Tech & Engineering Essay Examples and Topics. Page 16

4,399 samples

Discussion of Internet of Things

Internet of Things implies connecting devices into a chain and allowing them to collect and analyze information. IoT systems operate in real-time and usually consist of some "smart" devices and cloud platforms.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 349

Hong Kong Air Cargo Automation

One of the main elements of high-tech methods to sort, track, and control shipments at Hong Kong Air Cargo is the absence of direct human activities and total automation endorsement.
  • Subjects: Aviation
  • Pages: 1
  • Words: 300

Reviewing Meaning and Benefits of Routers and Switches

In this paper offers a simple definitive view of routers and switches, their advantages, and the classifications of a switch. Overall, a router and a switch exhibits fundamental functional differences; while the former suits a [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 594

Discussion of Front Load Washer

An individual can load the items on the device, begin the cycle, and walk away, so there is no need to sit and monitor the washing process.
  • Subjects: Engineering
  • Pages: 8
  • Words: 1492

Maintaining a Database: Terms and Activities

Database maintenance means ensuring that the database is in a readable and secure state and that it is working correctly. A query is, basically, a request sent to a database to obtain some data stored [...]
  • Subjects: Data
  • Pages: 1
  • Words: 403

Inequality and Digital Divide in American Education

The widespread use of the Internet is one of the most characteristic features of the 21st century. Therefore, policymakers and leaders are to advocate for improving the opportunities of students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 549

The Capstone Project: The Analysis of Uipath

The Capstone project is dedicated to the analysis of UiPath, an international company that develops software for robotic process automation, and is aimed at analyzing how UiPath could improve the installation plan of its products. [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 559

LinkedIn: Aspects of a Security Plan

Based on the analysis of the company's cybersecurity status, the major flaws comprise breaches in the website's API, as well as the lack of HttpOnly cookies and DNSSEC.
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 921

Cybersecurity Weaknesses: The Case of LinkedIn

The Internet has become the largest storage of personal and corporate information in the history of the world. The data relating to hundreds of millions of users was leaked online in the Dark Web segment [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 652

Air New Zealand Cargo Handlers Department Safety

In other words, such a document reveals hazards that can affect a business or industry, how it is possible to prevent and manage them, what reporting strategies exist, and others.
  • Subjects: Aviation
  • Pages: 7
  • Words: 1935

Operations Security for the Test Range

In addition, evaluating flaws and indications and estimating the risk to the company are the third and fourth steps in OPSEC strategies.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 549

Personal Classroom Experience With Learning Technologies

In regard to communication, my most effective classroom experience is connected to the use of speaking and listening applications that allows the learners to integrate ICT devices during conversations.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 311

Discussion of Cybercrimes in Modern World

The relevance of cybercrime research is dictated by the fact that it is challenging to ensure the complete safety of data on the Internet.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1447

Smart Bed Technology in Healthcare

An example of such a technology is a smart bed, which is a type of bed with sensors that collect information on the occupant. Nurses could use smart beds to track a patient's response to [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 292

Technological Impact on Aviation Security

It is the role of everyone in the aviation industry to find out the best way of using technology to help solve the challenge of aviation security.
  • Subjects: Aviation
  • Pages: 6
  • Words: 2019

Implementation of Artificial Intelligence in Healthcare Settings

The drivers for the innovation are the increase in the aging population, the National Health Service's strategies to enhance the well-being of citizens and healthcare services' quality, and the expansion of modern technologies in other [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1517

Safety Management System: Airport Ramps in the UAE

Civil aviation is one of the strategic means of transport vital for the stable functioning of the modern globalized world. The existing body of literature proves the critical importance of effective SMSs regarding the work [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2125

The Cyber Kill Chain and Weaponization Stage

The paper provides an in-depth discussion of the software used by attackers during the weaponization step and the appropriate countermeasures for this activity.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 674

Avionics and the Future of Aircraft Systems

Avionics are the set of electronic types of equipment and systems designed to use in aviation. The first such device to be used on aircraft was the communication and navigation systems based on analog and [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 586

Examples of Vital Innovations

Vision, being one of the fundamental properties of human perception and understanding of the world, very often requires help in the form of glasses.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1492

EBay: Cloud Computing SAAS Model

Software-as-a-Service is a cloud computing model that suits eBay's needs outlined in the previous slide. As anyone can access the service without specialized hardware, software, or knowledge, it can be brought to a large audience [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 617

