Tech & Engineering Essay Examples and Topics. Page 10

4,333 samples

Cell Phones While Driving: Is It Legal?

The message conveyed over the phone takes priority and driving takes a back seat which inevitably results in an accident, the severity of the same depends on more factors than one, the most important of [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 994

The Concept of Digital Divide in Society

The main issues that are discussed here is: The difference between the people who use internet and those who do not, the rights to computer, and the digital divide between men and women.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 1037

Warehouse Safety and Occupational Health

Materials/goods should be well placed on the forks and lifted correctly to avoid slipping and falling on people. Forklift should be driven slowly and both the fork and the loads should be kept low while [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1174

Agile Methodology for Software

The Agile methodology is complete in more than a few phases, the psychoanalysis section, the proposed stage, the completion phase, and the testing stage.
  • Subjects: Programming
  • Pages: 5
  • Words: 1387

American Connection Flight 5966

The NTSB found out that the cause of the incident was rooted in the pilots' inability to follow well-grounded procedures and thoroughly conduct and direct a non-precision approach at night in the instrument meteorological condition.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1591

Future of Airline Distribution System

In 2005, federal bankruptcy laws and fuel prices had the combined impact of sending Northwest and Delta into bankruptcy, and this is just a minor incident in the challenges and obstacles that America's airline industry [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2548

Electrical and Civil Engineering Analysis

Sakae M Light rail is a modern concept that is versatile in nature and it fits perfectly in the engineering visions of a bus and the heavy metro.
  • 1
  • Subjects: Engineering
  • Pages: 7
  • Words: 1740

Computers: Science and Scientists Review

It describes the levels of programming skills needed for different job concentrations and is required by employing agencies, additional skills of non-programming origin needed in these areas, describing of past work experience and its relevance [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 514

How Computers Negatively Affect Student Growth

Accessibility and suitability: most of the school and student do not have computers that imply that they cannot use computer programs for learning, lack of availability of internet facilities' availability also makes the students lack [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 611

How the Internet Has Affected Amazon.com

Looking at its location, and with a wide range of products it deals with, coupled with a high demand for its products in the world market, we have to appreciate the role played by the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 514

Effects of AI on the Accounting Profession

They aimed to find out how AI affects the performance of accounting professionals, investigate whether there have there been changes in employee attitudes toward AI, explore factors that could influence changes in the attitudes of [...]
  • Subjects: AI
  • Pages: 60
  • Words: 17991

Use of Robots in Computer Science

Currently, the most significant development in the field of computer science is the inclusion of robots as teaching tools. The use of robots in teaching computer science has significantly helped to endow students with valuable [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 858

Security Control Areas in Airports

The closed-circuit television cameras should be positioned at the entry and exit points labeled A in the airport plan to allow the monitoring of people.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1188

Impact of Technology on Human Lives

Thus, it is also true that technology contributes to the expansion of the generation gap and the erosion of human relations.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 584

Business Analytics. Can We Trust Big Data?

The advent of open source platforms such as Hadoop and later Spark has played a significant role in the dissemination of big data, as these tools simplify the processing of big data and reduce the [...]
  • Subjects: Data
  • Pages: 10
  • Words: 2836

Full Surface Fire Management at an Oil Refinery

Therefore, firefighters need to include several items in the planning steps to fight the fire. They are spraying neighboring tanks with water delays the spread of the fire to neighboring tanks.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 637

Technophobes and Their Fear of Technology

Technophobes assume that they will whether be laid off by the company or will have to commit to continuous learning, which to many people, is a big challenge on its own.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 432

Information Security Concepts and Policies

In addition, she argues that there has been an increase in the complexity of computers attached to these large networks; therefore, this has become a serious challenge because it is not easy to analyze, secure, [...]
  • Subjects: Computer Security
  • Pages: 20
  • Words: 336

Supercomputer Design, Hardware and Software

The advantage of shared memory is that it implies the existence of a unified space from which all the necessary data can be retrieved; however, different processors usually need access to certain kinds of data [...]
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1960

Technology and Causes of Using It

In this way, to a large extent, information sharing supported by contemporary technologies helped change the view of the world and make it more integrated.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 565

Moleskine Social Data Analysis

The Facebook data includes engagement statistics, Moleskine's posts, users' posts about the brand, and comments by both users and the company. The uniqueness of this information is in the disclosure of the way Moleskine communicates [...]
  • Subjects: Data
  • Pages: 3
  • Words: 500

IPhone 5S Instructional Manual

As indicated in Figure 1, the phone has a total of 12 features. In point form, the features are as follows: A face time camera.
  • Subjects: Phones
  • Pages: 5
  • Words: 956

