Tech & Engineering Essay Examples and Topics. Page 10
The whole issue necessitates concerted efforts from all humans and the acceptance that people's knowledge is limited for the realization of a real solution.
It is helpful to consider if the research question addresses treatment, prevention, prognosis, early diagnosis, or the investigation of the root cause while using the PICO format to create one.
One of the challenges in reducing food waste is the lack of knowledge about food waste and how to reduce it.
By offering training programs to the employees, OCBC increased the knowledge of staff members on how to detect, manage and even respond to cases of cyber-attacks to prevent the organization from incurring losses.
While most of the systems would be in the hands of private companies, the department will go further to formulate and set the necessary standards for pursuing cybersecurity efforts.
The camera industry has been disrupted due to smartphone technology because of the improved camera experience and the cloud's capabilities, thus, companies are recommended to adopt measures such as software implementation to avoid being eclipsed.
Other key tasks and considerations in the planning phase include the identification of key activities contained in the critical path and the creation of the risk register.
The IT governance board is a body given authority over all matters related to IT by the corporate board, and as such it is required to comply with regulations and standards as required by the [...]
The live streaming features make it different and of high quality standards, especially by being mobility and handheld through its operations and streaming.
In conclusion, the cyber security risks of using low-code no-code platforms can be significant. While users find it easy to design software without much skill in programming languages, they should understand the security implications of [...]
This philosophy fits the goals of this research paper perfectly because there are a large number of companies and regulations in the aviation industry, including those dependent on the state affiliation of the airline, and [...]
In order to boost the efficacy of a data breach response strategy, corporate workers must be trained and made aware of the situation.
First, if the results of these interviews are to be used to validate the entire study, ethical approval is required of the participants. Are there tangible differences in the implementation of anti-terrorist measures during takeoff, [...]
The Confirmation, which is the primary key, satisfies part of the relation condition, requiring all the rows in a table to be uniquely identified by at least one attribute.
The introduction of this paper presents the basic principles and ideas of Quantum Computing. It is a cornerstone of quantum theory and the basics of Quantum computing.
The main function of the system is to make the process of the end user and vendor communication as simple as possible since the functionality offered in the app is limited to that which is [...]
The gaming industry originated in 1962, at the Massachusetts Institute of Technology, where several members of the Tech Model Railroad Club, led by Steve Russell, on the world's first computer with an electronic display PDP1 [...]
The migration from the analog to the digital world was viewed as a major milestone in the management of data. The use of machine learning and data analytics can be applied to cyber security.
The objective of the current research is to offer a detailed review of industry practices and literature in correlation with resupply missions for spaceflight to Mars, the Moon, and beyond.
Although the Duolingo App contains many features, it is easy to use and satisfies the expectations of the majority of users.
It can lead to severe harm and can be recovered by applying extra cost, time, and effort to remove the viruses from the computers. The change in leadership led to a restructuring of the entity, [...]
The benefits of digitization contributed to the development of the tools and devices that have now become part of every component of the environment of the connection of things.
Due to the theoretical orientation of this research, most attention is paid to the first two: the assessment of the environment, the definition of the main objectives, and the collection of the necessary information for [...]
The purpose of the study was to test the usefulness of grounded theory in aviation training. The sample was substantiated by the professional activity and the role of the subjects in the military educational institution.
The campaign will focus on the favorable view of the Uber Eats app's success stories and its customers, which include restaurants and grocery shops.
PhET simulations employ images and simple controls like click-and-drag operations, knobs, and dialog boxes to portray what is unseen to the eye in order to aid students in visualizing topics.
The advent and improvement of new technology are crucial to realizing the finite opportunities in the various contexts of society. In conclusion, the advancement of new and sophisticated technology has been of significant positive influence.
The rising tensions between the North Atlantic Treaty Organization and the Russian Federation have heightened the risk of cyber-attacks. As in Figure 1, the consequences are severe in the event of a successful assault since [...]
As for human face recognition, security is not the focus of this study, but it may be used to track the number of visitors to help calculate attendance, desired capacity levels, and income.
