Tech & Engineering Essay Examples and Topics. Page 12

4,428 samples

GLONASS: Russia’s Global Navigation Satellite System

Older GLONASS-M and GLONASS-K1 satellites are still part of the GLONASS system and work with the newer GLONASS-K2 satellites. In addition to the primary ones in Moscow and Krasnoyarsk, several data processing facilities for the [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1793

Bridge Resource Failures in the M/V Rook Grounding Incident

The bridge team comprised the Captain, the helmsman, the navigator, and the lookout. The impact of this incident was severe, causing significant damage to the vessel's hull and the surrounding environment.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1645

Predicting Loan Defaults: A Machine Learning Approach

The findings show that approximately all factors affected the outcome of the loan default and that interest rate played a major role in predicting the outcome of loan default as compared to other factors the [...]
  • Subjects: Data
  • Pages: 4
  • Words: 911

Computer Fraud and Detection Methods in Contracting

Therefore, a need has arisen for extensive research on computer fraud and how it can be mitigated, contracting and best practices for businesses, and the impacts of computer fraud when contracting.
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1634

Privacy Risks and Tech Use Among the Elderly

With the rise in popularity of smartphones and tablets, the elderly now make up a sizable portion of the population who utilize digital goods and services.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1611

Chatbot Ethics: Legal Framework & Recommendations

Chatbots are being implemented in the healthcare sector to offer patients individualized assistance and guidance. Chatbots are being utilized to help students and educators in the classroom.
  • Subjects: AI
  • Pages: 7
  • Words: 1887

ChatGPT Applications, Regulation, and Ethical Considerations

Sales and marketing may utilize ChatGPT and GPT-3 to propose products and describe them to clients in real time through chatbots and websites. Customers may get the foundational GPT-3 model and alter it independently to [...]
  • Subjects: AI
  • Pages: 7
  • Words: 1926

The Impact of Technology on Attention and Time Management

In this case, it is essential to preserve the possibility of choice and the existence of an alternative in building relationships with technologies without falling into the trap of use and fear.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 366

Insider Threats and Aviation Security: A Study Proposal

Employees in any industry pose security threats due to easy accessibility to the inside operations of the workplace. Like other industries, the aviation business is not exceptional as employees may have the motivation to harm [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 2467

Hash Tables in Weather Software

Given the current dynamic trends in weather patterns, hash tables provide a fast and efficient way to store, access, and retrieve data.
  • Subjects: Data
  • Pages: 1
  • Words: 405

Ada Lovelace: Scientific Contributions

Unlike her contemporaries, she emphasized the harmony between machines and humanity, making her one of the key innovators in the history of technological advancements.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 283

Natalie Wexler: Reconsidering Classroom Technology

By sharing her experience with Kevin, a student from a minority group with a poor financial background, she demonstrates that the students struggle to interact with technology.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 398

UNION-Based SQL Injection and Its Prevention

0x3a resolves to a ":", the concat function combines multiple string elements into one, and select database returns the current database's name.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 316

Robotization in Business: Issues and Solutions

All of these issues rely on the assumption of the inherent efficiency and reliability of AI-based technologies and the optimizing effect of automation on different analytical and practical processes. One of the possible options for [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1467

Aspects of the Home Phone

The main factor contributing to a similar decline in the home phone is the alternative of the mobile phone. The landline is an item that is not usually powered by electric circuits in the home [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 261

Over-the-Top TV Technology and Sports Marketing

Second, the appeal of live sports streaming is linked to a broader symbolic power that has long been associated with the experience of live events on television and radio.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1395

Deleted Data: Utilities to Recover

It does this by looking for the file's data in the space that was marked as available for use by the operating system, and if it is able to find the data, it can restore [...]
  • Subjects: Data
  • Pages: 1
  • Words: 287

Information Security: The Main Threats

Because of the dangers involved with using out-of-date security software, it is crucial to keep it updated on a regular basis.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 394

Mobile App for a Retail Business

Executing - Putting the project plan into action and carrying out the tasks essential for finishing the project. Additionally, it involves gathering their opinions and input to modify the project plan as necessary.
  • Subjects: Applications
  • Pages: 3
  • Words: 889

Internet of Things and Its Level of Implementation

IoT is defined as a collection of tangible objects embedded with processing abilities, sensors, and software to connect and exchange data with other systems and devices using the internet and other communication networks.
  • Subjects: Internet
  • Pages: 6
  • Words: 1666

Cyber Security: Fortifying the Digital Fortress

To effectively tackle the ever-changing threat landscape and guarantee the security and stability of the digital realm, a thorough and multi-faceted approach to cyber security is essential, integrating organizational measures, education, cooperation, and technological innovations.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1008

Enhancing Education Through Technology Integration

The sense-making use of digital instruments, the ability to solve complex learning problems, and the value of feedback opportunities are important effects of the adoption of technological solutions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 555

Erie: Biomedical Sensors Development

As a result, we collaborate with medical professionals all around the United States to expand the use of ubiquitous biomedical sensors.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 386

The Smart Cities Technologies: Key Benefits

As the transportation manager of a city, I will not invest heavily in driverless vehicles, but focus more on green mobility and automated logistics in restricted locations such as ports.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 294

Ethical Issues of the Internet Use for Research

Naturally, this is not ethical to contribute to the violation of the confidentiality of individuals who have shared any information online, even if it is unintentional, considering that it has not been authorized by the [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 921

AT&T Documentation Regarding Cybersecurity

The author starts with the basics of psychological perception of unexpected events, which can potentially threaten people, or in this case, the computer and software. It confirms the importance of the documentation regarding cybersecurity and [...]
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 361