Tech & Engineering Essay Examples and Topics. Page 10

5,747 samples

The Rise & Fall of the Concorde

An investigation into the cause of the 2000 Concorde crash was crucial not only to the aviation industry but also to the assurance of the safety of future users of the aircraft.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1157

Automation and the Future of Jobs

The suggested paper offers the analysis of two different opinions on the issue presented by Autor and Rotman in their articles, discussion of their arguments, and reflection on the future of people in the age [...]
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2776

Dubai Metro Project Stakeholders

The first group of stakeholders that should be considered for the Dubai Metro Project is the city community, who will be the ones using the system.
  • Subjects: Project Management
  • Pages: 2
  • Words: 589

Theoretical Approaches to Rootkits

The findings of the research demonstrate how to protect computers from rootkits, expose the legitimate uses of rootkits, and predict the future of rootkit computer security.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 988

Computers and Transformation From 1980 to 2020

The humanity dreams about innovative technologies and quantum machines, allowing to make the most complicated mathematical calculations in billionths of a second but forgets how quickly the progress of computers has occurred for the last [...]
  • 5
  • Subjects: Computer Science
  • Pages: 3
  • Words: 1058

The Concept of Artificial Neural Networks

The concept of artificial neural networks as a method of imitating the functioning of the human brain is currently defined as "a tool for predicting and modeling the phenomena that is inspired by the human [...]
  • Subjects: AI
  • Pages: 1
  • Words: 292

IPhone Product Life Cycle Analysis

The product life cycle is one of the most crucial methods describing the processes of development, introduction, growth, maturity, and decline of a product.
  • Subjects: Phones
  • Pages: 2
  • Words: 557

IBM SPSS Software Analysis

IBM SPSS is one of the statistical packages used for analyzing and interpreting data. Validity has two distinct sections namely the research section and the degree to which a test measures some data.
  • Subjects: Programming
  • Pages: 2
  • Words: 568

Dubai Wi-Fi: Connectivity and Communication in Public Spaces

Given the general goal of the project, the associated objectives include locating the public places where Wi-Fi connection will be provided and locating the activities for the feasibility study that will prove the potential of [...]
  • Subjects: Project Management
  • Pages: 27
  • Words: 4396

Design User Interface for a Mobile-Phone Application

The paper is developed in order to actualize a user friendly iPhone which will enhance the following: Intuitive interface searching for professional development tools; Utilize all the feature and functions in the iPhone; A lot [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 2208

History of the Personal Computer: From 1804 to Nowadays

The Analytical engine was a far more sophisticated general purpose computing device which included five of the key components that performed the basic of modern computers. A processor/Calculator/Mill-this is where all the calculations were performed.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1346

Flight Physiology and Human Factors Principles

In the situation where a pilot breathes in the air at high altitudes, there is usually insufficient oxygen pressure to allow ample quantities of oxygen into the casing of the lungs.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2485

The Effectiveness of the Computer

The modern computer is the product of close to a century of sequential inventions. We are in the information age, and the computer has become a central determinant of our performance.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1225

Target Audience for PS3 Console

They would be in the range of our target group, and they are the most likely ones to buy a more advanced console-PS3 also for the same reason.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 619

Multimedia Navigation and Usability

The user-centered design principle is to involve the end-users in the design decision process of a particular product. The use of words or pictures in relating a story is said to be infographics.
  • Subjects: Programming
  • Pages: 2
  • Words: 596

Spiral Model in System Implementation

In the era of the modern technology and fast development of the world, the implementation and the modernization of the updated and effective software programs has become of crucial importance.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1194

Routing Protocols: RIP, EIGRP, and OSPF

The scope of the current project entails the use of interior protocols such as RIP, EIGRP, and OSPF. One is Distance-vector routing and the other is Link-state routing.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

AutoCAD in Different Fields of Design Technology Study

In the engineering technology, CAD is overwhelmingly used from the conceptual layout and design, through a comprehensive engineering and analysis of constituents, to the definition of the various manufacturing methods used.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3092

The Increasing Human Dependence on Computers

Large amounts of information can be stored in the computer that is instantly available with the click of the mouse, which enables the ordering and tracking of resources in a very convenient and fast manner.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1443

Procurement in Project Management

This is one of the systems that are commonly used in procurement of various projects. When this system is used there is reduction of impact of work changes to work nature in the management of [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 705

Gimp vs. Photoshop: Comparison

When it comes to working in a commercial area where one is supposed to provide high-quality work in the field of images and the like, one tends to opt for Photoshop.
  • Subjects: Applications
  • Pages: 5
  • Words: 1405

The Origin of QWERTY Keyboard

It is called the QWERTY keyboard because of the arrangement of the alphabetical letters in the first row of the keyboard.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 535

