Tech & Engineering Essay Examples and Topics. Page 11

4,726 samples

Central heating systems

The main components of a central heating system include the source of heat and appliances for heating, medium of conveying the heat to the area where heating is required, and spaces for releasing heat.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2743

Technological Generations of Mobile Communications

Thus the use of this technology is dependent on the proximity to power supply. Thus, it is arguable to conclude that the development in the wireless communication cannot be optimum.
  • Subjects: Phones
  • Pages: 5
  • Words: 1333

GPS Technology Pros and Cons

GPS Navigation technology Navigation technology uses a GPS receiver and internal road database, which provides the user with a clear view of the surrounding in real time.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 632

Effects of Surveillance Technology on Privacy

The presence of surveillance devices and gadgets in public gathering places limits the use of the public places, as many people will tend to avoid such places in fear of exposing their privacy to their [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1660

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

Is Modern Conveniences and Technology a Curse or a Blessing?

However, although modern conveniences and technological innovations have some negative effects, the benefits of such conveniences and innovations overshadow such effects; hence, modern conveniences and technological developments have greatly improved the quality of life; hence, [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 845

The Impact of Technology on Attention and Time Management

In this case, it is essential to preserve the possibility of choice and the existence of an alternative in building relationships with technologies without falling into the trap of use and fear.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 366

Hash Tables in Weather Software

Given the current dynamic trends in weather patterns, hash tables provide a fast and efficient way to store, access, and retrieve data.
  • Subjects: Data
  • Pages: 1
  • Words: 405

Technology Implementation: The Role of People and Culture

The right people with the right skills and backgrounds must be brought together to ensure the technology project is successful. Consequently, creating a vision for the future can be employed by leaders to set expectations [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 646

Ada Lovelace: Scientific Contributions

Unlike her contemporaries, she emphasized the harmony between machines and humanity, making her one of the key innovators in the history of technological advancements.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 283

Natalie Wexler: Reconsidering Classroom Technology

By sharing her experience with Kevin, a student from a minority group with a poor financial background, she demonstrates that the students struggle to interact with technology.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 398

UNION-Based SQL Injection and Its Prevention

0x3a resolves to a ":", the concat function combines multiple string elements into one, and select database returns the current database's name.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 316

Robotization in Business: Issues and Solutions

All of these issues rely on the assumption of the inherent efficiency and reliability of AI-based technologies and the optimizing effect of automation on different analytical and practical processes. One of the possible options for [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1467

Aspects of the Home Phone

The main factor contributing to a similar decline in the home phone is the alternative of the mobile phone. The landline is an item that is not usually powered by electric circuits in the home [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 261

Over-the-Top TV Technology and Sports Marketing

Second, the appeal of live sports streaming is linked to a broader symbolic power that has long been associated with the experience of live events on television and radio.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1395

Deleted Data: Utilities to Recover

It does this by looking for the file's data in the space that was marked as available for use by the operating system, and if it is able to find the data, it can restore [...]
  • Subjects: Data
  • Pages: 1
  • Words: 287

Information Security: The Main Threats

Because of the dangers involved with using out-of-date security software, it is crucial to keep it updated on a regular basis.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 394

Mobile App for a Retail Business

Executing - Putting the project plan into action and carrying out the tasks essential for finishing the project. Additionally, it involves gathering their opinions and input to modify the project plan as necessary.
  • Subjects: Applications
  • Pages: 3
  • Words: 889

Internet of Things and Its Level of Implementation

IoT is defined as a collection of tangible objects embedded with processing abilities, sensors, and software to connect and exchange data with other systems and devices using the internet and other communication networks.
  • Subjects: Internet
  • Pages: 6
  • Words: 1666

Cyber Security: Fortifying the Digital Fortress

To effectively tackle the ever-changing threat landscape and guarantee the security and stability of the digital realm, a thorough and multi-faceted approach to cyber security is essential, integrating organizational measures, education, cooperation, and technological innovations.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 828

Enhancing Education Through Technology Integration

The sense-making use of digital instruments, the ability to solve complex learning problems, and the value of feedback opportunities are important effects of the adoption of technological solutions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 555

Erie: Biomedical Sensors Development

As a result, we collaborate with medical professionals all around the United States to expand the use of ubiquitous biomedical sensors.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 386

The Smart Cities Technologies: Key Benefits

As the transportation manager of a city, I will not invest heavily in driverless vehicles, but focus more on green mobility and automated logistics in restricted locations such as ports.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 294

