Tech & Engineering Essay Examples and Topics. Page 12

5,642 samples

Metaverse Potential in the Education and Training Industry

Due to the theoretical orientation of this research, most attention is paid to the first two: the assessment of the environment, the definition of the main objectives, and the collection of the necessary information for [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2221

Aviation Training: The Grounded Theory

The purpose of the study was to test the usefulness of grounded theory in aviation training. The sample was substantiated by the professional activity and the role of the subjects in the military educational institution.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2055

Uber Eats App: Success Stories

The campaign will focus on the favorable view of the Uber Eats app's success stories and its customers, which include restaurants and grocery shops.
  • Subjects: Applications
  • Pages: 1
  • Words: 277

Science Learning: Technological Tools

PhET simulations employ images and simple controls like click-and-drag operations, knobs, and dialog boxes to portray what is unseen to the eye in order to aid students in visualizing topics.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 385

LaGuardia Airport: The Cyber Risk Identification

The rising tensions between the North Atlantic Treaty Organization and the Russian Federation have heightened the risk of cyber-attacks. As in Figure 1, the consequences are severe in the event of a successful assault since [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1491

Tech Trends: Computer Vision vs. Virtual Twins

As for human face recognition, security is not the focus of this study, but it may be used to track the number of visitors to help calculate attendance, desired capacity levels, and income.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 996

The Corporation’s Cybersecurity Improvement

The OS is not the same as the information system, as the OS is a component of the IS. The Mac OS remains vulnerable to the same risks as Linux and Windows, although the probability [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2329

Machine Learning in Medical Imaging

Therefore, the clarification of the basic processes of the different topics of medical imaging, including X-rays, MRIs, and CT scans, will provide context for our investigation of machine learning in the next section.
  • Subjects: AI
  • Pages: 2
  • Words: 1250

In-House vs. Outsourced IT Solution

The components of the source, the vendors, and the origin of the software-intensive system are the key drivers of the outcomes of a component sourcing option.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

Windows 10 Upgrade Plan for Tetra Shillings Accounting LLC

I believe Windows 10 Pro is the best and most advanced version of Windows currently available. Similarly, when a new update is downloaded, Windows 10 Pro notifies users before installing and restarts to avoid work [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 967

The Role of IoT-Based Intelligent Home Technology

I will then write a scientific report on the project, create a presentation, and publish it to make it available to the scientific and engineering community, utilizing the skills I learned in the scientific writing [...]
  • Subjects: AI
  • Pages: 11
  • Words: 3233

Forces on a Rotating System Laboratory

The mass appears to push outward due to its inertia in the case of a spinning system because the centripetal force pulls the mass inward to follow a curved path.
  • Subjects: Engineering
  • Pages: 2
  • Words: 576

Ubiquitous Computing in Social Studies

In order to provide advantages to the educational process with the help of this innovation, it is necessary to study it and work with third-party specialists carefully. One of the varieties of using ubiquitous computing [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 309

Blockchain: Exploring Innovation

It is possible to assume that blockchain is the innovative technology that revolutionized the financial system and the system of informational exchange in recent years.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 827

Efficient Windows 10 Implementation Guide

The firm needs to upgrade and use the Windows 10 Enterprise operating system once it decides to upgrade. The first part will show the upgrade matrix and the security features of Windows 10.
  • Subjects: Applications
  • Pages: 3
  • Words: 1287

Notetaking in an Online Environment

One of the appeals of handwritten notes involves the ability of a student to exploit the brain's nature to remember key concepts relative to the exhaustive scripts.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 287

Blockchain Technology, Fraud and Accountability

However, both T&R Staff and Associated Press acknowledge that there are risks associated with the current state of cryptocurrencies, which is why they suggest adopting the technology but not the existing forms of electronic money.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 546

MetaSpace: The Proposed Internet-Based Design

The different additional features to be introduced by MetaSpace, the risks and solutions associated with it, and how the identified potential vulnerabilities will be solved form the basis of discussion for this paper.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2770

Software Automation and the Future of Work

When AllDone's software developers lacked the resources to create and develop an automation process, the team of employees performed what the writer referred to as computational labor.
  • Subjects: Robotics
  • Pages: 2
  • Words: 628

Project Deliverables, Goals, and Outcomes

Deliverables exist as working proof of the project's progress, a way to display active effort on the part of the company to its stakeholders and consumers. Instead, outcomes are an objective recording of the effects [...]
  • Subjects: Project Management
  • Pages: 1
  • Words: 288

