Tech & Engineering Essay Examples and Topics. Page 12

4,328 samples

Benefits and Dangers of Ethical Hacking

The advantages of ethical hacking The following are some of the advantages associated with the use of ethical hacking in an organization.
  • 5
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1613

The Curious Case of Gary McKinnon

In this case, the author uses the alleged computer hacker who was identified as Gary McKinnon from the United Kingdom in the case study to address the complex types of criminal activities that do take [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1375

Solar Energy in the United Arab Emirates

The success of the solar power initiatives in the UAE is largely attributed to the wide range of financial incentives that the UAE government has offered to the companies that are prepared to advance the [...]
  • 5
  • Subjects: Engineering
  • Pages: 5
  • Words: 1352

The Environmental Responsibility of Engineers

Today, the problem of the environmental responsibility is actively discussed by the scientists and researchers in relation to the global environmental problems, and the most influential one of them is the climate changes, which are [...]
  • 3
  • Subjects: Engineering
  • Pages: 7
  • Words: 1902

Different Types of Cement

The other types of cement include the blended and the hydraulic cement. Type one and Type one-A constitute of the Portland cement used for most of the basic construction.
  • 5
  • Subjects: Engineering
  • Pages: 3
  • Words: 853

Ethical Hacking: Bad in a Good Way

Introduction of personal computers led to the increase in the number of hackers as well as hacker targets were widened. Many hackers lack the skills to damage network systems in a major way.
  • 3
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1718

The Main Guidelines and Industrial Hygiene Concerns

In response to the case of New Orleans Hospital which has been affected by the Katrina disaster, the concept of industrial hygiene should be adopted in the recovery process. In execution of the rescue process, [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1141

Development of Airbus A340 and Its Uniqueness

The Airbus A340 was completed and was ready to fly in the late 1990s A340 is normally assembled in Toulouse in France and the fuselage is developed in Germany; the fuselage is the body of [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 1473

Information Security of Information Technology

With the growth of information technology and its increased access, information security is a point of concern especially in regard to the transmission of the same.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2335

Communication Technologies in Egypt

Significant technologies as developed with respect to two Egyptian revolutions, one in the year 1952 and the other in the year 2011 are discussed in line with the roles that these communication technologies played in [...]
  • Subjects: Phones
  • Pages: 12
  • Words: 3349

The Objectives of Mobile Forensics

This owe to the fact that the tools used in mobile devices tracking are evolving on a daily basis, with the changing technology.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 460

Internet Files Sharing

The tutor and the student are now able to communicate and exchange file over the internet in form of lessons, instructions, and assignments online.
  • Subjects: Internet
  • Pages: 4
  • Words: 1079

Management of Information Security and Control

Therefore the management of information should be one of the priorities if the organization is to be successful. Risk management is broadly divided in to two phases: the first one is risk assessment which involves [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2849

Video Games Impact on Peoples Lives

These games have had a great influence in the minds of people, especially the children who have stopped playing the usual games on the fields to sticking on the computer and television screens playing video [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3703

Artificial Intelligence: Pros and Cons

Artificial intelligence, or robots, one of the most scandalous and brilliant inventions of the XX century, causing people's concern for the world safety, has become one of the leading branches of the modern science, which [...]
  • 3
  • Subjects: Robotics
  • Pages: 4
  • Words: 1163

Drone Technology and the Future

The author focuses on individuals whose level of success goes beyond the imagination of most people and challenges the reader to analyze the interplay of factors such as family, culture and friendships in influencing the [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 825

Tablet Computer Technology

It weighs less than 500g and operates on the technology of AMOLED display with a resolution of WVGA 800 480 and a detachable input pen.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 540

Creating a Strong Password

Users should create a password that contains secure relations to certain applications or tasks so that it will be easy to remember.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 605

Smart Grid Technology

The most common application of smart grid technology is in electricity distribution. In conclusion, smart grid technology has changed the way power is generated and transmitted.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Effects of Surveillance Technology on Privacy

The presence of surveillance devices and gadgets in public gathering places limits the use of the public places, as many people will tend to avoid such places in fear of exposing their privacy to their [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1660

Fire sprinkler system

Objectives Ascertain the history of fire sprinkler system Portray the role of fire sprinkler system Establish the recommendations for improvement of fire sprinkler system Significance of Study This study is significant in identifying the growth [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3314

How to Use an Automatic Gas Cooker

Place the gas control knob on to the gas cock axis and push it inward firmly. Maintenance of your gas cooker Always clean the top of your gas cooker with soap and water and dry [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 623

