Tech & Engineering Essay Examples and Topics. Page 19

5,887 samples

Object-oriented Programming. Java and C++ Programming

Besides, software engineers are required to understand the languages that are suitable for object orientation since not all languages can implement the OO programming concepts. In other words, classes are used to implement the concept [...]
  • Subjects: Programming
  • Pages: 4
  • Words: 1227

Aviation Weather: Atmospheric Pressure

On the other hand, temperature changes the air pressure; therefore, altimeters mostly indicate an altitude different from the true altitude. Thus, the altitude of an airport is the most meaningful altitude to a pilot.
  • Subjects: Aviation
  • Pages: 2
  • Words: 549

Information Security Services for Business

Authenticity: This means that the information security system of an organization should be able to validate data, communications, as well as, transactions and the parties involved so as to ensure that they are genuine.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 924

The Website Caters to Technology Enthusiasts

Unfortunately when it comes to looking for archived articles that are beyond product reviews such types of information require a bit more searching however the website does provide a search bar near the site header [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 725

Effect of Sea Water and Corrosion on Concrete

On the other hand, substantial tautness, for instance due to meandering will shatter the tiny firm pattern, ending up in fracturing and disjointing of the concrete.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4001

Professional Issues in Computing & Education

It is not permissible to presume that computer can act as substitute to a teacher; on the contrary, this device is just a tool that can facilitate both instructors and learners.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 2009

Automotive Manufacturing Engineering Processes

Most of the gangs live in the small towns and cities and for this reason, the authorities in such towns and cities must learn the best strategies to use in trying to eradicate the influence [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1384

Defining and Designing a Network

A computer network is a system of interconnected computers that allows sharing of resources and information. A computer network is made of both hardware and software.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1099

Pipeline Control During Oil Transportation

Controlling and managing pipeline lines during oil transportation is necessary to ensure that any leakage or unnecessary termination of the oil is avoided.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 917

Reproductive Technologies: Ways of Regulation

For instance, through the use of in-vitro fertilisation IVF, assistance has now been given to those who have problems in conception; also the use of PDGs prevents conception of severely abnormal children.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1572

Collecting Online Data With Usability Testing Software

Although the internet can be hardly described as an emergent phenomenon, the growth of its social significance as well as the emergence of new social interactions can be considered as a considerable factor in the [...]
  • Subjects: Data
  • Pages: 11
  • Words: 3683

Honeypots: Network Decoys

Honeypots "consists of computers data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information that would be of value [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 858

Technological Advancement: Automatic Vehicles

In the past decades, people complained of the quality of vehicles that used to be produced. Advancement in technology has led to most of the operations being mechanized.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2251

Disruptive Technology Overview

Information technology, as the most important branch of the industry in the era of the informational society, has been quickly developing since the middle of the 20th century, and the inventions made by researchers in [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1123

Positive Influence of AI on Business

The majority of use cases are related to business and manufacturing, making it much easier for organizations to make sure that their improvements are beneficial to business [1].
  • Subjects: AI
  • Pages: 1
  • Words: 362

Optimal Paths for Autonomous Underwater Vehicles (AUVs)

What was described in the proposed video material reflects the urgent need for the intellectualization of automatic unmanned devices, namely the ability to independently build a route map depending on the obstacles encountered on the [...]
  • Subjects: Engineering
  • Pages: 1
  • Words: 283

Hierarchy of Data in the Video Store Database

A group of related fields, such as the video title's number, the name, the actor, the director, the runtime and the year of production, constitutes a record; a group of records of the same type [...]
  • Subjects: Data
  • Pages: 2
  • Words: 502

Course Practical Connection: Operations Security

A company should structure the management, information, owners, for instance, clients and suppliers, and users of the information correctly, to enhance the handling of both hard and soft copies. It exposes both the client and [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 863

Monetizing Web Portals Overview

For example, YouTube and Facebook present ads that show the products and services that are relevant to a certain customer. The existing intranets and extranets can be linked to the external services through cooperation with [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 274