DNS Security Technology: Security Investigation

The main mechanism of providing security to the specific information in DNS is DNS Security extensions, which guarantees original authentication of DNS data, its integrity and denial of existence.
  • Subjects: Cyber Security
  • Pages: 12
  • Words: 3419

Media Future and New Technology – Mobile Phone Culture

Contrasting the Internet, this has flickered panics of a "digital divide" flanked by the modern and the third world countries, as cell phones have become popular in the society, community or all over the planet.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2996

Project Management Development: Importance in Practice

Development can not be attained through the individual's choices and there must be well managed involvement of the organizations and corporations in the process so that the development can progress An important concern for the [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 3063

Hardware and Software Development Analysis

The 90-s was a real breakthrough in software development and it was mainly connected with the development of the Internet. The dominant software policy of IBM for a long period was standardized and open mainly [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Full Surface Fuel Fire at an Oil Refinery

It is important to establish the drainage of water from the fire and the removal of toxic substances to ensure the safety of the firefighting crew.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 941

House Fire Fighting Risk Assessment

As such, the objectives of the report are to identify general fire-related dangers as well as those specific to houses and compare them to each other to understand their severity.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1507

Mobile Wireless Internet vs. Wi-Fi

The following paper will compare and discuss the advantages and disadvantages of regular 3G and Wi-Fi connections to the World Wide Web.
  • Subjects: Internet
  • Pages: 3
  • Words: 902

Electronic Commerce and the Social Enterprise

The first security measure that is available for protecting the customer is the encryption of the online store. The third measure is the use of a password manager.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 574

Information Technology Project Management

I aspire to join this Master's degree program since it will help me develop the expertise in various areas of project management and real estate.
  • Subjects: Project Management
  • Pages: 2
  • Words: 566

Libraries as Quality Sources of Information

Libraries remain to be imperative repositories despite the fact that the internet is rich with information because most of the credible academic sources require purchasing.
  • Subjects: Data
  • Pages: 2
  • Words: 585

ACL Fraud Detection Solution

A midway oversaw additional backing forms that make it simple to keep up the quality and respectability of the location investigation and investigative results.
  • Subjects: Data
  • Pages: 2
  • Words: 594

Technology in Education and Medicine

Also today, courtesy of technology, students with learning disabilities can participate fully in the learning process using assistive learning techniques and programs.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Online Solution for Education

If one intends to cite a source from a blog, he or she should verify the credibility of the source of the post. To ensure the credibility of a blog, one should consider the credibility [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 1091

Thomas Friedman on Globalization and Information Technology

Freidman explains that the convergence of technological innovations especially information technology tools such as the internet and the mobile phone, and political occurrences such as the fall of the Berlin wall as well as the [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1447

Science and Technology Impact on Globalization

Globalization has by now laid down the phase for this epoch through making the world interrelated further and the tools of empowerment available to all."To start with, Globalization refers to the trend toward countries joining [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 826

Avianca Flight 52 Accident and Its Reasons

However, at the same time, the pilots managed to reach their destination point and were ready to land, though dispatchers of the airport did not allow them to do it, not understanding or ignoring the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 839

Electrical and Electronics Engineering Career

The main aim of the report is to enable the career consultants who will be acting as career advisors to be able to understand my career field and in the process, they will be able [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 621

Digital Technology and Marketing Communication

The new technology brought in by the fourth industrial revolution will transform the entire process of production, business management and organizational structure.
  • Subjects: Technology Effect
  • Pages: 13
  • Words: 3579

Physical Security Approaches in Aviation

However, the multi-layered security system the dominant approach to airport security is nowadays being criticised as consuming an excessive amount of money and resources; an alternative has been proposed in the form of a risk-based, [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3861

Internet for Learning and Knowledge Acquisition

Due to manifold effects of technological innovations, education has undergone significant and positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1376

Concept of the Denial-of-Service Attacks

Therefore, it is important to understand the concept and classifications of DoS attacks. Notwithstanding the reason, the inability of individuals to access services they are qualified for is called a DoS attack.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1104

Laser Communication Links in Space

Inter-satellite laser communication is also a great prospect to explore, as there are no obstacles in space that could impede or reduce the effectiveness of a laser beam.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1922

Risk-Based vs. Traditional Aviation Security Models

On the whole, it is hypothesised that the implementation of the risk-based, outcomes-focused approach to aviation security will allow for attaining a considerable advantage in comparison to the traditional, prescriptive aviation security model.
  • Subjects: Aviation
  • Pages: 14
  • Words: 3896

Agile and Waterfall Models in Project Management

Agile is a system of ideas and principles of flexible project management, and Waterfall is a project management technique that involves a steady transition from one stage to the next without overlaps and returns to [...]
  • Subjects: Project Management
  • Pages: 13
  • Words: 3687

