Tech & Engineering Essay Examples and Topics. Page 17

4,436 samples

The Issue of Source Credibility

Another essential criterion for credibility is related to the personal achievements of the expert. It is particularly relevant for experts in the field of business.
  • Subjects: Data
  • Pages: 1
  • Words: 285

Children’s Dependence on Technology

About 75% of parents say that "they are satisfied with the amount and quality of the educational media available to their children".
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1098

Target Corporation’s Data Breach and Cybercrime

The weakness that was detected in their system, which allowed attackers to maneuver and acquire managerial access to the organization, caused a class-action lawsuit against the company.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 418

Data Collection Methodology and Analysis

In a similar manner, interviews can enable the researchers to comprehend the TA team's perspectives on the onboarding process, possible improvement areas, and the process's evolution.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Smartphones Affect and Change Modern Life

Now, it is time to manage technological addiction and enhance the benefits of using smartphones for new creative designs and high-quality data exchange.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 574

Simple and Useful Software Making

The dimension was that of tracking the parcels as they traveled from the postal office and to the customer. The majority of them formulated the scope of the project and the conditions in which we [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 562

Qlik Sense Analytics and Self-Visualization Tool

Visualizations, presented in Qlik Sense, can offer us access to unique pieces of information, which can help in the identification of several issues and discover trends that are currently presented in different fields of the [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 602

Fire Incidents: The Role of Extinguishers

Opening of the hatch, lack of fire safety skills, delayed reporting of the incident and acceleration of the ship to full speed were the main factors that contributed to the spreading of the fire.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1172

Information Systems and Typical Cycle Explanation

To make the correct decision in an organization, I would use the information from the Information System in the best way possible and not against the terms and defaults of the business.
  • Subjects: Data
  • Pages: 1
  • Words: 392

Choosing a Server for a Company

A server is a computer that is used to share resources and manage processes across a network, and it frequently connects to the internet to assist remote users.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 288

Human Life: Video Game, Simulation, or Reality?

Drawing parallels between the real and the virtual world, one can admit the unreality of the existence of the planet and people and compare everything that happens with the simulation in which we are.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 336

Digital Technology Impact on Study of Languages

In addition, the authors emphasize the need for teachers to acquire relevant knowledge and skills to survive and impart the best of knowledge to the students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Remote Teaching: Advantages and Disadvantages

The social meaning of studying, as undergoing constant change in accordance with progress, makes outside interactions constrained and results in subjecting the abilities of the person to a biased social and political status.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 617

Aspects of Databases in Hospitals

Nevertheless, it is also valid that a large number of external sources might slow down the speed of data processing and reduce the overall accessibility.
  • Subjects: Data
  • Pages: 2
  • Words: 546

Aspects of Web Application Testing

This load can be, for example, the expected number of concurrent users of the application, and in the case of monitoring systems, this is the number of people connected to the system making a given [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 557

How to Become a Videogame Designer

Having interest, love and involvement in the video games themselves from the user's point of view already endows such a person with a number of qualifications that allow him to participate in the creation of [...]
  • Subjects: Programming
  • Pages: 1
  • Words: 363

Tools for Performance Testing: Project Scope

In addition, by learning specific indicators of other applications and applying the positive aspects in the tool, there will be a chance to create a successful sample.
  • Subjects: Programming
  • Pages: 2
  • Words: 611

Public-Private Partnerships for Election Systems Cybersecurity

In public contracts, the private sector provides the service directly to the public and bears all the associated end-user risks. Private parties can use all the gained knowledge and expertise to conduct security assessments of [...]
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1697

Solving the Cybersecurity Workforce Crisis

Since cyber security specialists are highly demanded in the current market, the private sector has been offering increased compensation in comparison with the government sector, which has led to decreased interest in IT positions in [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1094

Discussion: How Does AI Improves Manufacturing?

The lean standards of manufacturing are the activities and techniques applied in the production process to identify the bottlenecks and streamline the efficiency of the process while ensuring high productivity.
  • Subjects: AI
  • Pages: 7
  • Words: 1937

Technology Influence on Problems of Modern Society

In the globalized and digitalized era, it is vital to preserving the balance and control physical activity, food habits, and relationship patterns to avoid suffering from the negative aspects of technologies and their dominance in [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Science Personal and Professional Life

Our decision to eat baked yams instead of fries, the car we drive in, our mobile phones, the oral drugs we use to treat certain illnesses and the purified water we drink at the end [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1146

Aspects of Technology Gameplan

These platforms are usually provided through the Internet, and students can use gadgets such as computers and mobile phones to access these materials.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 290

Evaluation of Weiss’s and Derzic’s Arguments

The argument that is made by Weiss in the essay called "Should gamers be prosecuted for virtual stealing?" is that people should not be judged in reality for actions they have taken in the virtual [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 396

