Tech & Engineering Essay Examples and Topics. Page 11

4,380 samples

Information Networking as Technology

Mozilla Firefox, Opera mini, and Seamonkey are the three web browsers covered in this project paper. Opera mini browser is by far better than Mozilla Firefox is; Opera mini is very efficient in terms of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 591

Bridge Resource Failures in the M/V Rook Grounding Incident

The bridge team comprised the Captain, the helmsman, the navigator, and the lookout. The impact of this incident was severe, causing significant damage to the vessel's hull and the surrounding environment.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1645

Predicting Loan Defaults: A Machine Learning Approach

The findings show that approximately all factors affected the outcome of the loan default and that interest rate played a major role in predicting the outcome of loan default as compared to other factors the [...]
  • Subjects: Data
  • Pages: 4
  • Words: 911

Computer Fraud and Detection Methods in Contracting

Therefore, a need has arisen for extensive research on computer fraud and how it can be mitigated, contracting and best practices for businesses, and the impacts of computer fraud when contracting.
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1634

Chatbot Ethics: Legal Framework & Recommendations

Chatbots are being implemented in the healthcare sector to offer patients individualized assistance and guidance. Chatbots are being utilized to help students and educators in the classroom.
  • Subjects: AI
  • Pages: 7
  • Words: 1887

ChatGPT Applications, Regulation, and Ethical Considerations

Sales and marketing may utilize ChatGPT and GPT-3 to propose products and describe them to clients in real time through chatbots and websites. Customers may get the foundational GPT-3 model and alter it independently to [...]
  • Subjects: AI
  • Pages: 7
  • Words: 1926

Importance of Speed Limits and Stop Signs for Road Safety

Obeying the speed limit and stopping at stop signs are not merely legal obligations; they are crucial for ensuring the safety of drivers and pedestrians alike. Speed limits and stop signs are specifically designed and [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 557

The Impact of Technology on Attention and Time Management

In this case, it is essential to preserve the possibility of choice and the existence of an alternative in building relationships with technologies without falling into the trap of use and fear.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 366

Insider Threats and Aviation Security: A Study Proposal

Employees in any industry pose security threats due to easy accessibility to the inside operations of the workplace. Like other industries, the aviation business is not exceptional as employees may have the motivation to harm [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 2467

Hash Tables in Weather Software

Given the current dynamic trends in weather patterns, hash tables provide a fast and efficient way to store, access, and retrieve data.
  • Subjects: Data
  • Pages: 1
  • Words: 405

Technology Implementation: The Role of People and Culture

The right people with the right skills and backgrounds must be brought together to ensure the technology project is successful. Consequently, creating a vision for the future can be employed by leaders to set expectations [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 646

Ada Lovelace: Scientific Contributions

Unlike her contemporaries, she emphasized the harmony between machines and humanity, making her one of the key innovators in the history of technological advancements.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 283

UNION-Based SQL Injection and Its Prevention

0x3a resolves to a ":", the concat function combines multiple string elements into one, and select database returns the current database's name.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 316

Robotization in Business: Issues and Solutions

All of these issues rely on the assumption of the inherent efficiency and reliability of AI-based technologies and the optimizing effect of automation on different analytical and practical processes. One of the possible options for [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1467

Aspects of the Home Phone

The main factor contributing to a similar decline in the home phone is the alternative of the mobile phone. The landline is an item that is not usually powered by electric circuits in the home [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 261

Over-the-Top TV Technology and Sports Marketing

Second, the appeal of live sports streaming is linked to a broader symbolic power that has long been associated with the experience of live events on television and radio.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1395

Deleted Data: Utilities to Recover

It does this by looking for the file's data in the space that was marked as available for use by the operating system, and if it is able to find the data, it can restore [...]
  • Subjects: Data
  • Pages: 1
  • Words: 287

Information Security: The Main Threats

Because of the dangers involved with using out-of-date security software, it is crucial to keep it updated on a regular basis.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 394

Mobile App for a Retail Business

Executing - Putting the project plan into action and carrying out the tasks essential for finishing the project. Additionally, it involves gathering their opinions and input to modify the project plan as necessary.
  • Subjects: Applications
  • Pages: 3
  • Words: 889

Internet of Things and Its Level of Implementation

IoT is defined as a collection of tangible objects embedded with processing abilities, sensors, and software to connect and exchange data with other systems and devices using the internet and other communication networks.
  • Subjects: Internet
  • Pages: 6
  • Words: 1666