Regulatory Requirements for Flight Crew: US and UAE

Considering the volume of air traffic, airports, and operators in the US, the FAA has extensive rules and regulations. To a large extent, GCAA has followed the rules and regulations of the FAA on many [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2314

Project Cost Management: Global Issues and Challenges

The information revealed by the author is likely to be beneficial for those individuals who are occupied in various fields but provide cost management services in the framework of the global construction industry.
  • Subjects: Project Management
  • Pages: 3
  • Words: 884

Computer Viruses, Their Types and Prevention

A memory-resident virus is one of the most resilient types of viruses out there since it resides in the RAM of the computer and comes out of stasis every time the computer's OS is activated.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1108

Security Management: Addressing Challenges and Losses

Indeed, designing the strategy that would allow introducing people quickly and efficiently to the essentials of security in the workplace, as well as in their private use of the Internet and the related resources is [...]
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1114

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

The Process of Arc Welding: Main Aspects

The welding process is so broad that mechanical engineering as a discipline is part and parcel of it. Within the process of arc welding are other types which are described below: In this process, the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1155

Prescriptive Airport Security, Its Pros and Cons

It is also important to point out the fact that the current security procedures and protocols are based on a set of assumptions, one of which is that compliance with rules and regulations will allow [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3856

Disney Resort Crisis Communication Plan

When dealing with an emergency, the head of crisis communication has to carefully follow a crisis communication plan. He or she will compile a list of key publics that have to be notified of the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1987

Sliderocket Use in Education: Step-by-Step Guide

For instance, to add a picture, click on the 'Picture' icon and select the location of the picture. Select what to import, whether PDF or PowerPoint and click on the 'Next' button as shown below.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1638

Computer Based Learning in Elementary Schools

The main purpose of the research is to consider the background of the chosen sphere, the elementary education, and discuss current business issues in the computer technologies which may be used in the sphere and [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2230

Centralia Mine Disaster and Public Administration Failure

Scanlan, who was the district inspector at the time, identified the hazards surrounding the coal mines and reported his findings about a possible explosion to other relevant professionals. Scanlan should not have taken heed to [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1120

Egypt Air Hijack and Its Impact on Aviation

This incident led to the sudden closure of the airport. Several negotiators were involved throughout the event to secure the lives of the 56 passengers in the hijacked aircraft.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1408

Literacy Through iPads in Early Education

In the article, Beschorner and Hutchison, note that in the 21st century, children gain access to written language very early due to the use of digital devices.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 571

T-Shirts Project’s Quality Management Initiatives

The project environment and the chances to improve the quality of the project have to be identified and analyzed properly because this plan is one of the last chances to achieve success and create a [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2840

Airport Security and Air Travel Safety

The study was based on an evaluation of the evolution of airport security with respect to the general safety of this mode of transport.
  • Subjects: Aviation
  • Pages: 12
  • Words: 3316

Screwdriver – Mechanism Description

The fulcrum shank of a hex nut screwdriver is a metallic rod that is attached to the handle of the screwdriver and ends with a blade.
  • Subjects: Engineering
  • Pages: 2
  • Words: 579

The Regency Plaza’s Project: Definition Phase

The evaluation is carried out on the basis of the scope, time, and cost of the project. In addition, the frequency of alterations made on the project is seen as a major impediment to the [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 893

Texting’s Importance for the Society

Debate on whether texting is good or bad continues to prevail across the world, especially with the extensive growth in the use of mobile telephony in the 21st century.
  • Subjects: Phones
  • Pages: 6
  • Words: 1719

Virtual Private Network’s Project Management

The projects have become important due to the need to adapt to the advancements in technology. Despite the organization's success in the industry, data and network security issues have greatly affected its operations.
  • Subjects: Project Management
  • Pages: 3
  • Words: 880

The Ballpoint Pen: Materials, Process and Issues

This essay explores the geological information of the raw materials, the processing steps and the environmental issues. With the raw materials ready, brass is obtained from a mixture of the two, with copper dominating the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 645

Hershey Corporation Project Management

Hershey outsourced the services of three firms to aid in the implementation of the ERP software. An effective criterion to determine the success of the project is necessary in order to evaluate major milestones in [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2746

Project Simulation and Management

In this context, the main focus is on an efficient schedule, on the work of high-qualified team members, on the balanced distribution of tasks appropriate for team members and their competence levels, and on the [...]
  • Subjects: Project Management
  • Pages: 5
  • Words: 1375

Digital Temperature Controller Effectiveness

The project aims to demonstrate the functioning of the digital temperature controller, which has the ability to control the temperature of machine and electronic devices in industries.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1475

The NBA 2K Game as the Element of Popular Culture

Despite the original aim of producing the series of popular video games NBA 2K is a popularization of basketball among the representatives of the modern situation, the release of the series also focuses on advertising [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 555

Multitouch Devices Usefulness in Society

The purpose of the study was to outline the various problems multitouch technology encounters, its features, and usefulness in society today.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 869