Distributed Ledger Technology and Governance Issues

In the past, the aspect of achieving a general agreement on the data, decentralization, distribution, and trustlessness was the major issue that made the concept remain unfit and reliable.
  • Subjects: Other Technology
  • Pages: 11
  • Words: 3059

Contemporary Problems Related to Computer Science

This fraud is widespread in the Computer science industry, and much attention is paid to it. In the case of the older generation, care and concern should be given to their relatives.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 412

The Shore & More Bicycles Firm’s Information Technology Gap

To support the organization's growth plan, the following elements must be in place: A scalable payroll system is an employee payroll system that can adapt to staffing demands and increase the functionality of timekeeping as [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2824

Negative Impacts of Emerging Mobile Technologies

It will lead to more hours spent in games and, thus, increase the probability and strength of addiction. In the case of online games, social and game addictions are combined.
  • Subjects: Phones
  • Pages: 10
  • Words: 2783

Digital Certificate Management

The paper focuses on the process of issuing and managing digital certificates, discussing the weaknesses and vulnerabilities of different methods and the issues with revoking certificates, and possible remedies.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1223

Analyzing Virtual Reality (VR) Technology

Since personal agency and the sense of freedom and responsibility that it involves are vital to moral existence, the possibility of depersonalization posed by the widespread usage of VR poses a huge potential ethical dilemma [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1053

Information Technology Developments and Innovations

However, during the first and second industrial revolutions, innovations in technology in terms of software and hardware accelerated to unprecedented levels. The fifth component is human resources which are needed to operate the hardware and [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 871

Researching of Ubuntu Operating System (OS)

The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2048

The Need for Physical Security in the Modern World

The adoption and integration of Internet of Things and Industrial Internet of Things devices have produced a network of Cyber-Physical Systems that is more interconnected than before, increasing the attack surface and hiding features of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1183

The Airbus Helicopters AS350 B2, N350LH Crash

The increased attention to the given issue is explained by the fact that the emergence of accidents leads to significant risks to passengers and the crew.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 598

Space Management: Cyber Security Issues

Focusing On Safeguarding the Space From the sample of texts given, the bottom line is that there is a need to protect space due to the usefulness part of it.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 872

Education: Impact of Technology

As the use of technology in the classroom increases, people have to be more mindful of ethical issues that arise from it. It is important to remember that there are also legal issues connected to [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 399

Shared Mental Models: Visual Tool Assistance

Furthermore, it is in the diversification and deep and equal understanding of the problems posed to them that SMM is valid for a positive outcome.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 328

The Yankee Stadium: Impact of Technology

Chiefly, the new stadium was founded in order to accommodate the technological advancements needed for the stadium and events held there to thrive.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 321

Artificial Intelligence in Aviation

The findings demonstrate that the absence of AI-based laws and regulations in the aviation sector has hampered the deployment of safety-critical AI.
  • Subjects: AI
  • Pages: 1
  • Words: 318

Trends in the Cyber-Threat Landscape

This chapter reviews trends in the threat landscape, including human mistakes, crisis events, the growth of artificial intelligence and the Internet of Things, and the evolution of cyber-attacks in terms of purposes.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 1585

Establishing Smart Chair with Voice Recognition

Before defining how the voice recognition technology built into the chair will avoid the disadvantages of working from home, it is essential to highlight some features of its work. In conclusion, it will be essential [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 972

Role of Cybersecurity in Remote Work

Then, it will focus on possible cybersecurity measures to protect companies' data, using the NIST Cybersecurity Framework to exemplify cybersecurity's role in remote working. Cybersecurity's role in the practice of remote working proves to be [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 520

Face-To-Face and Online Surveys in the Aviation Industry

The specific purpose of the article was to compare and discuss face-to-face and online surveys in the aviation industry. What is the difference between online and laboratory interviews in the research framework on the topic [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 2067

Cyber Operations Do not Risk Inadvertent Escalation

This scenario may potentially happen if the target replies with more severe and costly cyber methods, cyber escalation within the cyber domain, or cyber-kinetic threshold breaching in other words, cross-domain escalation.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 551

AI Training Algorithm: Cybersecurity for the Organization

During the presentation at the conference, the skills of purposeful observation and experiment setting are formed; they go through the whole path of research activity from identifying the problem to protecting the results obtained.
  • Subjects: AI
  • Pages: 5
  • Words: 1374

Remote Work and Smart Home

The objective of the study is to identify the future trend of smart homes and their influence on remote work. Thus, the concept of a smart home and remote work will grow in demand.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1185