Human Cloning and the Challenge of Regulation

Cloning is, therefore, a highly beneficial process from a scientific standpoint, and it has the potential to usher in a new era of technological progress.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 270

Technological Development of Civilizations

The current stage in the development of human civilization is closely related to the use of technology. The fundamental thesis of his writings is that technology contributes to the development of human communities but that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1214

Expo 2020: Connecting Minds, Creating the Future

The London World Expo marked a watershed moment in the evolution of commodity derivatives to the abundance of new industrial technology and hence is considered the first World Exhibition in the contemporary sense.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1429

Cryptographic Algorithms: The Use in Cyber Security

Cryptographic protection of a system depends on two factors, 1) the strength of the keys and effectiveness of associated protocols, and 2) protection of said keys via key management.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 638

JMeter and Locust Load Tests for Websites

Within this paper, a literature review of a number of articles will be utilized to determine the ways in which JMeter and Locust interact with load tests for small or medium-sized web client applications through [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1129

Analog and Digital Telecommunication Networks

Data conveyed from the sender to the recipient using analog signals is referred to as analog communication. Digitalization communication refers to the transmission of data between a producer and a recipient via digital signals.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 394

The Digital Workplace Transformation Issues

In this research, it is important to emphasize the significance of the digitalization of the present workspace and all the consequences, challenges, and obstacles that are associated with them.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1172

Aircraft Maintenance and Performance Improvement

The writers argue that the proposed operating system model positively influenced the performance and safety in the hangar and boosted the process efficiency of aircraft maintenance in the company where the study took place.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1111

The Use of Technology in the Human Services Field

The sphere of human services is one of the essential components of any community since people working in this area set themselves the task of making the life of other people easier.
  • Subjects: Applications
  • Pages: 1
  • Words: 404

Journal Storage as a Technological Asset for a College Student

Its proclaimed mission is creating "a platform for discovering and connecting research, images, and primary sources" As of now, JSTOR is a widely used database offering a plethora of information for those interested in a [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 345

5G Telecommunications Networks

The sources are credible and relevant, and one can note that the 5G network is a sustainable and secure technology that guarantees a high level of protection against cyber threats and allows managing risks successfully.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1984

Data Analytics in TED Talks

From the historical data provided by TED managers, the comparative analysis seeks to address whether shorter or extensive video uploads are considered through the number of viewers and the statistics of comments.
  • Subjects: Data
  • Pages: 4
  • Words: 871

Assessment of Cybersecurity Program Maturity

Padgett-Beale Financial Services must choose the appropriate framework and standards, determine required regulations and laws to comply with, and identify the best practices for maturity assessment to achieve an impenetrable cybersecurity management program.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 924

The Upcoming Era of Drones and Outcomes to a Society

It seems that in the future, there will be dozens of areas where drones would be successfully used. To sum it up, drones should be seen as friends of humanity, as they seem to be [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 352

Cybersecurity Implementation Plan for PBI-FS

Therefore, the current plan will define the objectives, goals, and objectives, and scope of the implementation. The implementation of the cybersecurity management plan pursues both business and project goals and objectives.
  • Subjects: Cyber Security
  • Pages: 16
  • Words: 4430

Electric Coffee Maker: The Use of Pseudocode

Program Name: Coffee Maker Functions Code for Coffee Maker Functions: Apply PresetTime to begin brewing while the coffee maker is OFF IF want to set CoffeeMakerTime Press ON x 2 Apply input HH:MM Press ON [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 327

The Aircraft Accidents and Incidents

The organizational culture of a workplace is powerful, and when new employees join the institution, they are trained to have the culture of the place, as is the case in NASA.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3032

AI in Pharmaceutical Industry: Amazon and AI

Although some regulations exist for commercial applications of data, AI is such a new development and tool, that it is unclear how to ultimately provide oversight.
  • Subjects: AI
  • Pages: 1
  • Words: 400

Computer Programming and Code

The Maze game was the one I probably enjoyed the most since it was both engaging and not challenging, and I quickly understood what I needed to do.
  • Subjects: Programming
  • Pages: 1
  • Words: 329

Streaming Monitor: Angular Report

However, the syntax for TypeScript is the same as for JavaScript, which means existing JavaScript code can be converted to TypeScript.
  • Subjects: Applications
  • Pages: 4
  • Words: 1209

Data Security and Governance in Business

The topic for the final paper is Data Security and Governance. The articles served as a basis for the paper to illustrate the profound analysis of cloud and non-cloud data governance.
  • Subjects: Data
  • Pages: 2
  • Words: 566