American Airlines 1420: Accident Overview

Because of the thunderstorm and heavy rain on the way, the pilot did not manage to land the plane safely, and it crashed after the overrunning the end of the runway.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1385

VPN Security Vulnerabilities

The functionality, security protocols, and management policies of the network facilitate the safe and secure dissemination of information among users. It facilitates the creation of a virtual dialup private network that connects users to other [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2283

The Road Side Service Business Plan Project

The idea of starting a road side cab services business was driven through our minds due to the fact that it is a highly profitable business based on the fact that many people are becoming [...]
  • 5
  • Subjects: Project Management
  • Pages: 15
  • Words: 3662

Integrating Educational Technology into Teaching

Educational technology is a process that consists of researching and practicing things which can make the process of learning easier, and the performance of students better.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 712

Technological Advances in US

The United State is the country that made the most significant technological contributions in the 20th century. The US underwent significant changes in the postwar period of 1946 to 1960.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 574

Automation in the Aviation Industry

Even though automated systems increase the efficiency of operations in the aviation industry, automating the roles of first officers is a bad idea.
  • Subjects: Aviation
  • Pages: 2
  • Words: 627

Postman’s Concept of Technology

Imagining one's life without a mobile phone, for example, is practically impossible for most of the present-day citizens; in addition, with the advent of the internet, and the incredible availability of information, the power of [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1414

Securing Wireless Networks

The first risk that is specific to wireless technology is infiltration of an access point. If the access point of a wireless network is left unsecured, unauthorized people can gain access to the network's resources.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 590

Skype: All you Need to Know

A number of features of Skype comprise Skype to Skype calls, SMS messaging, video calls, immediate messaging, and the capability to forward calls to cell phones of the users when the user is offline.
  • Subjects: Phones
  • Pages: 5
  • Words: 1390

Emerging IT-Related Technology’s Ethical Issues

The 21st century is marked by the development of information technology and the emergence of IT-related technologies. The ethical dilemma under research is privacy and confidentiality on the application of emerging technology such as online [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 589

Pros and Cons of Waterfall Model

When the engineer and the client identify all requirements and the design, then the model can enhance superiority and security of the product.
  • Subjects: Programming
  • Pages: 7
  • Words: 2008

PC Network Troubleshooting

For instance, simple restart of the program, sending the signal to the system in order to reload the initialization file restores the problem.
  • Subjects: Internet
  • Pages: 10
  • Words: 2780

GIS Applications and Data Types

The use of a square grid to locate features in a defined location Ground survey and GPS is used to pick vector images Optical scanners mainly used to gather raster data.
  • Subjects: Applications
  • Pages: 2
  • Words: 511

Technology Evolution in The Modern Society

Service perspective - which holds that e-commerce constitute a tool that fulfills the needs and desires of companies, customers and management with aim of reducing the transaction costs while at the same time being able [...]
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4289

Concept of Steganography in Society

The clandestine communication is attached to the carrier to create the steganography medium. The recipient of the message had to trim the messenger's hair to retrieve the communication.
  • Subjects: Internet
  • Pages: 11
  • Words: 3157

Project Management – House Refurbishment

A contractor outlines the objectives of his/her mission, and the components that are required to execute the project. By the time the work is completed, the project contractor and the owner of the house will [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 564

Dispute Resolution Mechanisms

Therefore, the article gives the contractor the power to communicate in writing to the engineers and inform him of any proposed changes that will ensure adverse impacts of various situations are minimised or eliminated.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1219

Archives Unique Collections

The difference between the archival materials and the library materials is that in the archives,the materials are arranged in groups on the basis of their information content.
  • Subjects: Data
  • Pages: 10
  • Words: 2750

Miniature Camera on Soccer Shirt

The issue is that some of the motions and rapid movements may lead to confusion, and it is paramount to take all the necessary measures to make sure that the level of stability of is [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1664

Instruments to Collect Data

The representation of data should be done in a way such that the purpose of the research will be evident from the data displayed on the graphs and charts.
  • Subjects: Data
  • Pages: 2
  • Words: 585

Effective Project Management Practices

A project scope encompasses the entire task involved in the creation of the products of the project and the processes that creates them and also the processes that are involved in the definition and controlling [...]
  • Subjects: Project Management
  • Pages: 8
  • Words: 2303

Project Management: Order Processing System

The sales department basing on the directive by Benhams chief executive produced a project brief on behalf of the Board of Directors which was subsequently passed to the project team to evaluate the viability of [...]
  • Subjects: Project Management
  • Pages: 11
  • Words: 2055

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

Strategy And Controls In Information Security

An attack could comprise any of the following categories or a combination of any of them: Fabrications, which means adoption of some deceptions to play a trick on the unaware users of a system; Interruptions, [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1319