Tech & Engineering Essay Examples and Topics. Page 16

5,359 samples

The Misleading Graphical Display

In particular, this technique can be used to emphasize a certain point of view, which does not allow the viewer to assess the situation in context.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 278

Personal Critique of the ACPO Policy

Section22a must be developed to determine and agree on crucial components of the partnership, such as the presence and continuous support of the RICC and the design, development, and funding of the planned Regional DVI [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 1235

Discussion: Electric Cars and the Future

The main argument for the necessity to replace cars with internal combustion engines with electric ones is the degree of influence of vehicles on the environment.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1402

Recursion Explained With the Mirror Analogy

Binary search through the integers or dictionary is conducted through the recursive binary search function that includes the array and the target information. Base case in recursion is a special case where the solution is [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 559

A Food Truck Business: Project Summary

Steps to be followed in starting the business will be researching local food trucks and laws, developing the business name and concept, registering, raising funds, and seeking permits and licenses. The next steps will be [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 615

Benefits of Security Assessments for the Employees

A security assessment is also an opportunity for Chief Information Security Officers to demonstrate their value to the company and their professional impact as staff members.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 361

Synthetic Fabrics as Technological Development

Fabrics such as polyester, nylon, neoprene, and spandex were invented in the 30-the 40s of the 20th century and are still actively used in the production of not only clothing but also other goods.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 562

Why Linux Is Better Operating System Than Windows

The second reason why Linux is better is the relative reliability of the system and its resistance to hacker attacks, which is also due to the branched principle of individual encoding of each particular OS. [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 284

Co-Teaching and Use of Technology in Education

Only the information that can be utilized for finding a personal approach to the students should be shared and discussed among collaborating teachers.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 363

Technological Challenges in Business

There is a challenge for the organization's management to implement procedures and policies for effectively managing the private data of the organization.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 320

Discussion of Internet of Things

Internet of Things implies connecting devices into a chain and allowing them to collect and analyze information. IoT systems operate in real-time and usually consist of some "smart" devices and cloud platforms.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 349

Hong Kong Air Cargo Automation

One of the main elements of high-tech methods to sort, track, and control shipments at Hong Kong Air Cargo is the absence of direct human activities and total automation endorsement.
  • Subjects: Aviation
  • Pages: 1
  • Words: 300

Component Levels of NPS

Access clients are devices that are secondary to the leading network, and they provide secure pathways through which the user gadgets get to communicate with the client-server.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 389

Discussion of Front Load Washer

An individual can load the items on the device, begin the cycle, and walk away, so there is no need to sit and monitor the washing process.
  • Subjects: Engineering
  • Pages: 8
  • Words: 1492

Maintaining a Database: Terms and Activities

Database maintenance means ensuring that the database is in a readable and secure state and that it is working correctly. A query is, basically, a request sent to a database to obtain some data stored [...]
  • Subjects: Data
  • Pages: 1
  • Words: 403

Inequality and Digital Divide in American Education

The widespread use of the Internet is one of the most characteristic features of the 21st century. Therefore, policymakers and leaders are to advocate for improving the opportunities of students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 549

Database Types, Corruption and Attacks

These databases can duplicate the same data in multiple locations, allowing it to be accessed quickly from anywhere and serve as backups in case one location has a malfunction.
  • Subjects: Data
  • Pages: 4
  • Words: 1056

Email Scams and Auction Fraud and How to Avoid Becoming a Victim

This paper aims to explore cybercrimes such as email or website scams and auction frauds to identify available protections and measures to avoid becoming a victim. Email or website scams and auction fraud are cybercrimes [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 715

The Capstone Project: The Analysis of Uipath

The Capstone project is dedicated to the analysis of UiPath, an international company that develops software for robotic process automation, and is aimed at analyzing how UiPath could improve the installation plan of its products. [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 559

LinkedIn: Aspects of a Security Plan

Based on the analysis of the company's cybersecurity status, the major flaws comprise breaches in the website's API, as well as the lack of HttpOnly cookies and DNSSEC.
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 921

Common Security Models

In the Clark-Wilson model, users do not access the object directly, as an intermediary serves to ensure the integrity of the data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 614

Cybersecurity Weaknesses: The Case of LinkedIn

The Internet has become the largest storage of personal and corporate information in the history of the world. The data relating to hundreds of millions of users was leaked online in the Dark Web segment [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 652

