Tech & Engineering Essay Examples and Topics. Page 19

4,726 samples

Discussion of Coding of Qualitative Data

Coding will address questions of leadership in nursing, tendencies for the experienced professionals to continue education, and the need for a DNP degree in clinical practice.
  • Subjects: Data
  • Pages: 2
  • Words: 559

Online Platform Development: Rafeeq

The company is also catering the needs of the target customers in the most creative manner. The order received by the administration, which acknowledges the order with the restaurant and the customer.
  • Subjects: Applications
  • Pages: 1
  • Words: 1666

Cyber Kill Chain: Application and Utilization

Cyber Kill Chain means a sequence of steps that assist in tracing the phases of cyber-attack from the early investigation to the exfiltration of data. Delivery involves the transmission of the weapon to the target [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 925

Multimedia Use in Teaching

The main reason for easier conceptualization of the facts is the interaction and identification of images presented in videos and the ability of video to arouse imagination in the watchers.
  • 5
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 1856

The Impact of Handheld Device Usage on Life

More specifically, I want to examine the impact of telephones on my interaction with friends and my perceptions concerning the mental effects of the device application.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 673

Samsung NX1000: Digital Camera Overview

The NX1000 is relatively small in size. This makes them it convenient for travelling. It has Light and darkness sensor features.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 363

The Impacts of Internet Telephony (VoIP)

Internet telephony has impacted many lives and has led to ethical, social, and political issues in the contemporary world. In a nutshell, internet telephony has impacted many lives in the ethical, social, and political facets [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 711

The Most Influential Force in Modern Society

Therefore, I believe that digital technology in general and social media, in particular, represent the most influential force that sets the tone for an individual's personal values.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 306

Computer Forensic Incident

All evidence should be collected in the presence of experts in order to avoid losing data as well as violating privacy rights.N.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 587

The Use of Technology in Teaching Practice

As to the possible revisions of the lesson plan, it is necessary to help students grasp the material more effectively and have a more positive attitude towards their wrong answers.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 386

Using Jing in Teaching

Jing is a free, screen casting and image capturing tool (TechSmith, 2013). It also grants marking up uses and wide sharing probabilities within a short time.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 210

Information and Communications Technology in Education

Moreover, many research projects started to investigate the benefits of MALL in learning the language. The research revealed women to be, on average more inclined towards mobile learning in perception and attitude.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1511

The Halpin and Relational Approaches

The relational approach, in turn, is a framework to adapt a database design to a real-world environment. Tying to the specific needs of the organization forms the basis for working on such a structure.
  • Subjects: Data
  • Pages: 1
  • Words: 278

Reconnaissance in a Cyber Kill Chain

There is a certain pattern for each crime, which includes reconnaissance of the target, delivery of weapons, installation, establishing a command and control channel, and accomplishing the mission - which is often the process of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 611

Pedagogical Considerations: M-Learning

M-Learning offers diversified learning and teaching environment. This form of learning has pedagogically connected the design of learning and device usability.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 966

E-Government in New York City Public Education

The problem of inequality and disparities in the education of New York schools and the need to address it has many stakeholders due to the complexity of the education system.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 2534

Designing Enterprise Information Systems

I would first conduct an in-depth review of the employees' work processes and opinions to learn if EIS is lacking in any of these parameters.
  • Subjects: Data
  • Pages: 1
  • Words: 302

Discussion of Metallography History

The mechanical properties of a material are heavily dependent on the microstructure of the material. Using these two methods, it becomes possible to determine the quality and properties of the material.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 295

Issue of Self-Cyberbullying

In the first sentence, I have chosen to reject a comma before the article's title, however, it is appropriate there as well.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 479

Technology: Aspects of RAID System

This storage allows the combining of the benefits of RAID 0 and RAID 1, improving both the array's performance and recovering the data in case one of the disks used in the array fails.
  • Subjects: Data
  • Pages: 1
  • Words: 311