Information Assurance Certifications Briefing

In addition to ensuring that a prospective specialist is familiar with the required technologies and techniques, certification also creates a framework for problem-solving approaches, facilitating cooperation and reducing the time required to agree on a [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 565

Information Sharing and Analysis Centers

It collects data from different sources and promotes sharing this information between the ISAC members. Only the members of ONG-ISAC receive the information classified as Red, Amber, and Green.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 397

Supply Chain’s Cybersecurity and Risk Analysis

Since there are so many parties involved, it is crucial to assess every part of the process, from obtaining the raw material to the delivery to the customer. Cybersecurity is the critical answer to most [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2006

5G Technology and Its Implementation in Business

The addition of advanced connectivity methods in the form of 5G networks opens new opportunities for business and new methods to increase the efficiency of business processes.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 847

Social Media: Risks and Opportunities

National Institutes of Health is a medical website for organizing social interactions within the medical community. Meanwhile, the principal goal is to study public health to improve it.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 643

Websites and Social Media Risks

WHO champion health and a better future for all; WHO is funded by the whole world; WHO focuses on pandemics to inform people; WHO has its newsroom to help people.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 594

Education Differences Between Generations

In the modern age, technology development has led to the integration of internet research that was not there in the past in the education system.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 337

Network Protocols and Network Services

The Learning Activity titled "What Are Network Protocols and Network Services?" informs that the concept of a network service refers to the application that operates at the level of the network.
  • Subjects: Applications
  • Pages: 1
  • Words: 317

Big Data in Enterprise Learning

The emergence of essential concepts in the field, such as big data, allows companies to analyze their employees' behavior and predict its future patterns for better planning in the long run.
  • Subjects: Data
  • Pages: 1
  • Words: 281

Cybersecurity Workforce in Emergent Nations

The lack of help from developed countries in the training and education of a cybersecurity workforce for developing nations can negatively affect the former. Public and private organizations also contribute to the development of cybersecurity [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 831

Issue Specific Policies: Remote Access Policy in RCR

First of all, it applies to all situations in which the remote access to the company's data is implied. The user is to control the duration of each remote access session by logging in and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Cybersecurity Strategy and Plan of Action

Padgett-Beale's primary intention of merging the company was to relocate the call epicenter to a property owned by the company roughly 10 miles from the company's previous location and opposite the newly released Padgett-Beale resort.
  • Subjects: Cyber Security
  • Pages: 26
  • Words: 7197

Augmented and Virtual Reality for Modern Firms

The business environment is not an exception, as firms seek to maximize their value through the implementation of high-tech solutions. AR is another major component of contemporary professional training, as it contributes to the better [...]
  • Subjects: AI
  • Pages: 1
  • Words: 348

Smartphone Blackberry Company

Another important feature of the smart phone is the QWERTY keyboard, which is the same as that of the normal computer.
  • Subjects: Phones
  • Pages: 4
  • Words: 1149

Cybersecurity in the Energy Sector

The stable supply of energy is the key to the normal functioning of American society, as it fuels all essential industries that ensure the vitality of the nation.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 630

Effect of Technology in Networking

The adoption of technology in this particular domain extends boosts the standards of the transmission and circulation of data. Second, the learning and application of technology in networking will bridge the gap between the physically [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 362

Importance of Data Analytics in Digital Marketing

Data analytics is the collection and analysis of customer data, including their needs, tastes, and desires to improve marketing strategy. It is a fundamental part of a digital marketing strategy and has numerous advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 293

Cyber-Physical Systems for Buildings Management

The 2016 attack forced the FBI investigation, which revealed that the growing implementation of the IoT was beneficial for cybercrime due to the unsecured data storing and dependence on an external computer or system. Data [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 559

The Value of Network Effects

The value of network effects increases when the product is used more, which is evidenced by popular social media sites like Facebook and Twitter. Network effects compel certain companies to increase the functions of their [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 307

The Multiple Object Tracking in Surgical Practice

The investigation below entails summaries of some findings of the MOT in a surgical exercise. Voluntary exercise of the assignment is centrally critical in the system of knowledge.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 950

Researching Facebook Terms of Service

Other areas are the respective rights and responsibilities of the users and the company, additional provisions, and links to other potentially relevant Terms and Policies.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 407

Cybersecurity for Open Data Initiatives

Governments continue to play a vital role in the open data movement.Data.gov was developed under OPEN Government Data Act; this is Title II of Foundations for the Evidence-based Policymaking Act.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2048

IT Process at the Company “Google”

Research of the IT process at "Google" is the key idea to be considered in this paper."Google" is known for its innovative technologies, fast and straightforward search engines, software, equipment, and progressive methods of working [...]
  • Subjects: AI
  • Pages: 2
  • Words: 584

