Tech & Engineering Essay Examples and Topics. Page 19

4,418 samples

Computer Forensic Incident

All evidence should be collected in the presence of experts in order to avoid losing data as well as violating privacy rights.N.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 587

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

The Use of Technology in Teaching Practice

As to the possible revisions of the lesson plan, it is necessary to help students grasp the material more effectively and have a more positive attitude towards their wrong answers.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 386

Using Jing in Teaching

Jing is a free, screen casting and image capturing tool (TechSmith, 2013). It also grants marking up uses and wide sharing probabilities within a short time.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 210

Interlocking Bricks: Production Technology

The use of interlocking bricks has tremendously reduced the cost of building. It is cheap to buy or manufacture these bricks as compared to buying stones for construction.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 447

Information and Communications Technology in Education

Moreover, many research projects started to investigate the benefits of MALL in learning the language. The research revealed women to be, on average more inclined towards mobile learning in perception and attitude.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1511

The Halpin and Relational Approaches

The relational approach, in turn, is a framework to adapt a database design to a real-world environment. Tying to the specific needs of the organization forms the basis for working on such a structure.
  • Subjects: Data
  • Pages: 1
  • Words: 278

Pedagogical Considerations: M-Learning

M-Learning offers diversified learning and teaching environment. This form of learning has pedagogically connected the design of learning and device usability.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 966

Automated Catering Management System

It is a key part of future improvement as this information can be stored in the system and processed to promote positive change.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1104

E-Government in New York City Public Education

The problem of inequality and disparities in the education of New York schools and the need to address it has many stakeholders due to the complexity of the education system.
  • Subjects: Technology in Education
  • Pages: 9
  • Words: 2534

Designing Enterprise Information Systems

I would first conduct an in-depth review of the employees' work processes and opinions to learn if EIS is lacking in any of these parameters.
  • Subjects: Data
  • Pages: 1
  • Words: 302

Discussion of Metallography History

The mechanical properties of a material are heavily dependent on the microstructure of the material. Using these two methods, it becomes possible to determine the quality and properties of the material.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 295

Protection of Students Online: Australia

When browsing various websites young users can be exposed to inappropriate information and can become victims of fraud.
  • Subjects: Technology in Education
  • Pages: 18
  • Words: 2470

Pros and Cons of Using CSS-Preprocessors

In addition, these preprocessors bring the basic features of a high-level programming language to CSS, such as the use of variables, loops, math operations, if-else constructs, and more advanced functionality, for example, for working with [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 618

Modern Technologies: Wireless Signals Into Energy

I love this article because it is beneficial and informative; it tells about the technology that in the near future may enter into daily use by people around the world.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 363

Cloud Computing in Nursing Practice

Therefore, by focusing on cloud computing, this paper illustrates the influence of the information resource, its contribution to the nursing field, and results drawn from their inception in the nursing field and how consumers can [...]
  • Subjects: Cloud Computing
  • Pages: 1
  • Words: 378

CAQDAS: Software Programs Analysis

This paper provides concrete advantages and disadvantages of using qualitative software programs in general (CAQDAS).
  • Subjects: Applications
  • Pages: 10
  • Words: 2848

Digital Government Security Infrastructure Design Challenges

However, the practice has the same purpose in all sectors of application; evaluation and analysis of potential dangers that are likely to be realized in those settings and presenting the right strategies to combat the [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 954

Opinion About Web Site sedl.org and Teaching

However, it is also quite important to note that students usually have intellectual learning in such gatherings. In essence, cooperative learning is very instrumental in intellectual growth, personal and social development.
  • Subjects: Internet
  • Pages: 3
  • Words: 834

Mind-Reading Shopping Cart Project

The cart will provide information on the selected products as well as customer reviews so that the user knows what product is worth buying.
  • Subjects: Applications
  • Pages: 4
  • Words: 209

LifeDecor: Decorate Your Empty Room Application

The social networking is especially important as the application Decorate Your Room is characterized by a high degree of connectivity, which is seen of its potential advantages.
  • Subjects: Applications
  • Pages: 14
  • Words: 1470

Effectiveness of Integrating ICT in Schools

Most of the learning activities were undertaken in a classroom in front of the students, and assessment processes were conducted in class with paper and pen assessments.
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2908

Hunting Netiquette Violations

This is a message attached to people's mails without their consent. An example of this violation is a word-for-word plagiarism.
  • Subjects: Internet
  • Pages: 2
  • Words: 430

Leaders’ Attitude Toward AI Adoption in the UAE

A lack of interest in the technology from managers shows that the UAE has no intentions to adopt artificial intelligence. Leaders who are willing to prioritize learning about artificial intelligence are in a better position [...]
  • Subjects: AI
  • Pages: 3
  • Words: 820

The Importance of Trust in AI Adoption

Hengstler et al.suggest that the best approach to take in enhancing trust in the use of AI is viewing the relationship between the company and the technology from a human social interaction perspective.
  • Subjects: AI
  • Pages: 5
  • Words: 1456