Protection of Students Online: Australia

When browsing various websites young users can be exposed to inappropriate information and can become victims of fraud.
  • Subjects: Technology in Education
  • Pages: 18
  • Words: 2470

Pros and Cons of Using CSS-Preprocessors

In addition, these preprocessors bring the basic features of a high-level programming language to CSS, such as the use of variables, loops, math operations, if-else constructs, and more advanced functionality, for example, for working with [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 618

Modern Technologies: Wireless Signals Into Energy

I love this article because it is beneficial and informative; it tells about the technology that in the near future may enter into daily use by people around the world.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 363

Cloud Computing in Nursing Practice

Therefore, by focusing on cloud computing, this paper illustrates the influence of the information resource, its contribution to the nursing field, and results drawn from their inception in the nursing field and how consumers can [...]
  • Subjects: Cloud Computing
  • Pages: 1
  • Words: 378

Digital Government Security Infrastructure Design Challenges

However, the practice has the same purpose in all sectors of application; evaluation and analysis of potential dangers that are likely to be realized in those settings and presenting the right strategies to combat the [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 954

Opinion About Web Site sedl.org and Teaching

However, it is also quite important to note that students usually have intellectual learning in such gatherings. In essence, cooperative learning is very instrumental in intellectual growth, personal and social development.
  • Subjects: Internet
  • Pages: 3
  • Words: 834

The Essence of Niche Networking

The use of LinkedIn in the work environment is recognized as a legitimate practice and the website can be used as a sign of a person's professionalism in a particular craft.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1582

Mind-Reading Shopping Cart Project

The cart will provide information on the selected products as well as customer reviews so that the user knows what product is worth buying.
  • Subjects: Applications
  • Pages: 4
  • Words: 209

LifeDecor: Decorate Your Empty Room Application

The social networking is especially important as the application Decorate Your Room is characterized by a high degree of connectivity, which is seen of its potential advantages.
  • Subjects: Applications
  • Pages: 14
  • Words: 1470

Hunting Netiquette Violations

This is a message attached to people's mails without their consent. An example of this violation is a word-for-word plagiarism.
  • Subjects: Internet
  • Pages: 2
  • Words: 430

Leaders’ Attitude Toward AI Adoption in the UAE

A lack of interest in the technology from managers shows that the UAE has no intentions to adopt artificial intelligence. Leaders who are willing to prioritize learning about artificial intelligence are in a better position [...]
  • Subjects: AI
  • Pages: 3
  • Words: 820

Digital Self-Harm: Causes and Interventions

Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2258

The Importance of Trust in AI Adoption

Hengstler et al.suggest that the best approach to take in enhancing trust in the use of AI is viewing the relationship between the company and the technology from a human social interaction perspective.
  • Subjects: AI
  • Pages: 5
  • Words: 1456

Cutting-Edge Technologies: Blockchain and AI

The users can sign in their accounts and transact to another user and the blockchain records the transaction which is viewed by other users. It is difficult to collect taxes and trace malicious activities in [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1397

The Information Technology Security Strategy

Three excellent data practices are confidentiality, availability, and integrity: Confidentiality refers to the protection of confidential data by restricting access to it for those who have been trusted. The COBIT arrangement includes contractual contracts in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 875

Delta Glider Plane’s Technical Design

This report reviews the overall technical design of the Delta Glider Plane in detail in terms of the applicability of the aerodynamic models and the purpose of the electronic components of the overall system.
  • Subjects: Aviation
  • Pages: 3
  • Words: 895

Budget Manager App’s Market and Persona

Overall, the budgeting manager app will help Nick understand his expenses, determine what items he spends the most money on and plan his expenses a month ahead. The use of a budgeting manager app will [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 932

Online Voting and Corporate Social Responsibility

The primary problem in this research is the insecurity in the online voting system due to the increase of cybercrimes. It is essential to comprehend the related dangers as political up-and-comers progressively go to the [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1947

