Tech & Engineering Essay Examples and Topics. Page 11

4,317 samples

The Alcohol-Related Traffic Accidents

The court order to install a ride-sharing application falls under the category of "any other conditions of community control that it considers necessary" of paragraph 4511.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 400

Reading and Writing with Use of Technology

Concerning the proposal, when undertaking research from a library in the context of a particular paper, the librarian may provide insight on the best reference one who is creatively inclined needs to look into from [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 738

Industrial Revolution in Agriculture

On the other hand, the industrial revolution in agriculture has led to the introduction of new safety challenges. In conclusion, as a result of the industrial revolution in agriculture, automation has become increasingly relied upon [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 677

Seattle-Tacoma International Airport’s Financial Situation

The financial propositions fairly present the net positions of the Organization Investments and the Warehousemen's Retirement Charitable Trust of Seattle-Tacoma International Airport as of December 31, 2021, and 2020, as well as the adjustments in [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1211

Experiences of Beginner in Python Programming

Difficulty in working with Python for me is understanding what and how to include in the code. Thus, Python is in high demand in IT and, at the same time, is known as a programming [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 570

The Solar Powered Flashlight and Its Advantages

Once fully charged, the solar powered flashlight will play an important role of ensuring one is able to navigate all the challenges that might arise at night.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 556

Incident Detection Precursors and Indicators

As for incident detection indicators, the challenge is that security software may produce hundreds of security alerts a day, most of which are false.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 311

Aviation: F/A-18E Super Hornet

Due to the strengthening of chassis supports in particular and the design of the aircraft in general, the upgraded fighter bomber has a maximum landing weight of 4100 kg more than the F/A-18C/D.
  • Subjects: Aviation
  • Pages: 4
  • Words: 792

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

The Ron Engineering vs. Construction Ltd. Lawsuit

The lawsuit between Ron Engineering and Construction Ltd.and the Government of Ontario can be considered one of the most consequential and prominent quarrels in Canada.
  • Subjects: Engineering
  • Pages: 2
  • Words: 604

Artificial Intelligence Transforming the World

The possible effects of any program on the community can then be planned for and measured by managers. To conclude, even though most people are unfamiliar with AI, the world is on the verge of [...]
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 557

Risks and Opportunities of “Platformization”

The growth of the sharing economy, which has been witnessed through the success of multinational companies, such as Airbnb and Uber, has also elevated the importance of "platformization" in the global economy.
  • Subjects: Programming
  • Pages: 9
  • Words: 2558

Technology in Nursing Education

Such students have the right to receive the same learning opportunities, which is why textbooks, in-person assistance, and in-print information provision are some of the measures that can be applied.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

The Philippines Elections 2016 Cyberattacks

The scale of the problem of cyberattacks in the modern world is vast, and the case of the Philippines in 2016 demonstrated the vulnerability of even such important databases as those containing information on electors.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 575

Cyber-Security Threats and Their Control

It requires advanced hackers to retrieve the information of an individual or an organization's password database. The creation of robust passwords is an appropriate way to prevent the concern.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 399

Introducing Solana to the Cashapp Company

The topic of this study is the introduction of Solana technology into the Cash App mobile payment service. The study covers the benefits for the users; it is necessary for a visual understanding of the [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 399

Technological Determinism and Society

This is due to the fact that if earlier the influence of technology was largely limited to the production of material goods, today this influence permeates the entire life of a person.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 761

The Sydney Bridge Observed Using a Webcam

It shows the view on the Sydney Harbor Bridge and the Opera House, the places that have become symbols of this Australian city. The information about the financial sources of the company can be found [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 338

Data Buses: Definition and Key Features

The significance of the address bus is to assist the CPU in locating specific information in the memory, while the control bus regulates data processing.
  • Subjects: Data
  • Pages: 1
  • Words: 286

Microsoft Power BI Software’s Features

Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Maintaining the Temperatures for HFO Tank

There is the pump for supplying oil with the main function of enhancing the circulation of oil from the tank passing through a heater and back to the oil tank again; the temperature of the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1020

The Concept and Underlying Science of Hyperloop

The representatives of the two firms argued that there was a great possibility of implementing the Hyperloop in the Middle East or Asia because of the increased need for fast and efficient transport and reduced [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2035

Discussion of Front Load Washer

An individual can load the items on the device, begin the cycle, and walk away, so there is no need to sit and monitor the washing process.
  • Subjects: Engineering
  • Pages: 8
  • Words: 1492

Data Visualization: Aims and Effectiveness

The aim is to make the information clear and effective to the readers and viewers. According to Alnjar, data visualization improves the narrative form of information and data.
  • Subjects: Data
  • Pages: 2
  • Words: 576

