Tech & Engineering Essay Examples and Topics. Page 12

4,325 samples

Power Amplifiers: Aims, Classes and Theory

The main aim of power amplifiers is to transform a signal of a weak strength to a signal of strong strength and direct it into a load at significantly higher power.
  • Subjects: Engineering
  • Pages: 2
  • Words: 685

The Importance of Media in the Classroom

The theory is developed from the perspective of a teacher and aims at the analysis of the classroom media employment as well as the accommodation of the reviewed sources to the school conditions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 405

Cell Phones Use in Public: Naturalistic Observation

Using the naturalistic observation, this study aims to provide the discussion of how Americans use cell phones in public places and react to the other people's use of technologies.
  • Subjects: Phones
  • Pages: 5
  • Words: 1315

Internet Gambling and Its Impact on the Youth

However, it is necessary to remember that apart from obvious issues with gambling, it is also associated with higher crime rates and it is inevitable that online gambling will fuel an increase of crime rates [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 830

Twitter Usage in Education: Advantages and Disadvantages

Students use twitter for class discussions, which involve discussing questions and other issues that are learned in class by using a username account, it is also used to promote writing, editing skills and it improves [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1539

Pumps Concepts and History

The imbibing and suppuration nozzles in a single stage horizontal split centrifugal are integrally built in the lower half of the chamber and on the same horizontal centreline.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1344

Gas Turbines and Its Types

In 1872, Stolze of Germany received the first patent marking a milestone in the development of the gas turbine. The gas turbine is one of the most flexible machines in the class of turbomachinery.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1931

Screwdriver – Mechanism Description

The fulcrum shank of a hex nut screwdriver is a metallic rod that is attached to the handle of the screwdriver and ends with a blade.
  • Subjects: Engineering
  • Pages: 2
  • Words: 579

Recording Studio Equipment: Hardware and Software

The purpose of this report is to present the information on the necessary equipment to purchase; the justification of the equipment choices; the discussion of the equipment connectivity and the diagram; and the budget table [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1500

Civil Engineering Development: Safety & Diversity

Nowadays, the development of civil engineering continues, including the involvement of women and minorities and the improvement of education, and the improvement of the safety of the constructions.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1042

Penetration Test, Its Methodology and Process

In this regard, the team tasked to carry out the penetration test must ensure that the company's chief information security officer recognizes that any figures or data acquired in the analysis will be deemed private [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1102

Overview of the Texas City Disaster, 1947

The severity of the disaster was primarily attributed to the captain, who ordered the crew to close hatches in order to preserve the ammonium nitrate.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2534

Profiling and Maintaining Passenger’s Travel Experience

Governments and passengers are required to comply with international aviation standards and legal requirements that have further strengthened the need for more stringent rules to profile customers, leading to the accusations that profiling is intrusive, [...]
  • Subjects: Accidents & Protection
  • Pages: 24
  • Words: 5081

Relationship with Cell Phones

Cell phones are people's new relationship because people use them to execute many of their daily activities. They have encouraged multitasking and solitude because people spend a lot of time interacting with information and communication [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 598

The Ballpoint Pen: Materials, Process and Issues

This essay explores the geological information of the raw materials, the processing steps and the environmental issues. With the raw materials ready, brass is obtained from a mixture of the two, with copper dominating the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 645

Intrusion Detection and Prevention Systems

The First is the network-based IDPS, which monitors and analyses the packets in a particular segment of the network to identify incidents.
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1428

Remix Culture on the Internet

Thus, it is inevitable for a remix to face legal issues when a part of the original piece is copied, adapted, or reproduced without the agreement and permission of the copyright owner through a Creative [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2213

Watching TV Makes You Smarter?