Cyber Security: Fortifying the Digital Fortress

To effectively tackle the ever-changing threat landscape and guarantee the security and stability of the digital realm, a thorough and multi-faceted approach to cyber security is essential, integrating organizational measures, education, cooperation, and technological innovations.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1008

Enhancing Education Through Technology Integration

The sense-making use of digital instruments, the ability to solve complex learning problems, and the value of feedback opportunities are important effects of the adoption of technological solutions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 555

Erie: Biomedical Sensors Development

As a result, we collaborate with medical professionals all around the United States to expand the use of ubiquitous biomedical sensors.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 386

The Smart Cities Technologies: Key Benefits

As the transportation manager of a city, I will not invest heavily in driverless vehicles, but focus more on green mobility and automated logistics in restricted locations such as ports.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 294

Ethical Issues of the Internet Use for Research

Naturally, this is not ethical to contribute to the violation of the confidentiality of individuals who have shared any information online, even if it is unintentional, considering that it has not been authorized by the [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 921

AT&T Documentation Regarding Cybersecurity

The author starts with the basics of psychological perception of unexpected events, which can potentially threaten people, or in this case, the computer and software. It confirms the importance of the documentation regarding cybersecurity and [...]
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 361

The New Life: Fitness Application

In the code above, the sendSMSNotification function is only called if the user grants permission for the App to send SMS messages.
  • Subjects: Applications
  • Pages: 2
  • Words: 422

Computer Facial Recognition as Threat to Human Autonomy

Norberto Andrade, the author of "Computers Are Getting Better than Humans at Facial Recognition" is concerned about the consequences of the fact that modern technologies can determine the discrepancy between facial expressions and inner experiences. [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 306

Protecting Cyber Data with Honeypots

The main advantages are the simplicity of analysis, cost-effectiveness, and the ability to identify internal threats. However, it is essential to understand that decoys are one of the components of a comprehensive cybersecurity strategy.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 297

Evaluation of Internet Sources

In the era of digitalization, much information is available online, and attention is paid to evaluating the appropriateness of the source and the quality of the offered material.
  • Subjects: Internet
  • Pages: 1
  • Words: 300

How Has Cyber Warfare Application Changed in Modern Conflict

To begin with, it is important to provide a more comprehensive understanding of the concept of cyber warfare. A descriptive design will be used in the study to investigate participant views and the phenomena of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 958

Essential Standards for Building Egress

According to Koffel (20200, ensuring proper performance of the Heating, Ventilation and Air Conditioning system along with the proper classification of occupancies also contributes to the extent of safety in a building and the opportunity [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1107

Effects of Technology on Communications

Lastly, technology and communication have significantly impacted our personal and professional relationships, allowing us to maintain our connections with friends and family, regardless of distance.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 367

Transformative Learning Theory and Spirituality

In the 2013 article, "Transformative Learning Theory and Spirituality: A Whole-Person Approach," Piercy indicates that the learning process of adults can be understood by addressing the biblical understanding and the transformative approach to man's nature.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 323

Employee Self Service Application

The first is the need to bring the company's attributes online to reduce the number of steps a consumer must go through to complete their work and then consider providing this service online.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

Socio-Technical Systems & Cybersecurity Challenges

However, the paper explores the understanding of socio-technical system concepts and history by reviewing an article titled Historical Aspects of the Traditional Development of socio-technical Systems by Moiseeva and Myatishkin.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 895

Adaptive Technology Exercise for Middle School Math

Therefore, it is correct to postulate that this lesson allowed me to visually observe a classroom built on the ideology of UDL and the possibilities of intelligently combining all the essential tools to increase accessibility.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 733

The Hyperspectral Lidar Satellite

The environmental limitations of LIDAR satellites can be the consequences of the satellite launch itself, as combustible fuel is used, and its oxidized products are released into the atmosphere, affecting the climate.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 659

Chatbots for Customer Services

By 2022, Gartner expects AI-based technologies such as chatbots to be a common part of the majority of customer interactions throughout the globe.
  • Subjects: AI
  • Pages: 3
  • Words: 555

Electrical, Electronic, and Computer Engineering

The components of circuit diagrams consist of the electric cell that provides the circuit with the source of current. The circuit diagrams correlate with AutoCAD in providing a visual representation of the circuit to the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 595

The Touch-Screen Instructional Design

As for the visuals, Nelson mentions that the realization of this project requires considering the location of the buttons, links, and their size.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 405