Avionics and the Future of Aircraft Systems

Avionics are the set of electronic types of equipment and systems designed to use in aviation. The first such device to be used on aircraft was the communication and navigation systems based on analog and [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 586

Cyber Security Issue: RansomWare

Until the victim pays a specific amount of money to the attackers within a particular time, cybercriminals can use the virus mentioned above to access the user's sensitive personal or organizational information. The infection and [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1225

How to Become a Videogame Designer

Having interest, love and involvement in the video games themselves from the user's point of view already endows such a person with a number of qualifications that allow him to participate in the creation of [...]
  • Subjects: Programming
  • Pages: 1
  • Words: 363

Discussion: How Does AI Improves Manufacturing?

The lean standards of manufacturing are the activities and techniques applied in the production process to identify the bottlenecks and streamline the efficiency of the process while ensuring high productivity.
  • Subjects: AI
  • Pages: 7
  • Words: 1937

JMeter and Locust Load Tests for Websites

Within this paper, a literature review of a number of articles will be utilized to determine the ways in which JMeter and Locust interact with load tests for small or medium-sized web client applications through [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1129

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

AppMaker: Threat Agents of Web Attacks

These factors are the capability of the agent, the motivating factor, and the opportunity to attack. This is the main reason most security agents are consistent in exploring web applications with hopes of identifying complicated [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 854

Technology in Education: Benefits and Challenges

To succeed in this learning environment, students need to develop organizational and clinical skills and strategies to achieve academic success; challenges may be associated with the quality of received information and consequences of using devices.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 634

The Problem of the Identity Theft

Identity theft is a unique problem that is presently affecting the experiences and goals of many individuals in different parts of the world.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1377

Technological Innovation Effect on Urbanization

By the 20th century, as large-scale industrial production became effective, the idea of urbanization appeared, leading to the further growth of the world's leading cities. As such, the idea of urbanization is the cornerstone of [...]
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2475

The Impact of Handheld Device Usage on Life

More specifically, I want to examine the impact of telephones on my interaction with friends and my perceptions concerning the mental effects of the device application.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 673

The Impacts of Internet Telephony (VoIP)

Internet telephony has impacted many lives and has led to ethical, social, and political issues in the contemporary world. In a nutshell, internet telephony has impacted many lives in the ethical, social, and political facets [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 711

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 50
  • Words: 14365

VMware Server Virtualization Solution

This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
  • Subjects: Computer Science
  • Pages: 45
  • Words: 13587

Firefighting Methods, Technology Availability in Qatar

The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
  • Subjects: Other Technology
  • Pages: 35
  • Words: 8540

Boston Dynamics’ Spot Robot Dog

Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
  • Subjects: Robotics
  • Pages: 4
  • Words: 357

Electronic News Gathering

The Characteristics involve the Utilization of electrical video to gather information, the Incorporation of Audio technologies in gathering news, and the Utilization of portable equipment in the newsgathering process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1366

AI and Job Security Aspects

The biggest fear in the economy's digitalization is the loss of jobs, but this will only be in the short term and only if there is the uncontrolled use of artificial intelligence.
  • Subjects: AI
  • Pages: 4
  • Words: 1132

Implementation of the Boston’s Smart City Concept

Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 608

Computer Network: Data Flow and Protocol Layering

The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

Network Reconnaissance Using Command Line

The command enters works through the interactive mode when no arguments are stated, or when the in itial argument is a - and the following argument is the server's internet address name or the host [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2247

Steganography in Current Digital Media

When the hair grew, the slave went to the recipient of the message who shaved the head to expose the hidden message. In these methods, the hidden information within files may be known to the [...]
  • Subjects: Computer Security
  • Pages: 13
  • Words: 3674

E-bazaar Implementing Virtual Private Networks

With increase in the popularity of the internet, many businesses turned to the internet in order to cut on running costs and expand their network which has eventually paved way for the evolution of virtual [...]
  • Subjects: Internet
  • Pages: 12
  • Words: 1855

Social Needs: Inventions and Innovations

The Pony Express was birthed in 1861 in the US with the primary goal of delivering mail and in the same breath, Coleman Sellers invented a Kinematoscope.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1342

The Various Effects of Cybercrime

The primary objectives for this strategy were to prevent any attacks against the United State's infrastructures, to reduce the country's propensity to attacks over the internet and to reduce to the lowest levels possible the [...]
  • Subjects: Cyber Security
  • Pages: 14
  • Words: 3923

Personal Computer Evolution Overview

It is important to note that the first evolution of a personal computer occurred in the first century. This is because of the slowness of the mainframe computers to process information and deliver the output.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2972

