Tech & Engineering Essay Examples and Topics. Page 17

5,359 samples

Fire Incidents: The Role of Extinguishers

Opening of the hatch, lack of fire safety skills, delayed reporting of the incident and acceleration of the ship to full speed were the main factors that contributed to the spreading of the fire.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1172

Information Systems and Typical Cycle Explanation

To make the correct decision in an organization, I would use the information from the Information System in the best way possible and not against the terms and defaults of the business.
  • Subjects: Data
  • Pages: 1
  • Words: 392

Choosing a Server for a Company

A server is a computer that is used to share resources and manage processes across a network, and it frequently connects to the internet to assist remote users.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 288

Human Life: Video Game, Simulation, or Reality?

Drawing parallels between the real and the virtual world, one can admit the unreality of the existence of the planet and people and compare everything that happens with the simulation in which we are.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 336

Digital Technology Impact on Study of Languages

In addition, the authors emphasize the need for teachers to acquire relevant knowledge and skills to survive and impart the best of knowledge to the students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Pros and Cons of Distance Education

On the one hand, modernization of education allows it to expand the usual boundaries of transmitting and receiving information in the educational process while retaining all the integral components.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 512

The New Kinds of Identity Theft

In addition, the education sector and medical industry will be more affected by cyberattacks as success, in this case, will result in the acquisition of considerable amounts of personal information.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 331

The Cost of a Positive Integer

If one imagines that a particular bit of information is encoded in a single string, then the complexity of describing this string is determined by the availability of a way to compress this string to [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1920

The Value of VPNs in Research

Though the feature that manages to change your IP is very efficient in providing access to entertainment, news, or other media, I find that it is especially vital in the sphere of research.
  • Subjects: Internet
  • Pages: 1
  • Words: 310

Remote Teaching: Advantages and Disadvantages

The social meaning of studying, as undergoing constant change in accordance with progress, makes outside interactions constrained and results in subjecting the abilities of the person to a biased social and political status.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 617

Magnetic Resonance Imaging Technology: Benefits for People

The principle of operation of the MRI machine is that under the influence of radio signals, hydrogen atoms in the forehead of a person placed in a strong magnetic field resonate and give out various [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1405

Aspects of Databases in Hospitals

Nevertheless, it is also valid that a large number of external sources might slow down the speed of data processing and reduce the overall accessibility.
  • Subjects: Data
  • Pages: 2
  • Words: 546

Aspects of Web Application Testing

This load can be, for example, the expected number of concurrent users of the application, and in the case of monitoring systems, this is the number of people connected to the system making a given [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 557

Researching of Work Breakdown Structure

The joint application of the WBS and the Gantt chart helps structure a project making it more organized and easier to implement.
  • Subjects: Project Management
  • Pages: 3
  • Words: 336

How to Become a Videogame Designer

Having interest, love and involvement in the video games themselves from the user's point of view already endows such a person with a number of qualifications that allow him to participate in the creation of [...]
  • Subjects: Programming
  • Pages: 1
  • Words: 363

Tools for Performance Testing: Project Scope

In addition, by learning specific indicators of other applications and applying the positive aspects in the tool, there will be a chance to create a successful sample.
  • Subjects: Programming
  • Pages: 2
  • Words: 611

The Cybersecurity Threat Landscape

The threats may come from different sources, and the criminals may focus on distinct vulnerabilities in the security of the system.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1367

Cashless Technology Trend in China

Once the money is removed from their pocket and placed in the hand of a burglar, it will be impossible to trace or establish that it belongs to a specific individual.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1493

Public-Private Partnerships for Election Systems Cybersecurity

In public contracts, the private sector provides the service directly to the public and bears all the associated end-user risks. Private parties can use all the gained knowledge and expertise to conduct security assessments of [...]
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1697

Solving the Cybersecurity Workforce Crisis

Since cyber security specialists are highly demanded in the current market, the private sector has been offering increased compensation in comparison with the government sector, which has led to decreased interest in IT positions in [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1094

Science Personal and Professional Life

Our decision to eat baked yams instead of fries, the car we drive in, our mobile phones, the oral drugs we use to treat certain illnesses and the purified water we drink at the end [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1146

Aspects of Technology Gameplan

These platforms are usually provided through the Internet, and students can use gadgets such as computers and mobile phones to access these materials.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 290