Ethical Issues of the Internet Use for Research

Naturally, this is not ethical to contribute to the violation of the confidentiality of individuals who have shared any information online, even if it is unintentional, considering that it has not been authorized by the [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 921

AT&T Documentation Regarding Cybersecurity

The author starts with the basics of psychological perception of unexpected events, which can potentially threaten people, or in this case, the computer and software. It confirms the importance of the documentation regarding cybersecurity and [...]
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 361

The New Life: Fitness Application

In the code above, the sendSMSNotification function is only called if the user grants permission for the App to send SMS messages.
  • Subjects: Applications
  • Pages: 2
  • Words: 422

Computer Facial Recognition as Threat to Human Autonomy

Norberto Andrade, the author of "Computers Are Getting Better than Humans at Facial Recognition" is concerned about the consequences of the fact that modern technologies can determine the discrepancy between facial expressions and inner experiences. [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 306

Protecting Cyber Data with Honeypots

The main advantages are the simplicity of analysis, cost-effectiveness, and the ability to identify internal threats. However, it is essential to understand that decoys are one of the components of a comprehensive cybersecurity strategy.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 297

How Has Cyber Warfare Application Changed in Modern Conflict

To begin with, it is important to provide a more comprehensive understanding of the concept of cyber warfare. A descriptive design will be used in the study to investigate participant views and the phenomena of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 958

Essential Standards for Building Egress

According to Koffel (20200, ensuring proper performance of the Heating, Ventilation and Air Conditioning system along with the proper classification of occupancies also contributes to the extent of safety in a building and the opportunity [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1107

Effects of Technology on Communications

Lastly, technology and communication have significantly impacted our personal and professional relationships, allowing us to maintain our connections with friends and family, regardless of distance.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 367

Transformative Learning Theory and Spirituality

In the 2013 article, "Transformative Learning Theory and Spirituality: A Whole-Person Approach," Piercy indicates that the learning process of adults can be understood by addressing the biblical understanding and the transformative approach to man's nature.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 323

Metaverse and Its Influence on Society

The metaverse has the potential to revolutionize entertainment, improve communication and collaboration, and increase equality. The possibility of using the metaverse as a tool for monitoring and management is a serious concern.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 824

Socio-Technical Systems & Cybersecurity Challenges

However, the paper explores the understanding of socio-technical system concepts and history by reviewing an article titled Historical Aspects of the Traditional Development of socio-technical Systems by Moiseeva and Myatishkin.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 895

Adaptive Technology Exercise for Middle School Math

Therefore, it is correct to postulate that this lesson allowed me to visually observe a classroom built on the ideology of UDL and the possibilities of intelligently combining all the essential tools to increase accessibility.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 733

The Hyperspectral Lidar Satellite

The environmental limitations of LIDAR satellites can be the consequences of the satellite launch itself, as combustible fuel is used, and its oxidized products are released into the atmosphere, affecting the climate.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 659

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

Electrical, Electronic, and Computer Engineering

The components of circuit diagrams consist of the electric cell that provides the circuit with the source of current. The circuit diagrams correlate with AutoCAD in providing a visual representation of the circuit to the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 595

Technological Driver of Change

Businesses have been pushed to alter how they design and build their websites and applications as a result of the popularity of mobile devices.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 636

The Touch-Screen Instructional Design

As for the visuals, Nelson mentions that the realization of this project requires considering the location of the buttons, links, and their size.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 405

Technological Inventions: The Adverse Effects

The whole issue necessitates concerted efforts from all humans and the acceptance that people's knowledge is limited for the realization of a real solution.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 601

Obesity Treatment: The Use of Technology

It is helpful to consider if the research question addresses treatment, prevention, prognosis, early diagnosis, or the investigation of the root cause while using the PICO format to create one.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 497

Improved National Cybersecurity Strategy

While most of the systems would be in the hands of private companies, the department will go further to formulate and set the necessary standards for pursuing cybersecurity efforts.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1420

Low-Code No-Code Platforms’ Cybersecurity Risks

In conclusion, the cyber security risks of using low-code no-code platforms can be significant. While users find it easy to design software without much skill in programming languages, they should understand the security implications of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

Overview of the Data Collection Strategy

This philosophy fits the goals of this research paper perfectly because there are a large number of companies and regulations in the aviation industry, including those dependent on the state affiliation of the airline, and [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 1019