The OS is not the same as the information system, as the OS is a component of the IS. The Mac OS remains vulnerable to the same risks as Linux and Windows, although the probability [...]
Therefore, the clarification of the basic processes of the different topics of medical imaging, including X-rays, MRIs, and CT scans, will provide context for our investigation of machine learning in the next section.
The components of the source, the vendors, and the origin of the software-intensive system are the key drivers of the outcomes of a component sourcing option.
I believe Windows 10 Pro is the best and most advanced version of Windows currently available. Similarly, when a new update is downloaded, Windows 10 Pro notifies users before installing and restarts to avoid work [...]
I will then write a scientific report on the project, create a presentation, and publish it to make it available to the scientific and engineering community, utilizing the skills I learned in the scientific writing [...]
The mass appears to push outward due to its inertia in the case of a spinning system because the centripetal force pulls the mass inward to follow a curved path.
In order to provide advantages to the educational process with the help of this innovation, it is necessary to study it and work with third-party specialists carefully. One of the varieties of using ubiquitous computing [...]
It is possible to assume that blockchain is the innovative technology that revolutionized the financial system and the system of informational exchange in recent years.
The firm needs to upgrade and use the Windows 10 Enterprise operating system once it decides to upgrade. The first part will show the upgrade matrix and the security features of Windows 10.
One of the appeals of handwritten notes involves the ability of a student to exploit the brain's nature to remember key concepts relative to the exhaustive scripts.
Grace Hopper was also the one who shared her knowledge with society and made a contribution to the autonomy of machine functioning.
However, both T&R Staff and Associated Press acknowledge that there are risks associated with the current state of cryptocurrencies, which is why they suggest adopting the technology but not the existing forms of electronic money.
The different additional features to be introduced by MetaSpace, the risks and solutions associated with it, and how the identified potential vulnerabilities will be solved form the basis of discussion for this paper.
When AllDone's software developers lacked the resources to create and develop an automation process, the team of employees performed what the writer referred to as computational labor.
Deliverables exist as working proof of the project's progress, a way to display active effort on the part of the company to its stakeholders and consumers. Instead, outcomes are an objective recording of the effects [...]
In the past, the aspect of achieving a general agreement on the data, decentralization, distribution, and trustlessness was the major issue that made the concept remain unfit and reliable.
This fraud is widespread in the Computer science industry, and much attention is paid to it. In the case of the older generation, care and concern should be given to their relatives.
To support the organization's growth plan, the following elements must be in place: A scalable payroll system is an employee payroll system that can adapt to staffing demands and increase the functionality of timekeeping as [...]
It will lead to more hours spent in games and, thus, increase the probability and strength of addiction. In the case of online games, social and game addictions are combined.
Due to the convenience of the user not having to identify the source of the contents, the Internet is now being used to distribute pornography.
The paper focuses on the process of issuing and managing digital certificates, discussing the weaknesses and vulnerabilities of different methods and the issues with revoking certificates, and possible remedies.
On the one hand, machine learning and AI are able to determine blood types, time required for transfusion, and the volume of the blood needed for a certain patient.
Since personal agency and the sense of freedom and responsibility that it involves are vital to moral existence, the possibility of depersonalization posed by the widespread usage of VR poses a huge potential ethical dilemma [...]
However, during the first and second industrial revolutions, innovations in technology in terms of software and hardware accelerated to unprecedented levels. The fifth component is human resources which are needed to operate the hardware and [...]
The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
The adoption and integration of Internet of Things and Industrial Internet of Things devices have produced a network of Cyber-Physical Systems that is more interconnected than before, increasing the attack surface and hiding features of [...]
The increased attention to the given issue is explained by the fact that the emergence of accidents leads to significant risks to passengers and the crew.
Focusing On Safeguarding the Space From the sample of texts given, the bottom line is that there is a need to protect space due to the usefulness part of it.
As the use of technology in the classroom increases, people have to be more mindful of ethical issues that arise from it. It is important to remember that there are also legal issues connected to [...]
Furthermore, it is in the diversification and deep and equal understanding of the problems posed to them that SMM is valid for a positive outcome.