Human Cloning and the Challenge of Regulation

Cloning is, therefore, a highly beneficial process from a scientific standpoint, and it has the potential to usher in a new era of technological progress.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 270

Technological Development of Civilizations

The current stage in the development of human civilization is closely related to the use of technology. The fundamental thesis of his writings is that technology contributes to the development of human communities but that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1214

Device Addiction: Consequences and Solutions

One of the essential traits of smartphone addiction is tolerance which is defined as "a gradual increase in the mobile phone use to obtain the same level of satisfaction".
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1204

Expo 2020: Connecting Minds, Creating the Future

The London World Expo marked a watershed moment in the evolution of commodity derivatives to the abundance of new industrial technology and hence is considered the first World Exhibition in the contemporary sense.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1429

Human Augmentation and Its Impact on Business

The expansion of connected devices and the development of synthetic biology are the next steps in expanding human capabilities. In the next decade, the first signs of the era of transhumanism will appear, as the [...]
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2018

Cryptographic Algorithms: The Use in Cyber Security

Cryptographic protection of a system depends on two factors, 1) the strength of the keys and effectiveness of associated protocols, and 2) protection of said keys via key management.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 638

JMeter and Locust Load Tests for Websites

Within this paper, a literature review of a number of articles will be utilized to determine the ways in which JMeter and Locust interact with load tests for small or medium-sized web client applications through [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1129

Podcasts Recording and Audio Quality

It is important to note the quality of an audio product, such as a podcast, is highly important since it plays a major part in creating an enjoyable experience alongside the overall content of such [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 280

Application Software Integration: Pros and Cons

The breakthroughs within the field of information technologies revolutionized the environment of software development. The integration often leads to the improvement of the reporting process.
  • Subjects: Applications
  • Pages: 1
  • Words: 294

Analog and Digital Telecommunication Networks

Data conveyed from the sender to the recipient using analog signals is referred to as analog communication. Digitalization communication refers to the transmission of data between a producer and a recipient via digital signals.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 394

The Digital Workplace Transformation Issues

In this research, it is important to emphasize the significance of the digitalization of the present workspace and all the consequences, challenges, and obstacles that are associated with them.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1172

Survey Monkey: The Online Assessment Tool

We also give the reader the findings of a survey conducted with this tool and an assessment of its usefulness and potential for use in future usability studies. Survey Monkey is a web-based tool and [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 955

Aircraft Maintenance and Performance Improvement

The writers argue that the proposed operating system model positively influenced the performance and safety in the hangar and boosted the process efficiency of aircraft maintenance in the company where the study took place.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1111

The Use of Technology in the Human Services Field

The sphere of human services is one of the essential components of any community since people working in this area set themselves the task of making the life of other people easier.
  • Subjects: Applications
  • Pages: 1
  • Words: 404

Journal Storage as a Technological Asset for a College Student

Its proclaimed mission is creating "a platform for discovering and connecting research, images, and primary sources" As of now, JSTOR is a widely used database offering a plethora of information for those interested in a [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 345

Networking and Communication: AT&T

Therefore, AT&T services are available at full range in all three nations of interest with price variations, which can be found in regards to voice calls for Mexico against South Africa and Japan, where the [...]
  • Subjects: Phones
  • Pages: 3
  • Words: 827

Data Analytics in TED Talks

From the historical data provided by TED managers, the comparative analysis seeks to address whether shorter or extensive video uploads are considered through the number of viewers and the statistics of comments.
  • Subjects: Data
  • Pages: 4
  • Words: 871

Choosing a Computer for a Home Recording Studio

The motherboard is responsible for the speed and stability of the system and should also have a large number of ports in case of many purposes of the computer in the studio.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1094

Assessment of Cybersecurity Program Maturity

Padgett-Beale Financial Services must choose the appropriate framework and standards, determine required regulations and laws to comply with, and identify the best practices for maturity assessment to achieve an impenetrable cybersecurity management program.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 924

The Upcoming Era of Drones and Outcomes to a Society

It seems that in the future, there will be dozens of areas where drones would be successfully used. To sum it up, drones should be seen as friends of humanity, as they seem to be [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 352

Project Scope Management Through Multiple Perspectives

The article provides a detailed description of the six steps that are included in the scope management process. In this respect, this information can be used as a guide for the manager when setting the [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 348

The Document Warehousing Concepts

In contrast to data warehousing, a document warehouse is a framework for the storage and use of unstructured data, such as texts or multimedia.
  • Subjects: Data
  • Pages: 12
  • Words: 2493