Sifers-Grayson Company: The Cybersecurity Breach

Finally, the recommendations, as per the improvement of the incident response capability, are introduced to ensure the elimination of the identified drawbacks and the compliance of the engineering company with the security requirements presented by [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1380

Management Information Systems (MIS)

The advances in the evolution of devices and the achievement of a new stage of development critically impacts MIS and creates the basis for the emergence of multiple changes towards the achievement of better outcomes [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 573

The SerDes Jitter Data Communication

Fundamental jitter illustrations are defined as well as hypothesis required to comprehend the roll of the SERDES compounds in statistics linkage concert.
  • Subjects: Internet
  • Pages: 9
  • Words: 2644

Loyalty Cards and Privacy Relations

According to them, it is virtually impossible to guarantee that the data in question will not be stolen, and the only way to mitigate the risks is through digital privacy education.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 285

Examining the Human Activity Influence on the Earth

To be more specific, some of the most valuable contributions to maintaining life on the Earth imply the increased number of organizations and communities that aim to solve the existing environmental problems.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 308

The Problem of the Identity Theft

Identity theft is a unique problem that is presently affecting the experiences and goals of many individuals in different parts of the world.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1377

Technology and Its Impact on Education Process

Technology provides the opportunity to involve categories of students with different abilities and pace of learning in the process of progressive education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 349

Malware and Social Engineering Attacks

Social engineering attacks date back to the advent of the Internet, and before that, criminals were using the telephone to masquerade as trusted agents to obtain information.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1226

Airport Operations and Cargo Transportation

Considering the significant number of employees in an airport, and the importance of areas restricted for security reasons, staff identification is a crucial part of an airport's landside security.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Do Cellphones Cause Brain Cancer?

The reason for the worries is that cellphones emit RF energy that contains both electric and magnetic energy, and exposure to it may be unhealthy for a human being.
  • Subjects: Phones
  • Pages: 1
  • Words: 230

Leveraging Technologies to Stay Successful

For example, to stay successful with my studies, I need help with time management, and the Focus Keeper application is my solution.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 593

Acme Corp.: Designing a Better Computer Mouse

The approach that the company is taking toward the early stages of the development process is to only include design engineers and brainstorm ideas.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 558

The Big Data Analytics Methods

The graphical representation of data helps the users to identify patterns and understand the correlations, which are essential in making decisions.
  • Subjects: Data
  • Pages: 3
  • Words: 857

Modern Storage Technology: Data Compression

Data compression can be divided into two types lossless and lossy, with the former conserving all the data, and the latter strategically removing some of it.
  • Subjects: Data
  • Pages: 1
  • Words: 286

The Gold Airways Fleet Management

Providing fast service of equipment at the airport and launching passengers into the cabin will allow one to efficiently manage finances and increase the number of flights, which will reduce the price of tickets.
  • Subjects: Aviation
  • Pages: 1
  • Words: 351

Technologies: Buffer Overflow

The phenomenon of a buffer overflow attack is one of the more recent challenges to online security, which implies that the amount of incoming data exceeds the processing capabilities of a machine, thus causing extra [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Legal Driving Age Policy in the United States

In the following paper, the issue of changing the legal driving age in the United Stated in order to raise the level of safety on the roads will be examined.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1648

Advanced Information Systems: A BookMart

Nevertheless, a breach of security occurred in the company's systems, as a result of which customers' confidential data was posted on the company's website.
  • Subjects: Computer Security
  • Pages: 7
  • Words: 1893

Certification Authorities: Comodo, DigiCert, and Entrust

The innovative services are accompanied with the highest level of support to guarantee the client can fully unleash the probable of the online business. The achievement of programs is featured to Comodo company flexible service [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 395

The Dulles Corridor Metrorail Project

Adopting the corporate social responsibility idea in the implementation of the Dulles Corridor Metrorail project has a positive impact on the project team and the community in Washington and Northern Virginia.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2946