Chiefly, the new stadium was founded in order to accommodate the technological advancements needed for the stadium and events held there to thrive.
The findings demonstrate that the absence of AI-based laws and regulations in the aviation sector has hampered the deployment of safety-critical AI.
This chapter reviews trends in the threat landscape, including human mistakes, crisis events, the growth of artificial intelligence and the Internet of Things, and the evolution of cyber-attacks in terms of purposes.
One of the elements that can change due to AI implementation is communication, both as a broad subject and in regard to human interactions.
Before defining how the voice recognition technology built into the chair will avoid the disadvantages of working from home, it is essential to highlight some features of its work. In conclusion, it will be essential [...]
Then, it will focus on possible cybersecurity measures to protect companies' data, using the NIST Cybersecurity Framework to exemplify cybersecurity's role in remote working. Cybersecurity's role in the practice of remote working proves to be [...]
To begin with, AI is an efficient technology that can be implemented in any industry to increase the productivity of operations.
The specific purpose of the article was to compare and discuss face-to-face and online surveys in the aviation industry. What is the difference between online and laboratory interviews in the research framework on the topic [...]
Instead, the upsetting issue is the unlimited access and use of individuals' data by established technological giants and big data analytics companies that collect the information legally.
This scenario may potentially happen if the target replies with more severe and costly cyber methods, cyber escalation within the cyber domain, or cyber-kinetic threshold breaching in other words, cross-domain escalation.
During the presentation at the conference, the skills of purposeful observation and experiment setting are formed; they go through the whole path of research activity from identifying the problem to protecting the results obtained.
The objective of the study is to identify the future trend of smart homes and their influence on remote work. Thus, the concept of a smart home and remote work will grow in demand.
To accomplish this, the company evaluated the tools used by the firm and suggested the possibility of improving them or introducing other possible approaches to project activities.
In terms of the company's ability to engage in scanning for adoptable technologies, it is tied to the available resources and leading personnel guidance.
The most notable difference of view between Russia and the U.S.is probably the reliance of the latter on deterrence through retaliation both at the document level and in practice.
The number of drones possessed by people and organizations has significantly increased as a result of the difficulty that authorities have had in controlling the sale of commercial and toy drones.
For example, through the creation of a histogram with the frequency of purchases and the class interval of age that shows the range of age groups in comparison with the number of purchases, marketers receive [...]
This paper looks at the literature on the evolution of digitalization in light of the COVID-19 pandemic, which has resulted in the widespread adoption of smart homes and is expected to continue.
They represent the interests of pilots, airlines, and passengers in the process of developing and implementing new regulations and rules. Professional aviation organizations play a vital role in developing the process of flying and providing [...]
The scope of the paper is to address both the short- and long-term needs for the group's annual passenger volume projections.
I assume that the issue is a moral one as it is linked to the price of progress and its acceptance by the public.
At the same time, the parts of the brain involved in attentiveness remain dormant and deteriorate. The increasing use of the Internet hindered my ability to focus on a particular task.
This can be achieved through an assistive technology for supporting student admission through course selection discovery or a Recommendation System, which directs the learners from one point to the next and uses the collected data [...]
I strongly believe that in order to address the issue of AI for security purposes, it is crucial for governments, markets, and organizations to work together to develop ethical guidelines and best practices for the [...]
Though the functional approach has been sufficient for Appel so far, the company needs to evolve and adjust to the requirements of the present-day setting, where the network structure allows for greater flexibility and collaboration.
In this research, we used the incremental shuttle walk test to investigate the exactness of the principle contributions of the proposed model.
The paper will examine common obstacles caused by non-functional requirements in software development and hardware design to outline a research proposal for each of the topics.
Our team proposes to fix the pothole by using high-quality asphalt to fill and compact it. We estimate the project will take approximately 4 hours to complete, resulting in a total labor cost of $240.
In conclusion, commercial aviation has had a profound impact on the US and global economy, contributing to economic growth, job creation, and the expansion of international trade and commerce.
Additionally, due to the high pressure and velocity, some of the kinetic energy of the air is lost due to viscous forces in the compressor.