Sifers-Grayson Company’s Security Strategies

The best security recommendation for the facility is the use of a layered security interface. Sifers-Grayson will also require a Cisco framework to complement the routers and firewall for an intrusion detection and prevention system.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 969

Data Normalization and Its Main Advantages

In that case, the relation is in the second normal form. Changing and updating data in the database will be a lot simpler if one follows this procedure.
  • Subjects: Data
  • Pages: 1
  • Words: 390

The Benefits and Growth of IPv6

The current type is the most recent and most advanced internet protocol that can determine the location of the computer systems across a given network and routing.
  • Subjects: Internet
  • Pages: 1
  • Words: 303

Gulf Information Technology Exhibition Global X AI 2021

The program, which first debuted in 1981, highlights the transformative ideas that will shape the future of society and commerce in the coming decade. The Future Blockchain Summit was the region's first and biggest Blockchain [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 537

Review of High Tech Crime Investigation

The difference between these aspects is that the file header is the internal part of how the file is perceived by the device, and the file extension is an external indicator for the user that [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1171

Scheduling a Production Machine for General Maintenance

On the other hand, machine availability refers to the active time a machine is available for the production process. The program increases downtime and lessens the active machine availability as the production process is stopped [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 546

Identity Theft and Protective Tactics for Children

Since identity theft, alongside other cyber crimes, is a serious and prominent issue, there are many statistics available online that can be used for consideration of the scope of the problem.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 851

Importance of Data Analysis

In order to determine the methods of mathematical and statistical processing, first of all, it is important to assess the nature of the distribution for all the parameters used.
  • Subjects: Data
  • Pages: 4
  • Words: 1118

AutoCAD Software and Use of Array Commands

The rectangular array is represented as a set of an element's rows, sections, and divisions in a rectangle-shaped collection. First, arrays are primarily irreversible data structures; the modifiable array is referred to as a list.
  • Subjects: Applications
  • Pages: 1
  • Words: 287

Supply Chain Security and Legal Implications

Thus, it should be stressed that the growing impact on the budget and staff makes it almost impossible to cover the field of supply and demand while responding to the state of urgency.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1119

Modern Cybercrime: Most Recent Threats and Cybersecurity

This is due to the fact that the Internet is a public open system in which data moves uncontrollably and can be discovered, intercepted, or stolen if the correct knowledge of the equipment is applied.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 868

Distant Learning and Useful Digital Tools

With a help of Zoom, students who do not have an opportunity to be present at lessons may still participate in the learning process.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 568

Phishing: Definition, Forms and Security Measures

A spear-phishing assault is when a hacker customizes an email using the victim's identity, role, organization, office phone number, and other details to fool the victim into thinking they are communicating with the actual sender. [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 617

Identity Governance & Administration Solution

This classification determines the value of information and its need for protection from confidential and secret, which require the most significant protection, to the public data in the public domain.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 632

The AutoCAD Software: Annotation and Tex

In relation to AutoCAD software, annotation as well as text aids in clarification and communication on the manner in which different types of information are displayed on drawings.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 282

The Near-Miss Marine Reporting Fails

The overall effectiveness of the thesis and the article is high, as the author talks in detail about the existing problems in the topic he is covering.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 298

The Benefits of Reliability, Availability and Redundancy

It is essential to evaluate the quality of products during the purchase to decrease the inconveniences. The component reliability increases the mission safety while minimizing the dependability of the logistics due to the high demand [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 661

Windows Server Installation and Configuration

The fourth stage is the configuration of Remote Access and Service. The logs are used to monitor the server activities and troubleshoot problems in the system.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 401

The Issue of Source Credibility

Another essential criterion for credibility is related to the personal achievements of the expert. It is particularly relevant for experts in the field of business.
  • Subjects: Data
  • Pages: 1
  • Words: 285

Children’s Dependence on Technology

About 75% of parents say that "they are satisfied with the amount and quality of the educational media available to their children".
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1098

Target Corporation’s Data Breach and Cybercrime

The weakness that was detected in their system, which allowed attackers to maneuver and acquire managerial access to the organization, caused a class-action lawsuit against the company.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 418

Data Collection Methodology and Analysis

In a similar manner, interviews can enable the researchers to comprehend the TA team's perspectives on the onboarding process, possible improvement areas, and the process's evolution.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Simple and Useful Software Making

The dimension was that of tracking the parcels as they traveled from the postal office and to the customer. The majority of them formulated the scope of the project and the conditions in which we [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 562