Emerging Digital Workplace Technologies and Organizational Change

Emerging technology in an organization usually leads to the disruption of the existing relationships and routines within the firm. The emerging technology has brought about tremendous changes within the operation of an organization, a fact [...]
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4136

Privacy and Smartphone Apps: Documentary Review

The documentary is about the privacy risks posed by the many apps that people are using on their smartphones. If a person is not ready to give access to the information the application wants, they [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 553

Aspects of Management of Technology

The research agenda revolves around the gaps affecting the adoption of TM in the service industry, and emerging opportunities, and offers directions for future research in the area.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2357

Aspects of the Cyber Kill Chain

The latter is needed to fulfill the objective of data mining and theft. The main idea behind it is to respond early to the attack instead of focusing on post-compromise phases and effects.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 554

Analysis of Cyber Kill Chain Causes

With the emergence of the Internet, the world has witnessed the arrival of cybersecurity threats that jeopardize both individual and organizational databases.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 588

Discussion of Coding of Qualitative Data

Coding will address questions of leadership in nursing, tendencies for the experienced professionals to continue education, and the need for a DNP degree in clinical practice.
  • Subjects: Data
  • Pages: 2
  • Words: 559

Online Platform Development: Rafeeq

The company is also catering the needs of the target customers in the most creative manner. The order received by the administration, which acknowledges the order with the restaurant and the customer.
  • Subjects: Applications
  • Pages: 1
  • Words: 1666

Cyber Kill Chain: Application and Utilization

Cyber Kill Chain means a sequence of steps that assist in tracing the phases of cyber-attack from the early investigation to the exfiltration of data. Delivery involves the transmission of the weapon to the target [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 925

Multimedia Use in Teaching

5
The main reason for easier conceptualization of the facts is the interaction and identification of images presented in videos and the ability of video to arouse imagination in the watchers.
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 1856

A Cyber Kill Chain Levels Description

Once the malware has been delivered onto the system, the malicious program will run on the host machine and initiate the intended attack.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 639

Samsung NX1000: Digital Camera Overview

The NX1000 is relatively small in size. This makes them it convenient for travelling. It has Light and darkness sensor features.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 363

The Impacts of Internet Telephony (VoIP)

Internet telephony has impacted many lives and has led to ethical, social, and political issues in the contemporary world. In a nutshell, internet telephony has impacted many lives in the ethical, social, and political facets [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 711

The Most Influential Force in Modern Society

Therefore, I believe that digital technology in general and social media, in particular, represent the most influential force that sets the tone for an individual's personal values.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 306

Computer Forensic Incident

All evidence should be collected in the presence of experts in order to avoid losing data as well as violating privacy rights.N.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 587

The Use of Technology in Teaching Practice

As to the possible revisions of the lesson plan, it is necessary to help students grasp the material more effectively and have a more positive attitude towards their wrong answers.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 386

Using Jing in Teaching

Jing is a free, screen casting and image capturing tool (TechSmith, 2013). It also grants marking up uses and wide sharing probabilities within a short time.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 210

Information and Communications Technology in Education

Moreover, many research projects started to investigate the benefits of MALL in learning the language. The research revealed women to be, on average more inclined towards mobile learning in perception and attitude.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1511

The Halpin and Relational Approaches

The relational approach, in turn, is a framework to adapt a database design to a real-world environment. Tying to the specific needs of the organization forms the basis for working on such a structure.
  • Subjects: Data
  • Pages: 1
  • Words: 278

The New Health Care Facility: Project Management

The project involves establishing a state-of-the-art healthcare facility within this country that will provide quality healthcare services to adults within the country.
  • Subjects: Project Management
  • Pages: 19
  • Words: 2709

Reconnaissance in a Cyber Kill Chain

There is a certain pattern for each crime, which includes reconnaissance of the target, delivery of weapons, installation, establishing a command and control channel, and accomplishing the mission - which is often the process of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 611

Pedagogical Considerations: M-Learning

M-Learning offers diversified learning and teaching environment. This form of learning has pedagogically connected the design of learning and device usability.
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 966