Contribution of the Factors to the Internet Growth

With the use of this different scripting languages integration of multimedia features into products has become a reality and with the advancement in scripting languages the internet in the near future is expected to have [...]
  • Subjects: Programming
  • Pages: 5
  • Words: 1653

Use of Simulation in Military

The first type of simulation used in the military is live simulation. The second application of simulation in the military is the use of virtual simulation.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

Application of RFID Technology

The silicon chip in the transporter tag contains object such as the exact place of location, the date of manufacture, the color of the product, the price, or any other relevant information.
  • Subjects: Applications
  • Pages: 5
  • Words: 1595

Technology: Being Digital

This has been achieved by the fact that the world is a global village thus transmitting information does not have to rely on time and money. A click of the mouse is enough to have [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 716

The Rationale of the Cryonics

The Egyptians hence tried to make sure that they preserved a person very close to immortality and this is the reason why they when to greater extent of building the pyramids and doing the mummification.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 2017

Relational Database Systems

This is a business report, personally addressed to the manager of the Easy Drive School of Motoring explaining why and how a relational database system will address the problems of the organization.
  • Subjects: Data
  • Pages: 6
  • Words: 1702

Solutions to Computer Viruses

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 562

Importance of Speed Limits and Stop Signs for Road Safety

Obeying the speed limit and stopping at stop signs are not merely legal obligations; they are crucial for ensuring the safety of drivers and pedestrians alike. Speed limits and stop signs are specifically designed and [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 557

The Impact of Technology on Attention and Time Management

In this case, it is essential to preserve the possibility of choice and the existence of an alternative in building relationships with technologies without falling into the trap of use and fear.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 366

Insider Threats and Aviation Security: A Study Proposal

Employees in any industry pose security threats due to easy accessibility to the inside operations of the workplace. Like other industries, the aviation business is not exceptional as employees may have the motivation to harm [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 2467

Hash Tables in Weather Software

Given the current dynamic trends in weather patterns, hash tables provide a fast and efficient way to store, access, and retrieve data.
  • Subjects: Data
  • Pages: 1
  • Words: 405

Technology Implementation: The Role of People and Culture

The right people with the right skills and backgrounds must be brought together to ensure the technology project is successful. Consequently, creating a vision for the future can be employed by leaders to set expectations [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 646

Ada Lovelace: Scientific Contributions

Unlike her contemporaries, she emphasized the harmony between machines and humanity, making her one of the key innovators in the history of technological advancements.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 283

Natalie Wexler: Reconsidering Classroom Technology

By sharing her experience with Kevin, a student from a minority group with a poor financial background, she demonstrates that the students struggle to interact with technology.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 398

UNION-Based SQL Injection and Its Prevention

0x3a resolves to a ":", the concat function combines multiple string elements into one, and select database returns the current database's name.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 316

Robotization in Business: Issues and Solutions

All of these issues rely on the assumption of the inherent efficiency and reliability of AI-based technologies and the optimizing effect of automation on different analytical and practical processes. One of the possible options for [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1467

Aspects of the Home Phone

The main factor contributing to a similar decline in the home phone is the alternative of the mobile phone. The landline is an item that is not usually powered by electric circuits in the home [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 261

Over-the-Top TV Technology and Sports Marketing

Second, the appeal of live sports streaming is linked to a broader symbolic power that has long been associated with the experience of live events on television and radio.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1395

Deleted Data: Utilities to Recover

It does this by looking for the file's data in the space that was marked as available for use by the operating system, and if it is able to find the data, it can restore [...]
  • Subjects: Data
  • Pages: 1
  • Words: 287

Information Security: The Main Threats

Because of the dangers involved with using out-of-date security software, it is crucial to keep it updated on a regular basis.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 394

Mobile App for a Retail Business

Executing - Putting the project plan into action and carrying out the tasks essential for finishing the project. Additionally, it involves gathering their opinions and input to modify the project plan as necessary.
  • Subjects: Applications
  • Pages: 3
  • Words: 889

Internet of Things and Its Level of Implementation

IoT is defined as a collection of tangible objects embedded with processing abilities, sensors, and software to connect and exchange data with other systems and devices using the internet and other communication networks.
  • Subjects: Internet
  • Pages: 6
  • Words: 1666

Cyber Security: Fortifying the Digital Fortress

To effectively tackle the ever-changing threat landscape and guarantee the security and stability of the digital realm, a thorough and multi-faceted approach to cyber security is essential, integrating organizational measures, education, cooperation, and technological innovations.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1008