Anti-Terrorism Security in Aviation

First, if the results of these interviews are to be used to validate the entire study, ethical approval is required of the participants. Are there tangible differences in the implementation of anti-terrorist measures during takeoff, [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1093

Normalization of the TICKET Table

The Confirmation, which is the primary key, satisfies part of the relation condition, requiring all the rows in a table to be uniquely identified by at least one attribute.
  • Subjects: Data
  • Pages: 1
  • Words: 330

Quantum Computing and How It Will Change Society

The introduction of this paper presents the basic principles and ideas of Quantum Computing. It is a cornerstone of quantum theory and the basics of Quantum computing.
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4160

Innovators Behind Video Games and the Internet

The gaming industry originated in 1962, at the Massachusetts Institute of Technology, where several members of the Tech Model Railroad Club, led by Steve Russell, on the world's first computer with an electronic display PDP1 [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 670

Digitalization’s Impact on Sustainability

The benefits of digitization contributed to the development of the tools and devices that have now become part of every component of the environment of the connection of things.
  • Subjects: Technology Effect
  • Pages: 16
  • Words: 4521

Metaverse Potential in the Education and Training Industry

Due to the theoretical orientation of this research, most attention is paid to the first two: the assessment of the environment, the definition of the main objectives, and the collection of the necessary information for [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2221

Aviation Training: The Grounded Theory

The purpose of the study was to test the usefulness of grounded theory in aviation training. The sample was substantiated by the professional activity and the role of the subjects in the military educational institution.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2055

Science Learning: Technological Tools

PhET simulations employ images and simple controls like click-and-drag operations, knobs, and dialog boxes to portray what is unseen to the eye in order to aid students in visualizing topics.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 385

LaGuardia Airport: The Cyber Risk Identification

The rising tensions between the North Atlantic Treaty Organization and the Russian Federation have heightened the risk of cyber-attacks. As in Figure 1, the consequences are severe in the event of a successful assault since [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1491

Tech Trends: Computer Vision vs. Virtual Twins

As for human face recognition, security is not the focus of this study, but it may be used to track the number of visitors to help calculate attendance, desired capacity levels, and income.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 996

The Corporation’s Cybersecurity Improvement

The OS is not the same as the information system, as the OS is a component of the IS. The Mac OS remains vulnerable to the same risks as Linux and Windows, although the probability [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2329

Machine Learning in Medical Imaging

Therefore, the clarification of the basic processes of the different topics of medical imaging, including X-rays, MRIs, and CT scans, will provide context for our investigation of machine learning in the next section.
  • Subjects: AI
  • Pages: 2
  • Words: 1250

In-House vs. Outsourced IT Solution

The components of the source, the vendors, and the origin of the software-intensive system are the key drivers of the outcomes of a component sourcing option.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

Windows 10 Upgrade Plan for Tetra Shillings Accounting LLC

I believe Windows 10 Pro is the best and most advanced version of Windows currently available. Similarly, when a new update is downloaded, Windows 10 Pro notifies users before installing and restarts to avoid work [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 967

The Role of IoT-Based Intelligent Home Technology

I will then write a scientific report on the project, create a presentation, and publish it to make it available to the scientific and engineering community, utilizing the skills I learned in the scientific writing [...]
  • Subjects: AI
  • Pages: 11
  • Words: 3233

Forces on a Rotating System Laboratory

The mass appears to push outward due to its inertia in the case of a spinning system because the centripetal force pulls the mass inward to follow a curved path.
  • Subjects: Engineering
  • Pages: 2
  • Words: 576

Ubiquitous Computing in Social Studies

In order to provide advantages to the educational process with the help of this innovation, it is necessary to study it and work with third-party specialists carefully. One of the varieties of using ubiquitous computing [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 309

Blockchain: Exploring Innovation

It is possible to assume that blockchain is the innovative technology that revolutionized the financial system and the system of informational exchange in recent years.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 827

Efficient Windows 10 Implementation Guide

The firm needs to upgrade and use the Windows 10 Enterprise operating system once it decides to upgrade. The first part will show the upgrade matrix and the security features of Windows 10.
  • Subjects: Applications
  • Pages: 3
  • Words: 1287

Notetaking in an Online Environment

One of the appeals of handwritten notes involves the ability of a student to exploit the brain's nature to remember key concepts relative to the exhaustive scripts.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 287

Blockchain Technology, Fraud and Accountability

However, both T&R Staff and Associated Press acknowledge that there are risks associated with the current state of cryptocurrencies, which is why they suggest adopting the technology but not the existing forms of electronic money.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 546