Although it is true that watching TV and playing video games can be mentally stimulating activities, it is important to remember the value of selecting shows and video games that can help children accomplish the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 891

Technology Use in Classrooms: Pros and Cons

As long as the use of modern media by students is controlled by teachers and occurs as a part of the lesson and not the focus thereof, the specified tools can be viewed as a [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 856

Space Exploration Accidents: Challenger and Columbia

The failure in the joint of the elements of the rocket motor caused the Challenger catastrophe. The analysis of the accidents led to the development of a number of recommendations.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 828

Fire Hazards Related to Fireworks

In the period of the Song Dynasty that lasted from 960 to 1279, a majority of the ordinary persons could buy a variety of forms of fireworks from market sellers, and splendid exhibits of fireworks [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2798

Humanities and Computer Science Collaboration

Much attention has over the years been given to IS as a social science, and much has been published on the application of IS in the humanities, however, the gap in the reflection and theory [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3679

Salesforce.com: Cloud Computing

The firm also faced the challenge of demonstrating to its clients that it was dependable and safe enough to manage their corporate data and applications remotely.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 553

The Ideal HPC Programming Language

In the course of the study, a correspondence of the rewritten programming systems to the original models of computing was inspected.
  • Subjects: Programming
  • Pages: 3
  • Words: 834

General Aviation Security Liabilities

Presently, the increase in the number of attacks on airports and airlines due to poor maintenance and negligence is a serious concern to a number of stakeholders.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2310

Automation in the Aviation Industry

Even though automated systems increase the efficiency of operations in the aviation industry, automating the roles of first officers is a bad idea.
  • Subjects: Aviation
  • Pages: 2
  • Words: 627

Will Robots Ever Replace Humans?

It is quite peculiar that Bolonkin uses negation in order to stir the audience's delight; more impressively, the specified approach works the pathos is concealed not in the description of the possibilities, but the compliment [...]
  • 5
  • Subjects: Robotics
  • Pages: 8
  • Words: 2066

An Argument Against Technological Advancement

Summaries Eggers's description of the book's title as The Circle is similar to that of the company. In addition, the familiarity of the author with modern technological advancement is convincing to the audience.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1428

Skype: All you Need to Know

A number of features of Skype comprise Skype to Skype calls, SMS messaging, video calls, immediate messaging, and the capability to forward calls to cell phones of the users when the user is offline.
  • Subjects: Phones
  • Pages: 5
  • Words: 1390

Biometrics and User Authentication

The cost of installing a fingerprint authentication system is higher relative to a voice recognition system. The cost of face recognition biometric authentication system depends on the security level of the system.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1743

Computer Technology in the Last 100 Years of Human History

These communication tools are based on computer technology, and are the foundation of younger generations' living. Computer technology is detrimental to the lives of younger generations because it fails.
  • 5
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1113

Technology Evolution in The Modern Society

Service perspective - which holds that e-commerce constitute a tool that fulfills the needs and desires of companies, customers and management with aim of reducing the transaction costs while at the same time being able [...]
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4289

Database Management Systems in Charities

In conclusion, the research will identify issues associated with the use of database management systems in charities as well as churches and effective ways to handle these problems.
  • Subjects: Data
  • Pages: 7
  • Words: 1928

Autonomous Robots

Since they are self sufficient, the autonomous robots have the capacity to work in the absence of human beings. In the future, humanoid robots might have the intelligence and emotions similar to those of human [...]
  • Subjects: Robotics
  • Pages: 7
  • Words: 1963

Censorship on the Internet

Censorship in the internet can also occur in the traditional sense of the word where material is removed from the internet to prevent public access.
  • Subjects: Internet
  • Pages: 9
  • Words: 2516

Pipeline Installation Elements

This must take into account the line size of the pipeline and the length of the barrel. Design Pressure The design pressure must serve as a basis for determining the thickness of the wall of [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2790

Construction Safety in Latino Community

The study seeks to: Examine the prevailing status of construction safety and accidents among male workers in the Latino community, especially in the construction industry.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3914

Voice Over Internet Protocol (VoIP)

