software in the School

Teachers of course play the role of providing the content to be used in the application and then it becomes the duty of software developers to come up with the complete software that suits the [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 548

Intelligent Input/Output Technologies

As it is mentioned above, the concept of I2O hardware architecture was developed by the Intel Corporation. This section is intended to compare the most significant advantages and disadvantages of I2O techniques.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 537

Commercial Off-the-Shelf Software

This paper considers the pros and cons of commercial off-the-shelf software when it comes to security risks; discusses the benefits and drawbacks of using the Common Criteria for Information Technology Security Evaluation; and offers an [...]
  • 5
  • Subjects: Programming
  • Pages: 3
  • Words: 907

Educational Policy Changes: Technology in Education

The goal of the policy change is to ensure that schools can adequately apply innovative technology, including devices and applications to engage students in the learning process and provide them with skills necessary to use [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 5123

Augmented Reality in Document Detection

It is these processes that have led to the creation of augmented reality. Hartl et al.also demonstrated the usefulness of augmented reality technology in verifying holograms by saying that the technology's use of multiple reference [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1651

Artificial Intelligence and Humans Co-Existence

Some strategies to address these challenges exist; however, the strict maintenance of key areas under human control is the only valid solution to ensure people's safety.
  • Subjects: AI
  • Pages: 2
  • Words: 658

Airlines’ Practical Guidelines in Procurement Process

This paper examines how airlines can maximize the usefulness of practical guidelines that can be used to implement a performance-based contracting approach in their procurement process and the value the aviation industry will acquire in [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1981

Heinrich’s Domino Safety Theory

In other cases, some employers tend to ignore the safety needs of their employees by providing unsafe working conditions, which eventually contribute to accidents within the workplace.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 298

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

Docebo and Talent Learning Management Systems

The biggest advantage of LMS is the opportunity to prepare substantial resources for educating the employees or students. DoceboLMS is a powerful and extendable SaaS incorporating a function of activating an Enterprise Cloud Solution application [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1401

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 919

Closed-Circuit Television Surveillance and Security

This aspect has led to the emergence of new forms of physical security systems to counter the changing security threats by improvising mechanisms of security threats perceptions and surveillance.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4207

Information Technology, Its Role, Pros and Cons

The work also gives ground for discussions related to the nature of technologies and their implementation in the majority of modern activities to increase their efficiency.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 554

Learning Objectives Implementation

With the advent of the internet, online courses have sprouted resulting in the debate on the two options, traditional class setting, and the online class.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 1013

The Wright Brothers’ First Flight

The given paper revolves around one of the greatest events in the history of humanity which predetermined the further development of science and society.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1131

The Impact of Nanorobots on the Society

With this the researchers envisage the use of resbots that would be deployed in the oil blocks just like the armies in order to gather important information for the explorers.
  • Subjects: Robotics
  • Pages: 8
  • Words: 2128

Collection of Environmental Data: System Designing

The scope of the study will be limited to data collection by the government agencies and members of the public. Engaging the public in collection of environmental data will help the government to identify some [...]
  • Subjects: Data
  • Pages: 22
  • Words: 5320

US and UAE Aviation Regulations Comparison

The aviation regulations in the UAE and the US require aircraft companies to conform to standards in operations to significantly reduce accidents.
  • Subjects: Aviation
  • Pages: 3
  • Words: 919

Cybersecurity: Stuxnet Virus

Cyber security is one of the major concerns of governments in the contemporary world. It is important to note that in case of Stuxnet the three aspects prove to be vulnerable.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1126

Technology Use among Children: Ethical Issues

The use of technology has triggered innovations and enhanced the skills of children and adults. Some of the contents in the internet are very dangerous to the children.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1378

How Technology Can Affect and Improve Policing?

It is critical to understand how technologies can influence policing because they can change the structure of police agencies, their functions, and goals.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 863

How the Internet is Changing Your Brain?

One of the most evident things that can be observed nowadays is that the Internet has a considerable impact on people, the development of relations, the ways of how information is exchanged, etc.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1128

Components and Aspects of Whistleblowing in Engineering

The purpose of this paper is to explore components of whistleblowing in engineering through case studies of notable cases in various fields and professions, including cases of Michael DeKort, Franz Gayl, and Diane Hartley.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4292

Aircraft Instrumentation and Systems

The report will explore the instrumentation used in aircraft and flight instruments. Through these discussions, hopefully, we will be able to understand the significance of the instruments and systems in the aircraft and the entire [...]
  • 4.5
  • Subjects: Aviation
  • Pages: 12
  • Words: 3310

VPN Security Vulnerabilities

The functionality, security protocols, and management policies of the network facilitate the safe and secure dissemination of information among users. It facilitates the creation of a virtual dialup private network that connects users to other [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2283

Internet Piracy and SOPA Act

At the end of it all, internet piracy will hurt the same people who are profiting from it because they will have fewer materials to sell or distribute in the future.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 559