Cutting-Edge Technologies: Blockchain and AI

The users can sign in their accounts and transact to another user and the blockchain records the transaction which is viewed by other users. It is difficult to collect taxes and trace malicious activities in [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1397

Artificial Intelligence for the Future of Policing

To conclude, the implementation of artificial intelligence along with surveillance technologies will help policing maintain control over a big population. Artificial Intelligence allows policing to effectively prevent potential criminal events via the prediction of a [...]
  • Subjects: AI
  • Pages: 1
  • Words: 294

Budget Manager App’s Market and Persona

Overall, the budgeting manager app will help Nick understand his expenses, determine what items he spends the most money on and plan his expenses a month ahead. The use of a budgeting manager app will [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 932

Online Voting and Corporate Social Responsibility

The primary problem in this research is the insecurity in the online voting system due to the increase of cybercrimes. It is essential to comprehend the related dangers as political up-and-comers progressively go to the [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1947

Autonomous Un-Guided Vehicle Usage

A prototype of an autonomous un-guided vehicle designed on the basis of Himoto Rock Crawler RCF-8 chassis was created to test its capabilities in various environments.
  • Subjects: Robotics
  • Pages: 5
  • Words: 818

Artificial Intelligence in Drone Technology for Farming

Automated drones fitted with spraying features are used in the monitoring of agricultural processes and crops to schedule tasks and expeditiously address the observed issues throughout plant life.
  • Subjects: Robotics
  • Pages: 11
  • Words: 3010

Firefighting Methods, Technology Availability in Qatar

The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
  • Subjects: Other Technology
  • Pages: 35
  • Words: 8540

Airports Security Systems’ and Passengers’ Satisfaction

All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
  • Subjects: Aviation
  • Pages: 19
  • Words: 4975

Network Security: Why Is It Important?

Network safety, regardless of the company size, is one of the most important things to remember when operating over the Web, local area network or other technologies.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 656

Business Report: Demand for Electricity

For instance, contemporary concerns about global warming and the 'carbon footprint' of the UK power industry virtually dictate official attention to matters of fuel in use and the national volume of electricity consumption.
  • Subjects: Engineering
  • Pages: 35
  • Words: 3495

Cyber Theft: Security Measures for Organizations

Relative to this fact, Mukhopadhyay et al.say that the uptake of technology and the prominence of the Internet of Things, which is a network of objects that communicate with each other, has increasingly exposed companies [...]
  • Subjects: Cyber Security
  • Pages: 28
  • Words: 7690

The Importance of Database Design

It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
  • Subjects: Data
  • Pages: 3
  • Words: 548

Acoustic and Electric Recordings

At the moment, it develops even faster; however, one of the crucial factor for this development was the transition from the acoustic to the electric recording.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 567

The Resilience of Austria to the Threat of Cyber-Attack

The study will focus on examining the resilience of Austria to the threat of cyber-attack. The significance of the study will help in contributing to the literature about cybercrime and ways to respond to the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 489

The Boundaries of Integrating Machines Into Human Life

In the third stage, with the advent of the Internet, PC, and multiple interactive devices, the focus was shifted to the perception of the mechanism as an autopoietic system in a social setting.
  • Subjects: Robotics
  • Pages: 7
  • Words: 1954

Ethics of Information and Personal Data Protection

The right to privacy and confidentiality of correspondence is a constitutional right, and violation of this jeopardizes the law. Thus, access to confidential information should be provided to law enforcement agencies only in case of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1043

Google Technologies That Are Currently Developing

One of the areas that Google invests in and promotes is self-driving automobiles. The company is working with the Renewable Energy Buyers Alliance to promote legislative changes that simplify corporate procurement of wind and solar [...]
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2681

Relation Between Technology and Data Gathering

For instance, the tool can collect data on what a customer has chosen and predict what they may want to buy. No traditional data collection method can be that effective in the gathering of customer [...]
  • Subjects: Data
  • Pages: 1
  • Words: 322

Telecommuting: Benefits and Disadvantages

As the research states, telecommuting generally allows people to work from home, which reduces office space and, as a result, the expenses associated with the operating costs and the amount of energy use.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 976

Cloud Computing in Business

Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
  • Subjects: Cloud Computing
  • Pages: 13
  • Words: 880

Tabletop Centrifuge Manual

The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Dangers of Logic and Artificial Intelligence

The following are the dangers of logic and artificial intelligence when applied in various areas. The last danger of logic and artificial intelligence relates to autonomous weapons.
  • Subjects: AI
  • Pages: 5
  • Words: 1239

Electronic News Gathering

The Characteristics involve the Utilization of electrical video to gather information, the Incorporation of Audio technologies in gathering news, and the Utilization of portable equipment in the newsgathering process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1366