Autonomous Un-Guided Vehicle Usage

A prototype of an autonomous un-guided vehicle designed on the basis of Himoto Rock Crawler RCF-8 chassis was created to test its capabilities in various environments.
  • Subjects: Robotics
  • Pages: 5
  • Words: 818

Artificial Intelligence in Drone Technology for Farming

Automated drones fitted with spraying features are used in the monitoring of agricultural processes and crops to schedule tasks and expeditiously address the observed issues throughout plant life.
  • Subjects: Robotics
  • Pages: 11
  • Words: 3010

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 50
  • Words: 14365

Remote Sensing Monitoring the Ground Water Quality

The overall view of the water quality index of the present study area revealed that most of the study area with > 50 standard rating of water quality index exhibited poor, very poor and unfit [...]
  • Subjects: Other Technology
  • Pages: 20
  • Words: 7005

VMware Server Virtualization Solution

This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
  • Subjects: Computer Science
  • Pages: 45
  • Words: 13587

Novel Framework to Assist the Novice

The failure mode for SS-FMEA is thus represented as a violation of logical relations in the combination of elements that are specific for each system.
  • Subjects: Other Technology
  • Pages: 12
  • Words: 3472

Firefighting Methods, Technology Availability in Qatar

The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
  • Subjects: Other Technology
  • Pages: 35
  • Words: 8540

Network Security: Why Is It Important?

Network safety, regardless of the company size, is one of the most important things to remember when operating over the Web, local area network or other technologies.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 656

Boston Dynamics’ Spot Robot Dog

Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
  • Subjects: Robotics
  • Pages: 4
  • Words: 357

Business Report: Demand for Electricity

For instance, contemporary concerns about global warming and the 'carbon footprint' of the UK power industry virtually dictate official attention to matters of fuel in use and the national volume of electricity consumption.
  • Subjects: Engineering
  • Pages: 35
  • Words: 3495

Opportunity Assessment (OPASS)

This opportunity assessment is about the potential opportunities in the field of remanufacturing the laser toner industry in the USA. That is, the cartridges are designed to carry toners.
  • Subjects: Engineering
  • Pages: 9
  • Words: 3550

Cyber Theft: Security Measures for Organizations

Relative to this fact, Mukhopadhyay et al.say that the uptake of technology and the prominence of the Internet of Things, which is a network of objects that communicate with each other, has increasingly exposed companies [...]
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 7690

Acoustic and Electric Recordings

At the moment, it develops even faster; however, one of the crucial factor for this development was the transition from the acoustic to the electric recording.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 567

Importance of Designing an Interface Model

The process goes through five stages: the discovery of what is required by the user, the analysis, designing and prototyping, and, finally, the implementation.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1826

The Resilience of Austria to the Threat of Cyber-Attack

The study will focus on examining the resilience of Austria to the threat of cyber-attack. The significance of the study will help in contributing to the literature about cybercrime and ways to respond to the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 489

The Boundaries of Integrating Machines Into Human Life

In the third stage, with the advent of the Internet, PC, and multiple interactive devices, the focus was shifted to the perception of the mechanism as an autopoietic system in a social setting.
  • Subjects: Robotics
  • Pages: 7
  • Words: 1954

Ethics of Information and Personal Data Protection

The right to privacy and confidentiality of correspondence is a constitutional right, and violation of this jeopardizes the law. Thus, access to confidential information should be provided to law enforcement agencies only in case of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1043

Google Technologies That Are Currently Developing

One of the areas that Google invests in and promotes is self-driving automobiles. The company is working with the Renewable Energy Buyers Alliance to promote legislative changes that simplify corporate procurement of wind and solar [...]
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2681

Relation Between Technology and Data Gathering

For instance, the tool can collect data on what a customer has chosen and predict what they may want to buy. No traditional data collection method can be that effective in the gathering of customer [...]
  • Subjects: Data
  • Pages: 1
  • Words: 322

Internet Explorer: Software Reviewing

Internet explorer is available with the Microsoft operating systems interfaces. There are various important components on the example of an internet files window.
  • Subjects: Applications
  • Pages: 16
  • Words: 1239