Scanning for and Analyzing New Technologies

In terms of the company's ability to engage in scanning for adoptable technologies, it is tied to the available resources and leading personnel guidance.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 594

Access to Drones and the Risk of Terrorist Attacks

The number of drones possessed by people and organizations has significantly increased as a result of the difficulty that authorities have had in controlling the sale of commercial and toy drones.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 634

The Histogram Concept Definition and Examples

For example, through the creation of a histogram with the frequency of purchases and the class interval of age that shows the range of age groups in comparison with the number of purchases, marketers receive [...]
  • Subjects: Data
  • Pages: 2
  • Words: 596

Impact of Covid-19 on the Smart Home Development

This paper looks at the literature on the evolution of digitalization in light of the COVID-19 pandemic, which has resulted in the widespread adoption of smart homes and is expected to continue.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2326

Effect of the Internet on Our Brains

At the same time, the parts of the brain involved in attentiveness remain dormant and deteriorate. The increasing use of the Internet hindered my ability to focus on a particular task.
  • Subjects: Internet
  • Pages: 1
  • Words: 190

Navigating AI in Security: Safeguarding Privacy and Society

I strongly believe that in order to address the issue of AI for security purposes, it is crucial for governments, markets, and organizations to work together to develop ethical guidelines and best practices for the [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1400

Nonfunctional Requirements in Software Development

The paper will examine common obstacles caused by non-functional requirements in software development and hardware design to outline a research proposal for each of the topics.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1117

Fixing a Pothole in the Road: Costs Calculation

Our team proposes to fix the pothole by using high-quality asphalt to fill and compact it. We estimate the project will take approximately 4 hours to complete, resulting in a total labor cost of $240.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 641

Electrical Multimeters: Overview and Application

It is a crucial tool for the electrical and electronics industries because it enables electricians and techs to identify electrical issues, analyze circuitry, and test electrical parts [1].
  • Subjects: Other Technology
  • Pages: 2
  • Words: 589

Tech Transformations:Uber and Versum

The management factors that contributed to the problem were the time frames to find the substitution and legal and regulatory standards.
  • Subjects: Project Management
  • Pages: 2
  • Words: 670

Aspects of the Cybersecurity Theories

Constructivism indicates that states' beliefs of the significance of cybersecurity and the norms around cybersecurity are crucial elements in shaping their conduct in cybersecurity. The use of coercion and intimidation to achieve political aims is [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 669

Interdependence of Manager and Systems Engineer

The roles and responsibilities of the project manager and the systems engineer are interrelated at different stages of the project as they play an important part in the successful completion of the project.
  • Subjects: Project Management
  • Pages: 2
  • Words: 565

The Home Internet and Network Security

In addition, system security should be considered as well in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 400

A Commercial Tanker Incident Analysis

Due to the limited vision, the pilot and the bridge crew had a difficult time performing an accurate assessment of the situation in order to make the necessary modifications.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 2097

Coarse- and Fine-Grained Parallelism

Fine-grained parallelism uses smaller parts of the program for parallel processing and requires a large number of threads to perform tasks.
  • Subjects: Programming
  • Pages: 3
  • Words: 914

Internet Rulings, Laws, and Regulations

As the interception happened "contemporaneously with the transmission of the communication," the recording was found to be unlawful as it violated the Wiretap Act.
  • Subjects: Internet
  • Pages: 2
  • Words: 660

The Air Florida Flight 90 Crash Analysis

This paper will analyze the performance of the crew and other relevant teams concerning the principles of aircrew training and Crew Resource Management and the principles of 6th Generation CRM/Threat and Error Management.
  • Subjects: Aviation
  • Pages: 3
  • Words: 912

Online Transactions Challenges and Solutions

These regulations are formulated by the most relevant brands in the industry, such as MasterCard and Visa, to ensure the safety of online transactions.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 277

The Impact of Aircraft Icing on the Horizontal Stabilizer

A small amount of ice on the tailplane leading edge can disrupt the airflow on the lower surface of the horizontal stabilizer, causing flow separation that reduces the stalling angle of attack and limits the [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 548

Artificial Intelligence for Recruitment and Selection

As a result, the hiring process has changed considerably, and it is crucial to comprehend how social media and technology affect it. In conclusion, technology and social networking have had a big impact on both [...]
  • Subjects: AI
  • Pages: 1
  • Words: 360

Internet and Smartphone Effect

In this essay, I analyze the arguments advanced by experts in five different publications in order to investigate the consequences of internet and smartphone use on human behavior and relationships during the COVID-19 epidemic.
  • Subjects: Internet
  • Pages: 4
  • Words: 1076