Electric Coffee Maker: The Use of Pseudocode

Program Name: Coffee Maker Functions Code for Coffee Maker Functions: Apply PresetTime to begin brewing while the coffee maker is OFF IF want to set CoffeeMakerTime Press ON x 2 Apply input HH:MM Press ON [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 327

AI in Pharmaceutical Industry: Amazon and AI

Although some regulations exist for commercial applications of data, AI is such a new development and tool, that it is unclear how to ultimately provide oversight.
  • Subjects: AI
  • Pages: 1
  • Words: 400

Computer Programming and Code

The Maze game was the one I probably enjoyed the most since it was both engaging and not challenging, and I quickly understood what I needed to do.
  • Subjects: Programming
  • Pages: 1
  • Words: 329

Streaming Monitor: Angular Report

However, the syntax for TypeScript is the same as for JavaScript, which means existing JavaScript code can be converted to TypeScript.
  • Subjects: Applications
  • Pages: 4
  • Words: 1209

Data Security and Governance in Business

The topic for the final paper is Data Security and Governance. The articles served as a basis for the paper to illustrate the profound analysis of cloud and non-cloud data governance.
  • Subjects: Data
  • Pages: 2
  • Words: 566

Information Assurance Certifications Briefing

In addition to ensuring that a prospective specialist is familiar with the required technologies and techniques, certification also creates a framework for problem-solving approaches, facilitating cooperation and reducing the time required to agree on a [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 565

Systemic vs. Traditional Project Management

To begin with, the two types of project management are useful in particular cases, and the necessity of a systemic approach is not due to the initial inefficiency of the first method but to the [...]
  • Subjects: Project Management
  • Pages: 1
  • Words: 307

Is HTML a Programming Language?

For example, Newmarch states that HTML is a simple language and can "be edited by hand," leading to the incorrectness of many documents. On the other hand, there are people whose opinion is for HTML [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 673

Information Sharing and Analysis Centers

It collects data from different sources and promotes sharing this information between the ISAC members. Only the members of ONG-ISAC receive the information classified as Red, Amber, and Green.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 397

Sifers-Grayson Firm’s Security Incident Analysis

The Red Team also sent phishing emails to the workers after 30 minutes, exposing the company's vulnerability. Lastly, the Red Team sent phishing emails to the Sifers-Grayson's employees using the stolen logins, where a significant [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 867

Supply Chain’s Cybersecurity and Risk Analysis

Since there are so many parties involved, it is crucial to assess every part of the process, from obtaining the raw material to the delivery to the customer. Cybersecurity is the critical answer to most [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2006

Amazon Company’s Acquisition Risk Analysis

Since Amazon is one of the largest companies in the world highly sensitive to cybersecurity risks, it would be appropriate for the company to use the best provider regardless of the price of the solution.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2264

“Artificial Intelligence and Its Role in Near Future”

The author's work is devoted to the role of artificial intelligence in human life: He writes about the development of AI, especially noting how computer technology has caused a renaissance of influence on processing data [...]
  • Subjects: AI
  • Pages: 4
  • Words: 1141

5G Technology and Its Implementation in Business

The addition of advanced connectivity methods in the form of 5G networks opens new opportunities for business and new methods to increase the efficiency of business processes.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 847

Budgeting for Cyber-Security

The technical and non-technical members and senior staff members of the Red Clay Company employees are required to ensure an improved authentication is put in place and followed effectively for the safety of the company's [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 660

Unified Theory of Acceptance and Use of Technology

Nevertheless, the most convenient and affordable is a mobile technology that can work on different operational systems and track the motion of tourists in real time, transmitting data to the Internet server and allowing one [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1119

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

Social Media: Risks and Opportunities

National Institutes of Health is a medical website for organizing social interactions within the medical community. Meanwhile, the principal goal is to study public health to improve it.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 643

Websites and Social Media Risks

WHO champion health and a better future for all; WHO is funded by the whole world; WHO focuses on pandemics to inform people; WHO has its newsroom to help people.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 594

Education Differences Between Generations

In the modern age, technology development has led to the integration of internet research that was not there in the past in the education system.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 337

Advantages and Disadvantages of MS Project

Microsoft provides support to their users, and MS Project team members of the project will be able to receive assistance with the software when necessary.
  • Subjects: Applications
  • Pages: 1
  • Words: 377