Telecommuting: Benefits and Disadvantages

As the research states, telecommuting generally allows people to work from home, which reduces office space and, as a result, the expenses associated with the operating costs and the amount of energy use.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 976

Cloud Computing in Business

Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
  • Subjects: Cloud Computing
  • Pages: 13
  • Words: 880

Phishing Victimization on Internet Banking Awareness

Therefore, the study is meant to determine and evaluate consumer susceptibility to e-banking victimization through phishing attacks. Subsequently, the study will be designed to evaluate the effectiveness of phishing victimization training to E-banking consumers.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4145

Tabletop Centrifuge Manual

The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Dangers of Logic and Artificial Intelligence

The following are the dangers of logic and artificial intelligence when applied in various areas. The last danger of logic and artificial intelligence relates to autonomous weapons.
  • Subjects: AI
  • Pages: 5
  • Words: 1239

Big Data and Artificial Intelligence

Of course, there are cons associated with deep fake technology; its core concept is to create a fake so good that it can be considered authentic.
  • Subjects: AI
  • Pages: 1
  • Words: 286

ARC-IT Communications View Description

Architecture Reference for Cooperative & Intelligent Transportation terms the protocol stacks as solutions and consists of a collection of standards to regulate the communication process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 570

Internet Hacking and Cybersecurity Conundrum Analysis

Many people have gained access to computer systems, the Internet, and related products and services, leading to the emergence of cyber-related threats. Cybersecurity improvements are vital to the continuous developments in information technology, national security, [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 824

Internet Hacking and Cybersecurity Conundrum

Therefore, the increasing number of attacks during the pandemic could be handled with the help of machine learning and have the numerous human workers assigned to less crucial tasks that actually require human judgment.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1206

Health and Environment: The Impact of Technology

This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
  • Subjects: Technology Effect
  • Pages: 20
  • Words: 5816

Solid Mechanics: The Two Main Components of the System

However, considering the bending stress of the RHS element, and the sizes of CHS, the loads will be mainly concentrated in the place of RHS and CHS contact, and the square of the contiguity will [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1090

Impact of Cybercrimes on Business

The SolarWinds cyber-raid is described as the most sophisticated and the most significant assault in the world. The vulnerabilities in SolarWind and its customers, such as Microsoft can lead to the loss of millions to [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 878

AI and Job Security Aspects

The biggest fear in the economy's digitalization is the loss of jobs, but this will only be in the short term and only if there is the uncontrolled use of artificial intelligence.
  • Subjects: AI
  • Pages: 4
  • Words: 1132

Nuclear Energy: High-Entropy Alloy

One of the tools for reducing the level of greenhouse gas emissions is the development of nuclear energy, which is characterized by a high degree of environmental efficiency and the absence of a significant impact [...]
  • Subjects: Engineering
  • Pages: 12
  • Words: 4165

Creating a Database in Microsoft Access

During the database design, it is not possible to delete the primary key fields in the datasheet view until one changes to the design view, since the primary key represents a unique identification field of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 758

Manifestation of Strategic Cultures in Cyber Conflict

The discourse in strategic culture can be traced back to over four decades ago where it incited a renewed thinking of both the origins of the concept of strategy and the strategic choices in politics.
  • Subjects: Cyber Security
  • Pages: 27
  • Words: 7451

Presenting E-Learning and Design Concepts

E-learning is the use of electronic technologies to create learning experiences (Horton, 2012). It is a broad definition of the field of using technology to deliver learning.
  • Subjects: Technology in Education
  • Pages: 15
  • Words: 971

The Latest Cyber Defense Methods

Conversely, if the application's ability to perform specific tasks is limited, the attacker's objectives may not be fulfilled, and the scope of the damage can be minimized. As a result, it is inadvisable to remain [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1094

Cyber Vulnerabilities and Threats

It is the cyber defense specialist's task to remain aware of the latest threats and issues in security so that they can prepare for potential attacks and be ready to respond to them.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1104