The Aviation Industry in France

The amalgamation of five private airlines in the year 1933 led to the formation of Air France, the national airline. In the early nineties, the airline was in the brinks of collapse due to heavy [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1908

Excel Spreadsheet Tools and Their Applications

Therefore, this paper provides a description of the Excel spreadsheet tool and the relevant applications of spreadsheets in finance, marketing, and accounting activities.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2006

Road Safety in the Middle East and Gulf Countries

In this paper, we will look at road safety in the Middle East and Gulf countries, global statistics, types of road crashes, causes of road accidents and solutions to road crashes.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2789

Types of the Information Systems

A company can use information system to gain competitive advantage via better organisation of data and its storage; for instance, data can be stored in the way that allows direct access to it from inside [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1380

Computer Sciences Technology: Smart Clothes

In this paper we find that the smart clothes are dated back to the early 20th century and they can be attributed to the works of artists and scientists.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2648

The Terms in Online Communication Tools

E-mail client: this is a computer application that helps users to organize their e-mail since it can access the mailbox. It has rich functionality as compared to POP, since users can track the status of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 810

What Is Spatial Database?

Again, modeling has been defined as a primary element to achieve success in the deployment of the project, and this is particularly true for the management of projects based on spatial databases, such as geographical [...]
  • Subjects: Data
  • Pages: 16
  • Words: 4490

Simply Accounting vs. QuickBooks: Comparison of Programs

This paper makes a comparison of the accounting software, Simply Accounting with QuickBooks and Both Simply Accounting and QuickBooks share many common features; but for the selection of a particular accounting software program, it is [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 1461

Mechanical Engineering Lab: Chevrolet Engine Performance

The Objective of the experiment was to determine the fuel consumption of the Chevrolet 4. Several parameters of engine performance can be measured but the main and most important test is the power test.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1865

Current Laws and Acts That Pertain to Computer Security

Since the advent of networking of computer systems through the intranet and internet, security of data and information has always been threatened by unauthorized access, use and modification of data.
  • Subjects: Computer Security
  • Pages: 20
  • Words: 5452

Membrane Filtration Technology

The paper is organized into subsections including how the technology works, alternative technologies, effectiveness of the technology, management of the technology, and application of the technology.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1896

WorkShop Report: Client-Server Technology Bco-5502

However, on the framework of TCP/IP configuration, it is possible to locate the IP name resolution under the parameters of the NetBIOS resolution and with the use of the Windows NT 4.0.
  • Subjects: Programming
  • Pages: 8
  • Words: 2212

Industrial Communication Protocol

To give response to the users the suppliers are using the processors for improving the functions. It is a communication network planned for industrial environment and time critical applications.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2642

Fixed-Base Operators in the Aviation Industry

Most of the business conducted within the airdrome environs as well as those that require a straight linkage to an airdrome in order to subsist yet their chief commerce is not associated to aviation.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2216

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

Are Internet and Google Making Us Stupid?

In the past, people used to do their research in libraries and labs, but nowadays, with the advent of the internet, Google has become an easy source of information for almost all questions.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 391

The Tractor Hydraulic System: Components

The valves also block fluid flow via the center when the hydraulic is in the aforementioned state. Valves also allow the flow of fluid through the center and into the reservoir during this particular.
  • Subjects: Engineering
  • Pages: 3
  • Words: 964

Overview of Computer Languages – Python

A computer language helps people to speak to the computer in a language that the computer understands. Also, Python Software Foundation, which is a not-for-profit consortium, directs the resources for the development of both Python [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 818

Systems Thinking in IT Projects

Systems thinking is an approach to system analysis based on the interconnectedness of the elements in a system. It states that the component of the system acts differently in and out of the system.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 888

Are Digital Natives a Myth or Reality?

The tremendous change with the appearance of progressive technology is believed to give birth to inherently new technological and cognitive skills in people born in the era of technology.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 634

Libra by Facebook Analysis

The simplicity of the mechanism is a valuable aspect that explains the intention of Facebook management to include this system as a single platform for paying for goods and services via the social network.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2211

Excel Software Utilization in Business Setting

The sheet which is available in Excel makes it easier to record all the business revenues and expenditures. Excel has a function called goal to seek which makes it easier for the task to be [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 541

Using Free Antivirus Programs: Pros and Cons

So, you should always remember that it is of great importance to keep your computer and personal data safe by installing an antivirus program.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 534

College’s Database Purpose and Entities

The main purpose of a database is to collect and organize data. Also, it helps the college to keep track of students' activities and interests, and, thus, shows what is better for them and what [...]
  • Subjects: Data
  • Pages: 2
  • Words: 672