Character Encoding: ASCII vs. Unicode

It necessitates the creation of universally shared and accepted character encoding standards, such as ASCII or Unicode, to ensure that the same combination of symbols would always be displayed correctly.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 274

Air New Zealand Cargo Handlers Department Safety

In other words, such a document reveals hazards that can affect a business or industry, how it is possible to prevent and manage them, what reporting strategies exist, and others.
  • Subjects: Aviation
  • Pages: 7
  • Words: 1935

Gantt Charts and History of Their Using

It can be challenging to distribute an updated version of a Gantt chart among all stakeholders each time there is a change in the timeline.
  • Subjects: Project Management
  • Pages: 2
  • Words: 575

Operations Security for the Test Range

In addition, evaluating flaws and indications and estimating the risk to the company are the third and fourth steps in OPSEC strategies.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 549

Deleting Files and Securing Data

However, this is not the case since the information does not get erased from the hard drive. It still gets erased after the part of the disk where the information is kept is reused.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 291

Personal Classroom Experience With Learning Technologies

In regard to communication, my most effective classroom experience is connected to the use of speaking and listening applications that allows the learners to integrate ICT devices during conversations.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 311

Discussion of Cybercrimes in Modern World

The relevance of cybercrime research is dictated by the fact that it is challenging to ensure the complete safety of data on the Internet.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1447

International Dimension of Critical Infrastructure

The United States is a member of the Critical 5, a collaboration that involves five countries, including Canada, Australia, New Zealand, the United Kingdom and the United States. The collaboration involves connecting and speaking the [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 557

Data Visualization: Aims and Effectiveness

The aim is to make the information clear and effective to the readers and viewers. According to Alnjar, data visualization improves the narrative form of information and data.
  • Subjects: Data
  • Pages: 2
  • Words: 576

Virtual Reality Space Product Project Challenges

During the project, several challenges came up, which included providing leadership to the team, identifying the customer segment for the product, and understanding the "pains" of the customer segment.
  • Subjects: Project Management
  • Pages: 11
  • Words: 3042

Software Recommendation Memo for LinkedIn

In this regard, the optimization of the accounting procedures is required to enable the efficient distribution of the company's budget. The reorganization of the internal accounting procedures implies a variety of approaches to developing and [...]
  • Subjects: Programming
  • Pages: 4
  • Words: 1218

Technological Impact on Aviation Security

It is the role of everyone in the aviation industry to find out the best way of using technology to help solve the challenge of aviation security.
  • Subjects: Aviation
  • Pages: 6
  • Words: 2019

Implementation of Artificial Intelligence in Healthcare Settings

The drivers for the innovation are the increase in the aging population, the National Health Service's strategies to enhance the well-being of citizens and healthcare services' quality, and the expansion of modern technologies in other [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1517

Safety Management System: Airport Ramps in the UAE

Civil aviation is one of the strategic means of transport vital for the stable functioning of the modern globalized world. The existing body of literature proves the critical importance of effective SMSs regarding the work [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2125

The Cyber Kill Chain and Weaponization Stage

The paper provides an in-depth discussion of the software used by attackers during the weaponization step and the appropriate countermeasures for this activity.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 674

Computerized Animation as a Useful Study Tool

To examine the evolution of computerized animation as a useful study tool, the research will be answering the following questions: What is the role of writing in the process of animation?
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1144

Government Restriction on the Internet

The restriction by the government has been enforced to promote the limitation of the content display that is only necessary for the user.
  • Subjects: Internet
  • Pages: 6
  • Words: 1737

Examples of Vital Innovations

Vision, being one of the fundamental properties of human perception and understanding of the world, very often requires help in the form of glasses.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1492

The Internet Protocol Address Management

SolarWinds IP Address Manager is currently one of the best IP tracking systems as it includes all of the essentials, such as automated IP management via subnet discovery and IP scanning.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 290

Sifers-Grayson Company’s Security Strategies

The best security recommendation for the facility is the use of a layered security interface. Sifers-Grayson will also require a Cisco framework to complement the routers and firewall for an intrusion detection and prevention system.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 969

Data Normalization and Its Main Advantages

In that case, the relation is in the second normal form. Changing and updating data in the database will be a lot simpler if one follows this procedure.
  • Subjects: Data
  • Pages: 1
  • Words: 390