For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2838

Legal and Ethical Issues in IT

The fact that technology keeps changing adds to the complexity of the ethical and legal issues surrounding information technology. One of the most significant ethical issues in information technology is that of appropriate use.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Article Review on Technology in Education

Teachers have employed digital teaching and learning methods to meet the needs of the students; however, a lot of problems that come with the adoption of technology in education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 590

Engineering Professionalism and Ethics

On the other hand, the professors apply the several elements and aspire to develop the lives of different individuals. It determines the way a professional handles the issues that are to be engaged with learners [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1140

From Common Things to the Best Ideas

This was the beginning of the discovery of the concept behind gravitational pull. This is how Newton got the idea that there was something that makes things fall and this thing was a kind of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1013

Security Vulnerabilities in Software

This is a problem that has resulted from failure of the system, in the engineering processes which allocate the requirements of the system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 720

“Stalking the Wily Hacker” by Clifford Stoll

According to the provided article, effective communication requires adoption of superior strategies and security elements that hold the potential of enhancing safety of the information relayed.
  • Subjects: Internet
  • Pages: 7
  • Words: 1976

Internet Key Exchange Protocol

On the other hand, a symmetric data encryption, also referred to as conventional data encryption, uses a common key to encrypt and decrypt data.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 828

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

Blu-Ray Triumph Over HD-DVD

HD-DVD war, Sony had an upper hand in their Blu-Ray discs that store 25GB on a single layer compared to HD-DVD having a capacity of 15GB on a single layer.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 702

Ethics in the IT Practice

These are among the issues which have necessitated the governments across the globe to collaborate and develop comprehensive and detailed laws regarding the use of information technology.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1416

Ethical Industrial Engineering Ethics

Failure to embrace this by past engineers led to the establishment of code of ethics that guide all engineers in their day to day execution of services.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1872

Effects of Technology in Education

The invention of computers and the Internet technology have brought a major revolution in the education field. This is quite a big development in the field of education and it can all be attributed to [...]
  • 1
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 873

Evolution of Fire Protection Codes

With regards to the findings in this research paper, the following hypothesis seems relevant: despite the gradual improvements made to fire protection codes, noncompliance and the challenge of dynamic nature of fire disasters continue to [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3864

Application of Technology in Education

Therefore, it is vital for educators to use the above spheres of learning in the application of technology in education. However, the spheres of learning are in constant conflict with each other in the lives [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1107

Technology Development In Asia

The science and technology in the Republic of India, for example, has employed advanced technologies in the manufacture of commercial vehicles.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1619

A Review on Cloud Computing: Concepts and Benefits

According to Rodriguez, several organizations establish community cloud to have common requirements and need to share infrastructure to understand the benefits and aspires to assemble ideologies of a digital ecosystem with the use of a [...]
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2768

The Curious Case of Gary McKinnon

In this case, the author uses the alleged computer hacker who was identified as Gary McKinnon from the United Kingdom in the case study to address the complex types of criminal activities that do take [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1375

The Role of the Internet in Business

The thesis statement The role of the Internet in business cannot be neglected, as the World Wide Web can be regarded as one of the most powerful and effective tools for conducting business.
  • Subjects: Internet
  • Pages: 4
  • Words: 1090

Can Educational technologies improve learning?

From this perspective, amid considering various arguments and counter-arguments for and against the roles of educational technologies in the modern society in improving learning in schools, the paper argues that educational technologies can serve to [...]
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1964

The Environmental Responsibility of Engineers

Today, the problem of the environmental responsibility is actively discussed by the scientists and researchers in relation to the global environmental problems, and the most influential one of them is the climate changes, which are [...]
  • 3
  • Subjects: Engineering
  • Pages: 7
  • Words: 1902

Occupational Health and Safety Theories: La_Camera Restaurant

The recommendations offered for La_Camera include the use of more positive methods of enforcing occupational health policies, reduction in the use of the punitive measures, and the implementation of the measures to mitigate not just [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2729