Enhancing Education Through Technology Integration

The sense-making use of digital instruments, the ability to solve complex learning problems, and the value of feedback opportunities are important effects of the adoption of technological solutions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 555

Erie: Biomedical Sensors Development

As a result, we collaborate with medical professionals all around the United States to expand the use of ubiquitous biomedical sensors.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 386

Ethical Issues of the Internet Use for Research

Naturally, this is not ethical to contribute to the violation of the confidentiality of individuals who have shared any information online, even if it is unintentional, considering that it has not been authorized by the [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 921

AT&T Documentation Regarding Cybersecurity

The author starts with the basics of psychological perception of unexpected events, which can potentially threaten people, or in this case, the computer and software. It confirms the importance of the documentation regarding cybersecurity and [...]
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 361

The New Life: Fitness Application

In the code above, the sendSMSNotification function is only called if the user grants permission for the App to send SMS messages.
  • Subjects: Applications
  • Pages: 2
  • Words: 422

Computer Facial Recognition as Threat to Human Autonomy

Norberto Andrade, the author of "Computers Are Getting Better than Humans at Facial Recognition" is concerned about the consequences of the fact that modern technologies can determine the discrepancy between facial expressions and inner experiences. [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 306

Protecting Cyber Data with Honeypots

The main advantages are the simplicity of analysis, cost-effectiveness, and the ability to identify internal threats. However, it is essential to understand that decoys are one of the components of a comprehensive cybersecurity strategy.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 297

How Has Cyber Warfare Application Changed in Modern Conflict

To begin with, it is important to provide a more comprehensive understanding of the concept of cyber warfare. A descriptive design will be used in the study to investigate participant views and the phenomena of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 958

Essential Standards for Building Egress

According to Koffel (20200, ensuring proper performance of the Heating, Ventilation and Air Conditioning system along with the proper classification of occupancies also contributes to the extent of safety in a building and the opportunity [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1107

Effects of Technology on Communications

Lastly, technology and communication have significantly impacted our personal and professional relationships, allowing us to maintain our connections with friends and family, regardless of distance.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 367

Transformative Learning Theory and Spirituality

In the 2013 article, "Transformative Learning Theory and Spirituality: A Whole-Person Approach," Piercy indicates that the learning process of adults can be understood by addressing the biblical understanding and the transformative approach to man's nature.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 323

Metaverse and Its Influence on Society

The metaverse has the potential to revolutionize entertainment, improve communication and collaboration, and increase equality. The possibility of using the metaverse as a tool for monitoring and management is a serious concern.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 824

Employee Self Service Application

The first is the need to bring the company's attributes online to reduce the number of steps a consumer must go through to complete their work and then consider providing this service online.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

Socio-Technical Systems & Cybersecurity Challenges

However, the paper explores the understanding of socio-technical system concepts and history by reviewing an article titled Historical Aspects of the Traditional Development of socio-technical Systems by Moiseeva and Myatishkin.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 895

Adaptive Technology Exercise for Middle School Math

Therefore, it is correct to postulate that this lesson allowed me to visually observe a classroom built on the ideology of UDL and the possibilities of intelligently combining all the essential tools to increase accessibility.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 733

The Hyperspectral Lidar Satellite

The environmental limitations of LIDAR satellites can be the consequences of the satellite launch itself, as combustible fuel is used, and its oxidized products are released into the atmosphere, affecting the climate.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 659

Chatbots for Customer Services

By 2022, Gartner expects AI-based technologies such as chatbots to be a common part of the majority of customer interactions throughout the globe.
  • Subjects: AI
  • Pages: 3
  • Words: 555

Electrical, Electronic, and Computer Engineering

The components of circuit diagrams consist of the electric cell that provides the circuit with the source of current. The circuit diagrams correlate with AutoCAD in providing a visual representation of the circuit to the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 595

Technological Driver of Change

Businesses have been pushed to alter how they design and build their websites and applications as a result of the popularity of mobile devices.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 636

The Touch-Screen Instructional Design

As for the visuals, Nelson mentions that the realization of this project requires considering the location of the buttons, links, and their size.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 405

Obesity Treatment: The Use of Technology

It is helpful to consider if the research question addresses treatment, prevention, prognosis, early diagnosis, or the investigation of the root cause while using the PICO format to create one.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 497

Improved National Cybersecurity Strategy

While most of the systems would be in the hands of private companies, the department will go further to formulate and set the necessary standards for pursuing cybersecurity efforts.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1420