Engaging and empowering Hispanic communities in cybersecurity efforts promotes diversity and inclusion in the field and improves cybersecurity outcomes for all individuals and organizations.
It is commonly used in China and the US, with the former strengthening concerns about the use of AI as a threat to privacy, society, and security.
The management factors that contributed to the problem were the time frames to find the substitution and legal and regulatory standards.
The company's success has been mainly due to its focus on technology and innovation, which has allowed it to capitalize on the growth of China's economy and become the leading search engine in China.
Constructivism indicates that states' beliefs of the significance of cybersecurity and the norms around cybersecurity are crucial elements in shaping their conduct in cybersecurity. The use of coercion and intimidation to achieve political aims is [...]
The roles and responsibilities of the project manager and the systems engineer are interrelated at different stages of the project as they play an important part in the successful completion of the project.
Analyzing the question of the implementation of the ChatGDP and other options of artificial intelligence, it is essential to identify a significant problem that this implementation would solve.
In the editorial "A Brief History of Artificial Intelligence: On the Past, Present, and Future of Artificial Intelligence" by Michael Haenlein and Andreas Kaplan, the authors explore the history of artificial intelligence, the current challenges [...]
In conclusion, using lateral runout to diagnose vibration problems is one of the most effective ways to detect and prevent machine damage.
In addition, system security should be considered as well in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed.
The iPhone is better than its competitor in the face of Android and in the matter of the ecosystem of devices.
Due to the limited vision, the pilot and the bridge crew had a difficult time performing an accurate assessment of the situation in order to make the necessary modifications.
Pilots must also be able to judge weather conditions properly and make judgments depending on the safety of their passengers and crew.
The main factors to consider are the possible beneficial and adverse societal impacts of AI technology, the fierce market pressures that push companies to prioritize short-term to mid-term earnings over lengthy societal effects, and the [...]
Fine-grained parallelism uses smaller parts of the program for parallel processing and requires a large number of threads to perform tasks.
As the interception happened "contemporaneously with the transmission of the communication," the recording was found to be unlawful as it violated the Wiretap Act.
This paper will analyze the performance of the crew and other relevant teams concerning the principles of aircrew training and Crew Resource Management and the principles of 6th Generation CRM/Threat and Error Management.
Robots will help to increase the labor force in the country in the future. Robots will be used to increase the productivity of human labor within the government sector and help in speeding up the [...]
Since the air density is lower at high altitudes, the true airspeed buildup is necessary to maintain the pressure difference between the aircraft and the environment.
One of the main differences between the wide-band dual-cell oxygen sensor and the narrow-band oxygen sensor is their different application spheres.
Further, an issue that is quite acute is related to the privacy and security of data and is more of a customer, not an industry concern.
The safety and health of the department will be directly impacted by this plan's use of technological solutions to the risks and hazards mentioned above.
These regulations are formulated by the most relevant brands in the industry, such as MasterCard and Visa, to ensure the safety of online transactions.
A small amount of ice on the tailplane leading edge can disrupt the airflow on the lower surface of the horizontal stabilizer, causing flow separation that reduces the stalling angle of attack and limits the [...]
As a result, the hiring process has changed considerably, and it is crucial to comprehend how social media and technology affect it. In conclusion, technology and social networking have had a big impact on both [...]
In this essay, I analyze the arguments advanced by experts in five different publications in order to investigate the consequences of internet and smartphone use on human behavior and relationships during the COVID-19 epidemic.
It is evident that the connection between the current scientific controversy and the work by Mary Shelley is expressed in a conflict between science and morality in the context of the desire to penetrate the [...]
For example, how moral it is to use ad blockers, considering the fact that online advertising is necessary to pay for content that users get for free.
One of the critical advantages of soft robots is their ability to deform and adapt to their surroundings, making them ideal for tasks that require a high degree of flexibility and expertise.
This approach allows the tool to use the velocity of its internal parts to upkeep a single direction. In conclusion, the significance of a gyrocompass is paramount in aviation, as this device can operate within [...]
The automobile usually has two wheels, but there is an alternative to lock the axles of the rear wheels to connect the front pair as well. In response to the vertical force, the portion of [...]