The Development of the Internet Space

For example, how moral it is to use ad blockers, considering the fact that online advertising is necessary to pay for content that users get for free.
  • Subjects: Internet
  • Pages: 1
  • Words: 300

Gyrocompass and Its Significance

This approach allows the tool to use the velocity of its internal parts to upkeep a single direction. In conclusion, the significance of a gyrocompass is paramount in aviation, as this device can operate within [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 319

Technology Strategy for Business Success

In conclusion, while technology strategy can be a challenging and uncertain field, the key takeaways from the success stories of companies like Genentech, Amazon, Microsoft, Google, and Facebook show that it is possible to navigate [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 409

Modern Technologies’ Impact on Global Community

Some of the examples include the development and widespread use of the Internet, the introduction of machine translators, and more recently, the introduction of neural networks for image generation.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 635

Satellite Imagery: Strengths and Weaknesses

It is unreliable for detecting low clouds at night because the temperature emitted by underlying clouds and fog is somewhat the same as in surrounding areas This technology is often applied to detect the presence [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Aborted Take-Off of a Large Twin-Engine Commercial Aircraft

The Aircraft Maintenance Log indicates that the take-off power of the #1 and #2 engines was applied; however, the #1 engine failed to reach the selected take-off EPR due to reaching its max EGT, resulting [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 1147

Queuing Theory at Heathrow Airport

The arrival time, service and departure processes, the waiting regulation, the lineup size, and the customers being serviced are the six components that make up a line as it is studied employing queuing theory.
  • Subjects: Aviation
  • Pages: 3
  • Words: 946

Visiting the Henry Ford Museum

Moreover, the very invention of the pen signaled the advent of a new era and the turning of a new leaf in the history of the humankind.
  • Subjects: Engineering
  • Pages: 2
  • Words: 603

The Challenges of Controlling Speech in Cyberspace

In the chapter, the author discusses the concept of utilitarianism as a possible solution to the challenges of adapting to new technologies and resistance from established interests.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 775

Principles of Fire Prevention and Safety: An Overview

The public's knowledge of fire safety, the evaluation of building plans for both new and existing structures, and the investigation of fires are further grounds for carrying out fire inspections and fire safety enforcement activities.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1152

Individual Design: Barrier-Free Movement

During the audit of the premises, all distances were measured in detail, including the width of the doors, the accessibility and height of the elevator buttons, the width of the elevator doors, and the exit [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 947

New Video Technologies Implemented

It is essential to budget for these costs and to ensure that the benefits of the new technology outweigh the costs.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1221

Data Visualization Review and Analysis

The use of color coding makes the data easier to interpret, while the interactivity allows the user to explore different aspects of the data and draw conclusions.
  • Subjects: Data
  • Pages: 2
  • Words: 642

Case Study on Ethical Issues: Cyberbullying

The child may be in a state of shock and upset because of the psychological pressure associated with experiencing cyberbullying and reporting it to the teacher.
  • Subjects: Cyber Security
  • Pages: 9
  • Words: 2587

Information Technology in Microsoft’s Business as a Project Topic

The weaknesses are the lack of implementation of innovative technologies at the moment and the business's vulnerability to cyber-attacks. Opportunities for the company lie in the expansion of business through the acquisition of successful companies [...]
  • Subjects: Data
  • Pages: 1
  • Words: 398

Simulation in Health Services Management

Such a practice can increase the organization's general performance and raise the quality of healthcare services thanks to the prediction mechanisms.
  • Subjects: Project Management
  • Pages: 1
  • Words: 367

Efficiency of Installation of Residential Fire Sprinkles

Installing residential fire sprinklers is necessary to improve safety and increase the likelihood of survival during a fire; besides, their cost is relatively affordable for most people. The main task of sprinklers is to prevent [...]
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 322

Acceptable Use Policy in Miami Public Schools

It directly communicates the purpose of the network and the reasoning behind the AUP. The key reason why the AUP is effective is the fact that it is short compared to other AUPs of organizations.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1106

The Department of Homeland Security’s Cybersecurity Mission

Cybersecurity is evolving rapidly, and DHS's cybersecurity mission is equipped with models adapting to the ever-changing security and information dynamics. The DHS cybersecurity mission is designed with models that adapt to changing dynamics and landscapes.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 357

Balancing Hardware Needs and Budget

Activities that require a computer in my life include: Communicating with others through email and messaging apps Researching and gathering information online Writing papers and documents Creating and editing presentations Managing my schedule and to-do [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 286