Emerging Technology in Wireless Networking

The volatile growth of wireless systems together with the proliferation of laptop and miniature computers points out a brighter future for wireless networks, both as independent systems and as part of the wider networking infrastructure.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2753

Importance of Chemical Engineer Profession

Most of the schools claim to lack some important resources to handle science lessons well, and that is one of the reasons of this campaign to influence both the teachers and the students to have [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1187

Computer System Electronic Components

The Random Access Memory commonly referred to as RAM is another fundamental component in a computer system that is responsible for storing files and information temporarily when the computer is running. The other storage component [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 526

The Objectives of Mobile Forensics

This owe to the fact that the tools used in mobile devices tracking are evolving on a daily basis, with the changing technology.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 460

DirecTV Organizational Technology Plan

In the contemporary world, technology has become an integral part of organizations; however, it has affected the society and the environment mainly due to the changes that come about with it, which people have to [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 967

Management of Information Security and Control

Therefore the management of information should be one of the priorities if the organization is to be successful. Risk management is broadly divided in to two phases: the first one is risk assessment which involves [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2849

Artificial Intelligence: Pros and Cons

Artificial intelligence, or robots, one of the most scandalous and brilliant inventions of the XX century, causing people's concern for the world safety, has become one of the leading branches of the modern science, which [...]
  • 3
  • Subjects: Robotics
  • Pages: 4
  • Words: 1163

Lockhart River Plane Crash

It is also clear that the radar squad did not continuously observe the position of the plane; furthermore, it was fathomed minutes later that the plane was absent Systems and Methods The cause of the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2761

Description of Global Positioning System Device

Image 1 shows the positions of the various satellites that constitute the GPS. It is done to establish satellite clock and orbits profiles in order to update the navigational information of individual satellite.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Fibre Optic vs. Coaxial Cables: Advantages and Disadvantages

The cables are used mainly for the transmission of data from different terminal points, including computers and televisions. The cables are also immune to noise interferences that affect the quality of coaxial cables.
  • 2
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1111

How Infographics Make it Easier to Receive Information

Some of the limitations to the use of images in infographics include the visual impairment of the intended subjects, lack of clarity in the presentation of the message, and existing personal viewing preferences such as [...]
  • Subjects: Computer Science
  • Pages: 19
  • Words: 5180

Children’s Game Analysis Project: The Sims

Being aimed at showing the daily activities of the family, the game is great in considering the roles of the family members and the distinguishing those in accordance with the gender roles.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 563

Analysis of Boeing and Airbus

The strategy to meet the needs of the global market done by Airbus and Boeing companies has been on the basis of organizing its local Genuine Assets to work better than other companies, confronting the [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 1075

How to Use an Automatic Gas Cooker

Place the gas control knob on to the gas cock axis and push it inward firmly. Maintenance of your gas cooker Always clean the top of your gas cooker with soap and water and dry [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 623

Contribution of the Factors to the Internet Growth

With the use of this different scripting languages integration of multimedia features into products has become a reality and with the advancement in scripting languages the internet in the near future is expected to have [...]
  • Subjects: Programming
  • Pages: 5
  • Words: 1653

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

Use of Simulation in Military

The first type of simulation used in the military is live simulation. The second application of simulation in the military is the use of virtual simulation.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

The Open Systems Interconnection Referencing Model

Layer 7: The Application Layer This layer is the interface between the user and the network. The layer "transforms the data from the session layer to provide a standard interface for the application layer and [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1508

Technology: Being Digital

This has been achieved by the fact that the world is a global village thus transmitting information does not have to rely on time and money. A click of the mouse is enough to have [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 716

Dangers of Texting while Driving

The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • 5
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1123

Are Hybrid Cars Worth It?

First and foremost what must be understood is that hybrid vehicles on average cost more than their primarily gasoline based counterparts, while it may be true that the hybrid car industry focuses on the fact [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2008