The Benefits and Growth of IPv6

The current type is the most recent and most advanced internet protocol that can determine the location of the computer systems across a given network and routing.
  • Subjects: Internet
  • Pages: 1
  • Words: 303

Hackers: The Good, the Bad and the Gray

They are the most familiar with the latest methods of Black Hat hacking, thus making it possible to prevent attempts and reinforce security.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1146

Gulf Information Technology Exhibition Global X AI 2021

The program, which first debuted in 1981, highlights the transformative ideas that will shape the future of society and commerce in the coming decade. The Future Blockchain Summit was the region's first and biggest Blockchain [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 537

Review of High Tech Crime Investigation

The difference between these aspects is that the file header is the internal part of how the file is perceived by the device, and the file extension is an external indicator for the user that [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1171

Scheduling a Production Machine for General Maintenance

On the other hand, machine availability refers to the active time a machine is available for the production process. The program increases downtime and lessens the active machine availability as the production process is stopped [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 546

Artificial Intelligence in Business

One of the main concerns with the adoption of AI is bias. AI technology is bound to malfunction, and that would be detrimental for the businesses deploying it.
  • Subjects: AI
  • Pages: 3
  • Words: 940

Identity Theft and Protective Tactics for Children

Since identity theft, alongside other cyber crimes, is a serious and prominent issue, there are many statistics available online that can be used for consideration of the scope of the problem.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 851

AutoCAD Software and Use of Array Commands

The rectangular array is represented as a set of an element's rows, sections, and divisions in a rectangle-shaped collection. First, arrays are primarily irreversible data structures; the modifiable array is referred to as a list.
  • Subjects: Applications
  • Pages: 1
  • Words: 287

Modification of Tools in AutoCAD in Saving Time

Fillet is a tool in AutoCAD used to create circular edges between adjacent lines and faces in 2D or 3D. The chamfer, on the other hand, is used in the creation of edges that are [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 366

Supply Chain Security and Legal Implications

Thus, it should be stressed that the growing impact on the budget and staff makes it almost impossible to cover the field of supply and demand while responding to the state of urgency.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1119

Modern Cybercrime: Most Recent Threats and Cybersecurity

This is due to the fact that the Internet is a public open system in which data moves uncontrollably and can be discovered, intercepted, or stolen if the correct knowledge of the equipment is applied.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 868

Distant Learning and Useful Digital Tools

With a help of Zoom, students who do not have an opportunity to be present at lessons may still participate in the learning process.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 568

Phishing: Definition, Forms and Security Measures

A spear-phishing assault is when a hacker customizes an email using the victim's identity, role, organization, office phone number, and other details to fool the victim into thinking they are communicating with the actual sender. [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 617

Using Customizable Project Management Web Applications

Instead of redesigning templates every time, there is a valid alternative to design a web application that can be easily customized in the most efficient and less time-consuming ways.
  • Subjects: Project Management
  • Pages: 1
  • Words: 307

Identity Governance & Administration Solution

This classification determines the value of information and its need for protection from confidential and secret, which require the most significant protection, to the public data in the public domain.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 632

Researching of Dynamic Host Configuration Protocol

DHCP automation poses a security risk in the event of a rogue DHCP server getting introduced into the network. This issue necessitates a relay agent that enables the server to handle leases on both network [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 552

The AutoCAD Software: Annotation and Tex

In relation to AutoCAD software, annotation as well as text aids in clarification and communication on the manner in which different types of information are displayed on drawings.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 282

The Near-Miss Marine Reporting Fails

The overall effectiveness of the thesis and the article is high, as the author talks in detail about the existing problems in the topic he is covering.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 298

The Benefits of Reliability, Availability and Redundancy

It is essential to evaluate the quality of products during the purchase to decrease the inconveniences. The component reliability increases the mission safety while minimizing the dependability of the logistics due to the high demand [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 661

The Issue of Source Credibility

Another essential criterion for credibility is related to the personal achievements of the expert. It is particularly relevant for experts in the field of business.
  • Subjects: Data
  • Pages: 1
  • Words: 285

Fast Tracking in Project Management

One of the most effective ways to optimally reduce the planned duration of a project is to use the schedule compression method.
  • Subjects: Project Management
  • Pages: 2
  • Words: 484