Aspects of Smart Technologies

It is also possible to promote the collaboration of citizens, organizations, and the government via smart technologies. Another method to improve the environmental situation in the city is the implementation of eco-friendly public transport.
  • Subjects: AI
  • Pages: 6
  • Words: 1736

Data Mining and Its Major Advantages

Thus, it is possible to conclude that data mining is a convenient and effective way of processing information, which has many advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 290

How Technology Is Changing Our Minds

Modern communication the way how individuals establish and maintain relationships is affected by the mentioned factors to a great extent, and, of course, there are is a plethora of advantages within the scope of the [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 287

Chaos Theory. Visual Representation in Video Games

Currently, only rough concept designs of levels are available, and we plan to polish them up further and work on the visuals to create a dark and gloomy atmosphere. Novel puzzles will be designed and [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 295

Facial Recognition Technology Lab Report

The implantation of a chip in video cameras to identify the face of the shown participant is actively used for national security purposes of the state, in the agricultural sector, and in the front camera [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 588

Researching of Search Engine Optimization

Samsung is the most interested in Bangladesh, Guana, and Nepal since this brand focuses on the relatively free markets of developing countries.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 387

Technology and Society Relations

Consequently, the use of technology in its current form increases the oppression of vulnerable groups in society. However, despite the pessimistic claims of people like Benjamin, technology still positively affects society, and there are many [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 395

Information Systems in a Business Startup

For example, the integration of a marketing IS decreases the difficulty of choosing the best marketing channels for the startup the managers can rely on the collected information and see which media are the most [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 834

Risk Management and Aviation Safety

It is the responsibility of the accountable manager and the senior management team to promote positive behavior and the correct implementation of the safety culture.
  • Subjects: Aviation
  • Pages: 1
  • Words: 291

Drone Technology and Its Role in Logistics

Currently, the logistics industry is profitable and attractive to many companies globally due to the use of drone technology in improving service delivery to customers.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2219

Food4all Firm’s Smart Sensors and the Internet of Things

This report analyses how Food4all can integrate IoT and smart sensor technology in the preparation, storage, packaging, and delivery of food parcels to ensure the safety and quality of their products.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2417

Using AI Emotional Surrogates to Overcome Loneliness and Trauma

These statistical findings underpin the pervasiveness and severity of the crisis, necessitating the adoption of such innovative interventions as artificially intelligent emotional surrogates to alleviate the loneliness and associated trauma. Despite the sophistication and level [...]
  • Subjects: AI
  • Pages: 9
  • Words: 2515

Protecting Digital Assets Overseas for U.S. Companies

The question of how U.S.companies can protect their digital assets can be answered by examining available protection frameworks and how to take advantage of them The U.S.government offers cybersecurity for its companies both domestically and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 573

Databases in Workplace: NoSQL Databases

The purpose of this research paper is to find a NoSQL database that can be used in a working environment and how the organization may benefit from the application of the new model of the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 841

Aspects of Airport Advertisement

The sponsor's principal role is to provide funding and resources for the airport's operations and decision-making on the quality of its services.
  • Subjects: Aviation
  • Pages: 1
  • Words: 352

Sensitive Data Exposure

In addition to that, even the possibility to reach backups of the discussed information can increase vulnerability. Attackers can get into the conversation of two parties and obtain access to the information they were willing [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 745

Toughness and Corrosion: Definition and Unit

Therefore, the more the energy required to break a material the tougher the material and the lesser the energy required to break the material the less tough the material.
  • Subjects: Engineering
  • Pages: 3
  • Words: 616

M-PESA: Critical Success Factors

Generally, consumers preferred mobile payments on paying for services and transfer of money wherein most of them enjoy the convenience of the technology and this was the initial value point considered by the consumers. The [...]
  • Subjects: Phones
  • Pages: 6
  • Words: 1058

Digitalization and Data Policy for National Security

In this paper, the aim is to analyze the impact of digitization on data policy for national security in the United Arab Emirates, specifically focusing on the correlation between digitization, cyber-security, and artificial intelligence.
  • Subjects: Cyber Security
  • Pages: 23
  • Words: 6207

The Million Dollar Page: Why Is It Popular?

Lastly, online advertising's effectiveness was still questionable and difficult to measure; thus, in 1999, Alex's idea would not get enough customers to fill the one million pixels.
  • Subjects: Internet
  • Pages: 1
  • Words: 295

The Cloud Storage: Advantages and Disadvantages

They can encrypt it on a computer with the help of a software program before uploading information to the Cloud. In conclusion, it can be noted that Cloud storage is an effective device used by [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 852

Cyber-Security in Small Healthcare Services

Ensure accurate understanding of cyber-security to small businesses offering healthcare services. As a result, small healthcare firms will require cyber-security frameworks to keep unauthorized individuals out of the systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 558