Contextual Factors in Engineering

In the area of Knowledge and Skill Base, it is important to determine for the analysis such competence as "Knowledge of contextual factors impacting the engineering discipline"; and in the area of Professional and Personal [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 502

DELL and HP Machines Comparison

The two brands are known to produce good quality machines, and consumers prefer these models over the rest of the models in the markets.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Digital X-Rays: Recent Development in Radiography

The developments in digital x-ray technology have mostly taken place in digital detection technology, where images are created, scanned, archived, or stored in digital archives to allow for the easy retrieval of the images.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1456

Cybercrime and Digital Evidence

When a user searches for a music file by title or a musician's name, the user's request is sent out to all computers in the network, and a response list is generated to the user [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1234

Social Media in Education

Social media should become a part of the learning process since it is evident that it helps to enhance education by providing the means to share, receive feedback and use academic works in a way [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1370

Computer-Based Systems Effective Implementation

Under this methodology, there is a provision that gives attention to the needs of the people involved in the organization about the demands of the technology.
  • Subjects: Computer Science
  • Pages: 31
  • Words: 1241

The iPhone Usage for Educational Purposes

The artifact demonstrates how technologies can be used to meet different students' needs, assess their level of knowledge, and plan for the management of technology resources to organize the learning of parts of speech.
  • 5
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 892

Database Management System Process

In this process, the participation of end-users is critical in helping to minimize resistance to change that is brought about by the system in the rollout phase.
  • 5
  • Subjects: Data
  • Pages: 2
  • Words: 628

Internet Services, Connections, and Limitations

The third limitation of the current internet is language development limitations related to web development tools such as HTML, which are not efficient in the development of databases and online communication platforms.
  • Subjects: Internet
  • Pages: 2
  • Words: 927

Online Learning Space Creating Process

On the other hand, a community of practice has been known to mean a crowd of people who are in the same career or share the same interest.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1952

Computer Technology in the Student Registration Process

The registration process became more efficient due to the reduction in the number of registration staff because they are only tasked with the transfer of the students' information to their respective departments.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 591

Pressure Drop and Full Models in Filtration Technology

Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2599

Badrul Khan’s Web-Based Framework

Providing the opportunity of learning in any convenient manner, time, and pace as well as benefiting the instructor in terms of the idea of distributed instructions and assessment, the course focuses on both learners' and [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1110

The Modern Aviation Industry and Its Threats

However, the creation of a new digitalized environment can result in the appearance of new vulnerabilities due to the nature of the software and technologies used in airports to organize their functioning and guarantee appropriate [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 3205

Etihad Airways’ Forecasting and Ticket Ordering

In the aircraft industry, productivity is not hard to measure due to the transparency of annual reports and a rather visible impact of the core variables on the success of the company.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1427

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Aircraft Navigation History

First, people had to use the tactics they utilized moving on the land, but the use of radio, radar, and, finally, satellites enabled people to improve navigation significantly.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1097

TransAsia Airways Flight 235 Accident

The purpose of this paper is to review the Flight 235 accident, as well as to analyze the causes of its origin and the importance of the human factor, which made a critical contribution to [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2171

Television, Its Invention and Technical Evolution

The history of television involves the contribution of several engineers from different parts of the world. This paper seeks to explore the technical evolution of the television from its invention to the current developments.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1099

Graphic Card Industry and Evolution

A graphic card, usually, referred to as a video card or a graphic accelerator card is an electronic circuit installed on the motherboard inside the central power unit, mostly on Laptops and desktop computers.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2193

Tablets Instead of Textbooks

The emergence of tablets is one of the recent inventions in the field of education and it is clear that it is soon replacing textbooks. What are the benefits of using tablets in learning institutions?
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2003

Incident Command Models in the US, the UK, Qatar

The current paper will consider the basic features and the structure of the three incident command models or systems: the National Incident Management System, the Joint Decision Making Model, and The National Command Centre.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1903

The Printing Technology: Principles and Applications

It has been established that the thickness of the dead zone is in the range of tens of micrometres, which calls for a judicious estimation of the correct parameters to be used as conceptualised in [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1687

Artificial Intelligence and Humans Co-Existence

Some strategies to address these challenges exist; however, the strict maintenance of key areas under human control is the only valid solution to ensure people's safety.
  • Subjects: AI
  • Pages: 2
  • Words: 658

Using Cohesive Devices During the Course of Lectures

While the research objectives are relevant and the answers to questions put by Ali would benefit the investigation of discourse, the author's article incorporates a number of limitations connected with the flow of research as [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1137

Electronics Use and Impact on Children’s Health

This should not only be taken as a good and positive sign in the growth and development of the child but as a future influence in the learning and development of the child.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1194