An Alluring Technology That Ransoms the Future

Technology in this context is used to refer to innovations made from the use of computers and the internet, and that has been largely adopted by young people, especially in networking.
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2105

Target Corporation’s Data Breach and Cybercrime

The weakness that was detected in their system, which allowed attackers to maneuver and acquire managerial access to the organization, caused a class-action lawsuit against the company.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 418

Data Collection Methodology and Analysis

In a similar manner, interviews can enable the researchers to comprehend the TA team's perspectives on the onboarding process, possible improvement areas, and the process's evolution.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Smartphones Affect and Change Modern Life

Now, it is time to manage technological addiction and enhance the benefits of using smartphones for new creative designs and high-quality data exchange.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 574

Simple and Useful Software Making

The dimension was that of tracking the parcels as they traveled from the postal office and to the customer. The majority of them formulated the scope of the project and the conditions in which we [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 562

Qlik Sense Analytics and Self-Visualization Tool

Visualizations, presented in Qlik Sense, can offer us access to unique pieces of information, which can help in the identification of several issues and discover trends that are currently presented in different fields of the [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 602

Fire Incidents: The Role of Extinguishers

Opening of the hatch, lack of fire safety skills, delayed reporting of the incident and acceleration of the ship to full speed were the main factors that contributed to the spreading of the fire.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1172

Information Systems and Typical Cycle Explanation

To make the correct decision in an organization, I would use the information from the Information System in the best way possible and not against the terms and defaults of the business.
  • Subjects: Data
  • Pages: 1
  • Words: 392

Choosing a Server for a Company

A server is a computer that is used to share resources and manage processes across a network, and it frequently connects to the internet to assist remote users.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 288

Human Life: Video Game, Simulation, or Reality?

Drawing parallels between the real and the virtual world, one can admit the unreality of the existence of the planet and people and compare everything that happens with the simulation in which we are.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 336

Digital Technology Impact on Study of Languages

In addition, the authors emphasize the need for teachers to acquire relevant knowledge and skills to survive and impart the best of knowledge to the students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Pros and Cons of Distance Education

On the one hand, modernization of education allows it to expand the usual boundaries of transmitting and receiving information in the educational process while retaining all the integral components.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 512

The New Kinds of Identity Theft

In addition, the education sector and medical industry will be more affected by cyberattacks as success, in this case, will result in the acquisition of considerable amounts of personal information.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 331

The Cost of a Positive Integer

If one imagines that a particular bit of information is encoded in a single string, then the complexity of describing this string is determined by the availability of a way to compress this string to [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1920

The Value of VPNs in Research

Though the feature that manages to change your IP is very efficient in providing access to entertainment, news, or other media, I find that it is especially vital in the sphere of research.
  • Subjects: Internet
  • Pages: 1
  • Words: 310

Remote Teaching: Advantages and Disadvantages

The social meaning of studying, as undergoing constant change in accordance with progress, makes outside interactions constrained and results in subjecting the abilities of the person to a biased social and political status.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 617

Magnetic Resonance Imaging Technology: Benefits for People

The principle of operation of the MRI machine is that under the influence of radio signals, hydrogen atoms in the forehead of a person placed in a strong magnetic field resonate and give out various [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1405

Aspects of Databases in Hospitals

Nevertheless, it is also valid that a large number of external sources might slow down the speed of data processing and reduce the overall accessibility.
  • Subjects: Data
  • Pages: 2
  • Words: 546

Aspects of Web Application Testing

This load can be, for example, the expected number of concurrent users of the application, and in the case of monitoring systems, this is the number of people connected to the system making a given [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 557

Researching of Work Breakdown Structure

The joint application of the WBS and the Gantt chart helps structure a project making it more organized and easier to implement.
  • Subjects: Project Management
  • Pages: 3
  • Words: 336

How to Become a Videogame Designer

Having interest, love and involvement in the video games themselves from the user's point of view already endows such a person with a number of qualifications that allow him to participate in the creation of [...]
  • Subjects: Programming
  • Pages: 1
  • Words: 363

Tools for Performance Testing: Project Scope

In addition, by learning specific indicators of other applications and applying the positive aspects in the tool, there will be a chance to create a successful sample.
  • Subjects: Programming
  • Pages: 2
  • Words: 611
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.