Machine Translation Accuracy: Google Translate

According to Sreelekha, Bhattacharyya, and Malathi, the market for the technology will grow in the future, and translation speed, cost, and quality are all significant factors in the success of an application.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 971

The Compact Disc Technology

Compact disc players are physical equipments that retrieve encoded information from the CDs using a decoder section of the player, producing the output in form of sound, motion pictures, and other data forms to the [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1242

Technological Facilities: Computers in Education

The researcher chooses the students who study in the high school stage to investigate the issue of computer usage in high schools Physics classrooms in Saudi Arabia because different computer software is highly beneficial for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 842

Network Infrastructure Upgrade: Selection Process

As one of the top management team members, I was involved in advertising a job for a suitable company to write a proposal report and present to us so that we could evaluate them and [...]
  • Subjects: Other Technology
  • Pages: 13
  • Words: 3501

Router as Component of a Network Connection

In terms of their mode of operation, routers generally make use of protocols for communicating with other computers on the network in order to find the best path between them.
  • Subjects: Internet
  • Pages: 5
  • Words: 1397

Flight Physiology and Human Factors Principles

In the situation where a pilot breathes in the air at high altitudes, there is usually insufficient oxygen pressure to allow ample quantities of oxygen into the casing of the lungs.
  • Subjects: Aviation
  • Pages: 9
  • Words: 2485

Seat Belts And Seat Belt Laws

Some factors that may affect fatality regardless of the use of the seat belts or not include the speed of collisions, the number of passengers in the vehicles that are involved in an accident, the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2967

Spiral Model in System Implementation

In the era of the modern technology and fast development of the world, the implementation and the modernization of the updated and effective software programs has become of crucial importance.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1194

Computer Addiction: Side Effects and Possible Solutions

Since that time humanity started to speak of different signs of "computer addiction" the term stands to emphasize the seriousness of the problem and implies the possibility of drastic consequences that computer mania might have.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1534

Effect of Modern Methods of Construction

MMC includes; Make use of more effective material Speed up hiring delivery Enable high standards of design quality Can help to reduce resource consumption It has often been regarded as a mean of improving quality, [...]
  • Subjects: Engineering
  • Pages: 20
  • Words: 3504

The Concept of 2-Factor Authentication

This article strikes a critical examination of the 2-Factor Authentication with a strong analytical exploration of the pros and cons accruing to this type of authentication.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 828

The Increasing Human Dependence on Computers

Large amounts of information can be stored in the computer that is instantly available with the click of the mouse, which enables the ordering and tracking of resources in a very convenient and fast manner.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1443

Yahoo Inc.: Competing on the Edge

Internet based companies have increased over the last decade as facilitated by the invention of the World Wide Web and the internet.
  • Subjects: Internet
  • Pages: 7
  • Words: 2070

Internet and Ethical Challenges

The Internet began in 1969 as an experiment of the United States Defence Department that resulted in the Advanced Research Projects Agency Network. In 1993, the number of internet users increased dramatically to get the [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2322

Agile Methodology for Software

The Agile methodology is complete in more than a few phases, the psychoanalysis section, the proposed stage, the completion phase, and the testing stage.
  • Subjects: Programming
  • Pages: 5
  • Words: 1387

Owning a Laptop: Cause and Effect

Today the world has become upwardly mobile and it helps if we can remain in touch with the world around us all the time, whether we are moving, sitting in a cafe or just enjoying [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 488

The Cyberspace Behaviour of People

With it, the internet connection helped the organization know their employees more, helping them assess the working efficiency of each of the employees.
  • Subjects: Internet
  • Pages: 5
  • Words: 1297

Bill Gates’ Contributions to Computer Technology

Upon examination of articles written about Gates and quotations from Gates recounting his early childhood, several events stand out in significance as key to depicting the future potential of Gates to transform the world with [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1306

The UAE Telecommunication Sector

To understand how the country may strengthen the contribution of telecommunications to its economy, the present paper will mainly aim to analyze the sector from the perspective of the theories of competition and monopoly.
  • Subjects: Phones
  • Pages: 8
  • Words: 2267

Process of Cyclic Steam Injection

The injection phase commences with injecting steam into a well for a specified duration in order to heat the oil within the surrounding reservoirs with the intention of recovering at least 20% of the Original [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1171

Acceptable Use Policy and Digital Citizenship

It involves a set of practices to be followed in order to ensure the security of personal effects, data, and the information system involved in the process.
  • Subjects: Internet
  • Pages: 2
  • Words: 628