MetaSpace: The Proposed Internet-Based Design

The different additional features to be introduced by MetaSpace, the risks and solutions associated with it, and how the identified potential vulnerabilities will be solved form the basis of discussion for this paper.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2770

Software Automation and the Future of Work

When AllDone's software developers lacked the resources to create and develop an automation process, the team of employees performed what the writer referred to as computational labor.
  • Subjects: Robotics
  • Pages: 2
  • Words: 628

Distributed Ledger Technology and Governance Issues

In the past, the aspect of achieving a general agreement on the data, decentralization, distribution, and trustlessness was the major issue that made the concept remain unfit and reliable.
  • Subjects: Other Technology
  • Pages: 11
  • Words: 3059

Contemporary Problems Related to Computer Science

This fraud is widespread in the Computer science industry, and much attention is paid to it. In the case of the older generation, care and concern should be given to their relatives.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 412

Negative Impacts of Emerging Mobile Technologies

It will lead to more hours spent in games and, thus, increase the probability and strength of addiction. In the case of online games, social and game addictions are combined.
  • Subjects: Phones
  • Pages: 10
  • Words: 2783

Digital Certificate Management

The paper focuses on the process of issuing and managing digital certificates, discussing the weaknesses and vulnerabilities of different methods and the issues with revoking certificates, and possible remedies.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1223

Information Technology Developments and Innovations

However, during the first and second industrial revolutions, innovations in technology in terms of software and hardware accelerated to unprecedented levels. The fifth component is human resources which are needed to operate the hardware and [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 871

The Need for Physical Security in the Modern World

The adoption and integration of Internet of Things and Industrial Internet of Things devices have produced a network of Cyber-Physical Systems that is more interconnected than before, increasing the attack surface and hiding features of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1183

The Airbus Helicopters AS350 B2, N350LH Crash

The increased attention to the given issue is explained by the fact that the emergence of accidents leads to significant risks to passengers and the crew.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 598

Space Management: Cyber Security Issues

Focusing On Safeguarding the Space From the sample of texts given, the bottom line is that there is a need to protect space due to the usefulness part of it.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 872

Education: Impact of Technology

As the use of technology in the classroom increases, people have to be more mindful of ethical issues that arise from it. It is important to remember that there are also legal issues connected to [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 399

Shared Mental Models: Visual Tool Assistance

Furthermore, it is in the diversification and deep and equal understanding of the problems posed to them that SMM is valid for a positive outcome.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 328

The Yankee Stadium: Impact of Technology

Chiefly, the new stadium was founded in order to accommodate the technological advancements needed for the stadium and events held there to thrive.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 321

Trends in the Cyber-Threat Landscape

This chapter reviews trends in the threat landscape, including human mistakes, crisis events, the growth of artificial intelligence and the Internet of Things, and the evolution of cyber-attacks in terms of purposes.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 1585

Establishing Smart Chair with Voice Recognition

Before defining how the voice recognition technology built into the chair will avoid the disadvantages of working from home, it is essential to highlight some features of its work. In conclusion, it will be essential [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 972

Role of Cybersecurity in Remote Work

Then, it will focus on possible cybersecurity measures to protect companies' data, using the NIST Cybersecurity Framework to exemplify cybersecurity's role in remote working. Cybersecurity's role in the practice of remote working proves to be [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 520

Face-To-Face and Online Surveys in the Aviation Industry

The specific purpose of the article was to compare and discuss face-to-face and online surveys in the aviation industry. What is the difference between online and laboratory interviews in the research framework on the topic [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 2067

Cyber Operations Do not Risk Inadvertent Escalation

This scenario may potentially happen if the target replies with more severe and costly cyber methods, cyber escalation within the cyber domain, or cyber-kinetic threshold breaching in other words, cross-domain escalation.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 551

AI Training Algorithm: Cybersecurity for the Organization

During the presentation at the conference, the skills of purposeful observation and experiment setting are formed; they go through the whole path of research activity from identifying the problem to protecting the results obtained.
  • Subjects: AI
  • Pages: 5
  • Words: 1374

Remote Work and Smart Home

The objective of the study is to identify the future trend of smart homes and their influence on remote work. Thus, the concept of a smart home and remote work will grow in demand.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1185

Scanning for and Analyzing New Technologies

In terms of the company's ability to engage in scanning for adoptable technologies, it is tied to the available resources and leading personnel guidance.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 594