Wireless Networks’ Historical Development

The paper concludes by describing the implications of wireless networks for different emergency agencies and the police. The history of wireless networks is "founded on the development of the first wireless telegraph".
  • Subjects: Internet
  • Pages: 8
  • Words: 2276

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

Frequency Modulation, Its Applications and Future

The main reason the review of frequency modulation is the focus of the research is the rise in popularity of the digital media, which requires the novel approach and means of operation.
  • Subjects: Other Technology
  • Pages: 12
  • Words: 3371

Nintendo Wii as an Innovative Product

The paper aims at analyzing the case and answering the questions regarding the nature of the innovation, aspects of the value proposition, and details of the used business model.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 879

Buncefield Oil Depot Disaster and Its Triggers

Still, the issue became critical only with time, as the filling of the tank continued, which resulted in the overflow that happened on the morning of the next day.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1413

Strategic Airline Alliances: Present and Future

Because of globalisation and the heightened competition, the airlines of the current world regard the essence of joining strategic alliances as crucial for bolstering their competitiveness.
  • Subjects: Aviation
  • Pages: 15
  • Words: 4167

Passenger Waiting Time Quality in Airports

Airport managers have to measure the level of performance in airport terminals in relation to the expectations of customers and the possible quality of services offered.
  • Subjects: Aviation
  • Pages: 3
  • Words: 943

The Importance of Virtual Learning Communities

The learning communities enable the instructors and the students to volunteer their questions. The virtual learning communities enable online degree programs to give students autonomy over the learning process.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1679

“Teaching Machines” by B. F. Skinner

The main purpose of the article is to show readers the process of development of teaching machines and the main principles of their work.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 859

How Technology Has Destroyed Jobs in Our World Today?

As pointed out by Rotman, the same technology that is apparently making work easier and helping to increase the level of productivity in business enterprises is responsible for killing jobs and getting rid of humans [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 850

Defects in the Motor Industry and Their Causes

Defects in the motor industry have been attributed to onboard software and algorithm used in the airbag deployment. Today, however, the mass defects involving software has just started in the motor industry, and many more [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 357

Manufacturing Industry Accidents: Causes and Protection

The first direct cause of the accident was the inexperience of the crane operator and the injured worker. The second direct cause of the accident was irresponsibility by the employees involved in the accident.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 617

Microsoft SharePoint as a Private Cloud App

The SharePoint allocation has the capability of efficiently replacing the sandbox and farm solutions thus, guaranteeing satisfaction to the administrators, users, and third-party application experts. In terms of the users' recompense, the SharePoint application enables [...]
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 602

Mobile Internet Consumption and Challenges

The advent of the mobile Internet is directly related to the development of mobile technologies. GPRS functioned on the principle similar to the ordinary Internet: the data was divided into packets and sent to the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 647

ISURVEY, Dub Interviewer, Voxco Online Software

The present paper undertakes a comparative analysis of three such data collection software namely iSURVEY, Dub Interviewer, and Voxco Online.iSURVEY is the versatile and reliable data collection software that supports unlimited devices and can be [...]
  • Subjects: Data
  • Pages: 3
  • Words: 895

Profiling and Maintaining Passenger’s Travel Experience

Governments and passengers are required to comply with international aviation standards and legal requirements that have further strengthened the need for more stringent rules to profile customers, leading to the accusations that profiling is intrusive, [...]
  • Subjects: Accidents & Protection
  • Pages: 24
  • Words: 5081

Smartphones Role in Lifestyles Changes

The fast and quick connectivity of smartphones to the internet provides a wide spectrum of understanding issues that individuals face in their professional and social lives. Creativity and innovation that smartphones facilitate lead to enhanced [...]
  • Subjects: Phones
  • Pages: 8
  • Words: 2330

The New Information System: Microsoft Access

The provision of the above-stated functions will go a long way in ensuring the data integrity of the organization and improve the system's performance. The ability to access different data sources is a primarily consideration [...]
  • Subjects: Data
  • Pages: 2
  • Words: 581

Web Privacy: What’s Happening Now?

In addition, he has noted that the government and other stakeholders are not in a position to control or regulate the use of the internet in their area.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1673

Intrusion Detection and Prevention Systems

The First is the network-based IDPS, which monitors and analyses the packets in a particular segment of the network to identify incidents.
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1428

Technology Use among Children: Ethical Issues

The use of technology has triggered innovations and enhanced the skills of children and adults. Some of the contents in the internet are very dangerous to the children.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1378

Watching TV Makes You Smarter?

Although it is true that watching TV and playing video games can be mentally stimulating activities, it is important to remember the value of selecting shows and video games that can help children accomplish the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 891

How the Internet is Changing Your Brain?