Aviation Crisis Management Toolkit

The impacts on these organisations vary considerably depending on the type of crisis, the severity of the crisis and the way in which the organisation has planned for, and responded to the crisis.
  • Subjects: Aviation
  • Pages: 13
  • Words: 3593

Big Data and Artificial Intelligence

Of course, there are cons associated with deep fake technology; its core concept is to create a fake so good that it can be considered authentic.
  • Subjects: AI
  • Pages: 1
  • Words: 286

ARC-IT Communications View Description

Architecture Reference for Cooperative & Intelligent Transportation terms the protocol stacks as solutions and consists of a collection of standards to regulate the communication process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 570

Internet Hacking and Cybersecurity Conundrum Analysis

Many people have gained access to computer systems, the Internet, and related products and services, leading to the emergence of cyber-related threats. Cybersecurity improvements are vital to the continuous developments in information technology, national security, [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 824

Internet Hacking and Cybersecurity Conundrum

Therefore, the increasing number of attacks during the pandemic could be handled with the help of machine learning and have the numerous human workers assigned to less crucial tasks that actually require human judgment.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1206

Nuclear Energy: High-Entropy Alloy

One of the tools for reducing the level of greenhouse gas emissions is the development of nuclear energy, which is characterized by a high degree of environmental efficiency and the absence of a significant impact [...]
  • Subjects: Engineering
  • Pages: 15
  • Words: 4165

Manifestation of Strategic Cultures in Cyber Conflict

The discourse in strategic culture can be traced back to over four decades ago where it incited a renewed thinking of both the origins of the concept of strategy and the strategic choices in politics.
  • Subjects: Cyber Security
  • Pages: 27
  • Words: 7451

The Latest Cyber Defense Methods

Conversely, if the application's ability to perform specific tasks is limited, the attacker's objectives may not be fulfilled, and the scope of the damage can be minimized. As a result, it is inadvisable to remain [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1094

Cyber Vulnerabilities and Threats

It is the cyber defense specialist's task to remain aware of the latest threats and issues in security so that they can prepare for potential attacks and be ready to respond to them.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1104

Implementation of the Boston’s Smart City Concept

Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 608

The Fourth Industrial Revolution

The First Industrial Revolution transformed the lives of people from the handicraft and agricultural economy to the one that was dominated by machines and industries.
  • Subjects: AI
  • Pages: 12
  • Words: 3362

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 974

Information Age, Future, and Big Data

According to Blecker et al, the prevalence of heart failure has been on the rise despite the few reported cases of admissions and readmissions in hospitals.
  • Subjects: Data
  • Pages: 2
  • Words: 600

Analysis of The Veteran Affairs Data Breach

The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 589

HindSight: Direct Encoding of Personal Interaction History

Finally, the two properties which are of the most relevance to the presented research: the extent to which history is directly tied to an object or recorded separately and whether history is tied to an [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1430

Business Information System

In order to ensure that no shortfall from the individual and collective ends of the personnel involved, the British Computer Society has developed a code of conduct as a criteria for membership that defines the [...]
  • Subjects: Applications
  • Pages: 7
  • Words: 1901

Proxy Fights: Definition, Factors and Implications

In a way, the phenomenon of a proxy fight can be viewed as the tool for reinforcing the strengths of the organization by creating a very strong and well-coordinated team of shareholders, who are willing [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 664

Power Source for Rovers

When choosing suitable types of power sources for a rover, it is necessary to define environmental conditions where it is expected to operate.
  • Subjects: Engineering
  • Pages: 5
  • Words: 679

Aerospace Toxicology: Flourinert

The current knowledge about this fluid should become the foundation for completing additional experimentations and researches to discover additional health, toxicological, and safety benefits and expand its possible applications in different heat exchange systems.
  • Subjects: Engineering
  • Pages: 1
  • Words: 279

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791

IoT Adoption and Cyber Awareness in Saudi Arabia

As the implementation of these cyber technologies penetrates the economic sector, there is a need to understand potential vulnerability for businesses to be attacked through the Internet and other networks.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 552

Acquiring Knowledge About Computers

One of the key features of A.I.U.'s learning platform is the use of the Gradebook. The best feature of the instant messaging tool is the fact that it is easy to install with no additional [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 1930

The Design Characteristics of an Airplane

Control defines the ability of an airplane to respond to the controlling actions of a pilot and the ability to produce the desired displacement of altitude in flight.
  • Subjects: Aviation
  • Pages: 2
  • Words: 540

Technological Innovations: Importance in Manufacturing

Innovation is the principled exploitation of ideas related to knowledge of those entering the industry as well as those moving out of the industry for the purpose of hastening modernization within the company and expansion [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1000

Security Components in Sporting Goods Stores

Components of security within an organization are comprised of a list of practices that can help an organization have better management of security and reduce the associated losses. The first and most important component of [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1351

Digital Control Systems: Digital Signal Processing

The second use of the digital filters is the "signal restoration" which is needed when there is distortion of a signal due to any reason like poor equipment quality or mishandling of devices etc.in this [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1459