Qlik Sense Analytics and Self-Visualization Tool

Visualizations, presented in Qlik Sense, can offer us access to unique pieces of information, which can help in the identification of several issues and discover trends that are currently presented in different fields of the [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 602

Fire Incidents: The Role of Extinguishers

Opening of the hatch, lack of fire safety skills, delayed reporting of the incident and acceleration of the ship to full speed were the main factors that contributed to the spreading of the fire.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1172

Information Systems and Typical Cycle Explanation

To make the correct decision in an organization, I would use the information from the Information System in the best way possible and not against the terms and defaults of the business.
  • Subjects: Data
  • Pages: 1
  • Words: 392

Human Life: Video Game, Simulation, or Reality?

Drawing parallels between the real and the virtual world, one can admit the unreality of the existence of the planet and people and compare everything that happens with the simulation in which we are.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 336

Pros and Cons of Distance Education

On the one hand, modernization of education allows it to expand the usual boundaries of transmitting and receiving information in the educational process while retaining all the integral components.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 512

Remote Teaching: Advantages and Disadvantages

The social meaning of studying, as undergoing constant change in accordance with progress, makes outside interactions constrained and results in subjecting the abilities of the person to a biased social and political status.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 617

Aspects of Web Application Testing

This load can be, for example, the expected number of concurrent users of the application, and in the case of monitoring systems, this is the number of people connected to the system making a given [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 557

Tools for Performance Testing: Project Scope

In addition, by learning specific indicators of other applications and applying the positive aspects in the tool, there will be a chance to create a successful sample.
  • Subjects: Programming
  • Pages: 2
  • Words: 611

Public-Private Partnerships for Election Systems Cybersecurity

In public contracts, the private sector provides the service directly to the public and bears all the associated end-user risks. Private parties can use all the gained knowledge and expertise to conduct security assessments of [...]
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1697

Solving the Cybersecurity Workforce Crisis

Since cyber security specialists are highly demanded in the current market, the private sector has been offering increased compensation in comparison with the government sector, which has led to decreased interest in IT positions in [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1094

Discussion: How Does AI Improves Manufacturing?

The lean standards of manufacturing are the activities and techniques applied in the production process to identify the bottlenecks and streamline the efficiency of the process while ensuring high productivity.
  • Subjects: AI
  • Pages: 7
  • Words: 1937

Science Personal and Professional Life

Our decision to eat baked yams instead of fries, the car we drive in, our mobile phones, the oral drugs we use to treat certain illnesses and the purified water we drink at the end [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1146

Aspects of Technology Gameplan

These platforms are usually provided through the Internet, and students can use gadgets such as computers and mobile phones to access these materials.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 290

Evaluation of Weiss’s and Derzic’s Arguments

The argument that is made by Weiss in the essay called "Should gamers be prosecuted for virtual stealing?" is that people should not be judged in reality for actions they have taken in the virtual [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 396

Human Cloning and the Challenge of Regulation

Cloning is, therefore, a highly beneficial process from a scientific standpoint, and it has the potential to usher in a new era of technological progress.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 270

Expo 2020: Connecting Minds, Creating the Future

The London World Expo marked a watershed moment in the evolution of commodity derivatives to the abundance of new industrial technology and hence is considered the first World Exhibition in the contemporary sense.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1429

JMeter and Locust Load Tests for Websites

Within this paper, a literature review of a number of articles will be utilized to determine the ways in which JMeter and Locust interact with load tests for small or medium-sized web client applications through [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1129

Application Software Integration: Pros and Cons

The breakthroughs within the field of information technologies revolutionized the environment of software development. The integration often leads to the improvement of the reporting process.
  • Subjects: Applications
  • Pages: 1
  • Words: 294

Analog and Digital Telecommunication Networks

Data conveyed from the sender to the recipient using analog signals is referred to as analog communication. Digitalization communication refers to the transmission of data between a producer and a recipient via digital signals.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 394

Survey Monkey: The Online Assessment Tool

We also give the reader the findings of a survey conducted with this tool and an assessment of its usefulness and potential for use in future usability studies. Survey Monkey is a web-based tool and [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 955

Aircraft Maintenance and Performance Improvement

The writers argue that the proposed operating system model positively influenced the performance and safety in the hangar and boosted the process efficiency of aircraft maintenance in the company where the study took place.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1111

The Use of Technology in the Human Services Field

The sphere of human services is one of the essential components of any community since people working in this area set themselves the task of making the life of other people easier.
  • Subjects: Applications
  • Pages: 1
  • Words: 404