GG Freightways Mobile Marketing Application Project

The mobile marketing application intends to assist in tracking the whereabouts of the goods transported hence contributing to the timely delivery of the freight to the clients.
  • Subjects: Applications
  • Pages: 5
  • Words: 1379

Network Protocols and Network Services

The Learning Activity titled "What Are Network Protocols and Network Services?" informs that the concept of a network service refers to the application that operates at the level of the network.
  • Subjects: Applications
  • Pages: 1
  • Words: 317

How Smartphones Changed Society and the World

Introduction of the smartphone to mass public Driven by iPhone created by Apple and Steve Jobs in 2007 Revolutionized the world of communications and information exchange Smartphone went from being a tool to the [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 560

Big Data in Enterprise Learning

The emergence of essential concepts in the field, such as big data, allows companies to analyze their employees' behavior and predict its future patterns for better planning in the long run.
  • Subjects: Data
  • Pages: 1
  • Words: 281

Computer-Aided-Design, Virtual and Augmented Realities in Business

The usual applications of these technologies are in the field of data management, product visualization, and training; however, there is infinite potential in their development and integration with one another and this is why they [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 403

Issue Specific Policies: Remote Access Policy in RCR

First of all, it applies to all situations in which the remote access to the company's data is implied. The user is to control the duration of each remote access session by logging in and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Cybersecurity Strategy and Plan of Action

Padgett-Beale's primary intention of merging the company was to relocate the call epicenter to a property owned by the company roughly 10 miles from the company's previous location and opposite the newly released Padgett-Beale resort.
  • Subjects: Cyber Security
  • Pages: 26
  • Words: 7197

Technoscience and Humanity in the Elysium Film

Moreover, the concepts of transhumanism and artificial intelligence are analyzed in the context of the corrupted social order to draw on the failure of humanism, ethical and moral decay, and prosperity of the wealthy.
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1993

Augmented and Virtual Reality for Modern Firms

The business environment is not an exception, as firms seek to maximize their value through the implementation of high-tech solutions. AR is another major component of contemporary professional training, as it contributes to the better [...]
  • Subjects: AI
  • Pages: 1
  • Words: 348

Computerized Ordering System

In this report, the discussion will involve the considerations that prevail in the design and development of a computerized ordering system.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1618

Researching of the Process of Key Rotation

Key rotation generally refers to the process of retiring an access key and replacing it with a new cryptographic key. The third step is to check whether the old access key is active, and, instead [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 641

Smartphone Blackberry Company

Another important feature of the smart phone is the QWERTY keyboard, which is the same as that of the normal computer.
  • Subjects: Phones
  • Pages: 4
  • Words: 1149

Counterfeits and Credit Card Fraud Schemes

Additionally, it demonstrates the severity of the problem and the possibility of the victims failing to discover the use of their credentials promptly.
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1717

Cybersecurity in the Energy Sector

The stable supply of energy is the key to the normal functioning of American society, as it fuels all essential industries that ensure the vitality of the nation.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 630

Importance of Data Analytics in Digital Marketing

Data analytics is the collection and analysis of customer data, including their needs, tastes, and desires to improve marketing strategy. It is a fundamental part of a digital marketing strategy and has numerous advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 293

Cyber-Physical Systems for Buildings Management

The 2016 attack forced the FBI investigation, which revealed that the growing implementation of the IoT was beneficial for cybercrime due to the unsecured data storing and dependence on an external computer or system. Data [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 559

Designing a Cordless Smoothie Maker

For designing a gear, this paper chooses spur gear because it is the most economical out of all the gears listed.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1605

Research and Evaluation Theory in Project Management

The network represents multiple fields of research and inquiry and illustrates the cross-disciplinary nature of project management investigation, which usually contrasts the research with psychology, business administration, pedagogy, and organizational theory.
  • Subjects: Project Management
  • Pages: 2
  • Words: 573

The Value of Network Effects

The value of network effects increases when the product is used more, which is evidenced by popular social media sites like Facebook and Twitter. Network effects compel certain companies to increase the functions of their [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 307

The Multiple Object Tracking in Surgical Practice

The investigation below entails summaries of some findings of the MOT in a surgical exercise. Voluntary exercise of the assignment is centrally critical in the system of knowledge.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 950

Researching Facebook Terms of Service

Other areas are the respective rights and responsibilities of the users and the company, additional provisions, and links to other potentially relevant Terms and Policies.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 407
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.