One of the most evident things that can be observed nowadays is that the Internet has a considerable impact on people, the development of relations, the ways of how information is exchanged, etc.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1128

Welding Underwater – Engineering

On the other hand, wet welding uses a system that allows a welder to weld an area that is in a wet environment. The use of under-sea robots is an emerging approach in under-sea welding.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1098

Components and Aspects of Whistleblowing in Engineering

The purpose of this paper is to explore components of whistleblowing in engineering through case studies of notable cases in various fields and professions, including cases of Michael DeKort, Franz Gayl, and Diane Hartley.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4292

Aircraft Instrumentation and Systems

The report will explore the instrumentation used in aircraft and flight instruments. Through these discussions, hopefully, we will be able to understand the significance of the instruments and systems in the aircraft and the entire [...]
  • 4.5
  • Subjects: Aviation
  • Pages: 12
  • Words: 3310

VPN Security Vulnerabilities

The functionality, security protocols, and management policies of the network facilitate the safe and secure dissemination of information among users. It facilitates the creation of a virtual dialup private network that connects users to other [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2283

The Systems Development Life Cycle

The Systems Development Life Cycle is a conceptual model for IT specialists to institutionalize system development through the conventional phases of planning for defining system development resource requirements, analysis for determining end user requirements, and [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 483

Online Research and Web Based Survey Methods

They are well-constructed surveys that take to account most of the requirements that credible research entails. These surveys are conducted over the internet and they involve samples of the exact population of interest.
  • Subjects: Internet
  • Pages: 4
  • Words: 1124

Integrating Educational Technology into Teaching

Educational technology is a process that consists of researching and practicing things which can make the process of learning easier, and the performance of students better.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 712

“The Most Human Human” by Brian Christian

In the introduction, the author outlines the genesis of his choice of the book's title by discussing the origin of the term, 'the most human.' Therefore, the introductory chapter gives the reader a strong base [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 843

Engineers and Ethical Dilemmas

Recently in the Kenyan media there was a situation in which a road engineer had been approached by the government to aid in the design and construction of a road in the Langata area.
  • Subjects: Engineering
  • Pages: 2
  • Words: 585

Technologies: History of Telephone

First, it is necessary to note that the telephone is a device used to communicate. When a speaker picks up the handset, switch hook is closed, and a direct current is sent to the line [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 571

Computer Science: Threats to Internet Privacy

Allegedly, the use of the Internet is considered to be a potential threat to the privacy of individuals and organizations. Internet privacy may be threatened by the ease of access to personal information as well [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1100

Skype: All you Need to Know

A number of features of Skype comprise Skype to Skype calls, SMS messaging, video calls, immediate messaging, and the capability to forward calls to cell phones of the users when the user is offline.
  • Subjects: Phones
  • Pages: 5
  • Words: 1390

Homomorphic Encryption: Communication and Security

Public cloud providers need the intervention of homomorphic encryption to promote security on the access of information. The access of information on the Internet may be dangerous because other competitors may be able to access [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 845

Diesel and Gas Engines in Armored Vehicles

While diesel engines can establish in lighter armored vehicles that need to run a significant number of kilometers, gas turbine engines are suitable for heavy offensive tanks and infantry fighting vehicles.
  • Subjects: Engineering
  • Pages: 2
  • Words: 570

Computer Games: Morality in the Virtual World

It is necessary to note that these sets of morals are often employed in the virtual world only as many people create alter egos when playing games.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 585

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Relational Database Management Systems

Relational database management systems improve productivity, speed and flexibility of data management in an organization through a design that encourages a clear boundary between the logical and physical aspect of database management system.
  • Subjects: Data
  • Pages: 2
  • Words: 615

Addressing Information Technology Access Challenges for Students

The main purpose of the proposed study is to critically evaluate viable ways modern distance teaching universities can employ to deal with the challenge of lack of access to information and communication technologies that are [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2269

Ethical Issues Surrounding Social Networking Sites

Social media can also be used to track the activities of users. It is important that measures be taken to control some of the ethical issues associated with social media, especially issues of privacy.
  • Subjects: Internet
  • Pages: 3
  • Words: 922

Cloud Computing and Virtualization Technologies

Through cloud computing, the organization is in a position to access complex applications and enormous computing sources through the internet. Through cloud computing and virtualization technologies, the organization is likely to benefit from economies of [...]
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1109

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1864

DATA and Information Security

According to Smyth, the consequences related to the loss of data that was in the custody of the organization demonstrate the vulnerability of the organization's information systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 604

Advantages & Disadvantages of Using Technology in Education

One of the significant advantages of using technology is that it enables teachers to design and implement interactive course materials that could be used to enhance learning experiences that are more pleasurable and meaningful to [...]
  • 2.5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 571

Cyber Theft and Its Consequences

This research paper will address the usage of internet and how internet theft has continued to thrive as the technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3150