Journal Storage as a Technological Asset for a College Student

Its proclaimed mission is creating "a platform for discovering and connecting research, images, and primary sources" As of now, JSTOR is a widely used database offering a plethora of information for those interested in a [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 345

5G Telecommunications Networks

The sources are credible and relevant, and one can note that the 5G network is a sustainable and secure technology that guarantees a high level of protection against cyber threats and allows managing risks successfully.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1984

Data Analytics in TED Talks

From the historical data provided by TED managers, the comparative analysis seeks to address whether shorter or extensive video uploads are considered through the number of viewers and the statistics of comments.
  • Subjects: Data
  • Pages: 4
  • Words: 871

Assessment of Cybersecurity Program Maturity

Padgett-Beale Financial Services must choose the appropriate framework and standards, determine required regulations and laws to comply with, and identify the best practices for maturity assessment to achieve an impenetrable cybersecurity management program.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 924

The Upcoming Era of Drones and Outcomes to a Society

It seems that in the future, there will be dozens of areas where drones would be successfully used. To sum it up, drones should be seen as friends of humanity, as they seem to be [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 352

Cybersecurity Implementation Plan for PBI-FS

Therefore, the current plan will define the objectives, goals, and objectives, and scope of the implementation. The implementation of the cybersecurity management plan pursues both business and project goals and objectives.
  • Subjects: Cyber Security
  • Pages: 16
  • Words: 4430

Electric Coffee Maker: The Use of Pseudocode

Program Name: Coffee Maker Functions Code for Coffee Maker Functions: Apply PresetTime to begin brewing while the coffee maker is OFF IF want to set CoffeeMakerTime Press ON x 2 Apply input HH:MM Press ON [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 327

Should the Internet Be Regulated?

The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
  • Subjects: Internet
  • Pages: 2
  • Words: 661

The Aircraft Accidents and Incidents

The organizational culture of a workplace is powerful, and when new employees join the institution, they are trained to have the culture of the place, as is the case in NASA.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3032

AI in Pharmaceutical Industry: Amazon and AI

Although some regulations exist for commercial applications of data, AI is such a new development and tool, that it is unclear how to ultimately provide oversight.
  • Subjects: AI
  • Pages: 1
  • Words: 400

Computer Programming and Code

The Maze game was the one I probably enjoyed the most since it was both engaging and not challenging, and I quickly understood what I needed to do.
  • Subjects: Programming
  • Pages: 1
  • Words: 329

Streaming Monitor: Angular Report

However, the syntax for TypeScript is the same as for JavaScript, which means existing JavaScript code can be converted to TypeScript.
  • Subjects: Applications
  • Pages: 4
  • Words: 1209

Data Security and Governance in Business

The topic for the final paper is Data Security and Governance. The articles served as a basis for the paper to illustrate the profound analysis of cloud and non-cloud data governance.
  • Subjects: Data
  • Pages: 2
  • Words: 566

Information Assurance Certifications Briefing

In addition to ensuring that a prospective specialist is familiar with the required technologies and techniques, certification also creates a framework for problem-solving approaches, facilitating cooperation and reducing the time required to agree on a [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 565

Internet Technology and Impact on Human Behavior

It was the Internet that allowed the phenomenon of cyberbullying to emerge, the essence of which is the harassment of someone on the Internet by large groups of users.
  • Subjects: Internet
  • Pages: 1
  • Words: 312

Information Sharing and Analysis Centers

It collects data from different sources and promotes sharing this information between the ISAC members. Only the members of ONG-ISAC receive the information classified as Red, Amber, and Green.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 397

Supply Chain’s Cybersecurity and Risk Analysis

Since there are so many parties involved, it is crucial to assess every part of the process, from obtaining the raw material to the delivery to the customer. Cybersecurity is the critical answer to most [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2006

Amazon Company’s Acquisition Risk Analysis

Since Amazon is one of the largest companies in the world highly sensitive to cybersecurity risks, it would be appropriate for the company to use the best provider regardless of the price of the solution.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2264

Unified Theory of Acceptance and Use of Technology

Nevertheless, the most convenient and affordable is a mobile technology that can work on different operational systems and track the motion of tourists in real time, transmitting data to the Internet server and allowing one [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1119

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

Social Media: Risks and Opportunities

National Institutes of Health is a medical website for organizing social interactions within the medical community. Meanwhile, the principal goal is to study public health to improve it.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 643