Automated Catering Management System

It is a key part of future improvement as this information can be stored in the system and processed to promote positive change.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1104

E-Government in New York City Public Education

The problem of inequality and disparities in the education of New York schools and the need to address it has many stakeholders due to the complexity of the education system.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 2534

Designing Enterprise Information Systems

I would first conduct an in-depth review of the employees' work processes and opinions to learn if EIS is lacking in any of these parameters.
  • Subjects: Data
  • Pages: 1
  • Words: 302

Optimizing Project Management in Interior Design

The post-occupancy evaluation is conducted through a series of walk-throughs and inspections to investigate the systems, subsystems, and elements of the building.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1160

Discussion of Metallography History

The mechanical properties of a material are heavily dependent on the microstructure of the material. Using these two methods, it becomes possible to determine the quality and properties of the material.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 295

The Impact of Artificial Intelligence on the Internet Users

In the past, the majority of studies were focused on quantitative indicators reflecting on the number of visits and similar information, whereas this approach is insufficient for predicting the outcomes of the above advancements.
  • Subjects: AI
  • Pages: 14
  • Words: 167

Issue of Self-Cyberbullying

In the first sentence, I have chosen to reject a comma before the article's title, however, it is appropriate there as well.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 479

Technology: Aspects of RAID System

This storage allows the combining of the benefits of RAID 0 and RAID 1, improving both the array's performance and recovering the data in case one of the disks used in the array fails.
  • Subjects: Data
  • Pages: 1
  • Words: 311

Protection of Students Online: Australia

When browsing various websites young users can be exposed to inappropriate information and can become victims of fraud.
  • Subjects: Technology in Education
  • Pages: 18
  • Words: 2470

Pros and Cons of Using CSS-Preprocessors

In addition, these preprocessors bring the basic features of a high-level programming language to CSS, such as the use of variables, loops, math operations, if-else constructs, and more advanced functionality, for example, for working with [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 618

Modern Technologies: Wireless Signals Into Energy

I love this article because it is beneficial and informative; it tells about the technology that in the near future may enter into daily use by people around the world.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 363

Computer Science Courses Project Management

Second, the selected independent reviewers analyze the proposal according to the set criteria and submit the information to the NSF. The project is crucial for the school and the community, as students currently do not [...]
  • Subjects: Project Management
  • Pages: 5
  • Words: 1512

CAQDAS: Software Programs Analysis

This paper provides concrete advantages and disadvantages of using qualitative software programs in general (CAQDAS).
  • Subjects: Applications
  • Pages: 10
  • Words: 2848

Digital Government Security Infrastructure Design Challenges

However, the practice has the same purpose in all sectors of application; evaluation and analysis of potential dangers that are likely to be realized in those settings and presenting the right strategies to combat the [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 954

Submerged Arc Welding

But in the case of welding, the by-products of the welding process can be hazardous to the health of the workers.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2010

Opinion About Web Site sedl.org and Teaching

However, it is also quite important to note that students usually have intellectual learning in such gatherings. In essence, cooperative learning is very instrumental in intellectual growth, personal and social development.
  • Subjects: Internet
  • Pages: 3
  • Words: 834

The Essence of Niche Networking

The use of LinkedIn in the work environment is recognized as a legitimate practice and the website can be used as a sign of a person's professionalism in a particular craft.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1582

JPL: Model of Innovation

The new JPL mission is divided into distinct stages (launch, cruise, descent-landing, and surface operations) that, in turn, include substages.
  • Subjects: Project Management
  • Pages: 4
  • Words: 562

Mind-Reading Shopping Cart Project

The cart will provide information on the selected products as well as customer reviews so that the user knows what product is worth buying.
  • Subjects: Applications
  • Pages: 4
  • Words: 209

LifeDecor: Decorate Your Empty Room Application

The social networking is especially important as the application Decorate Your Room is characterized by a high degree of connectivity, which is seen of its potential advantages.
  • Subjects: Applications
  • Pages: 14
  • Words: 1470

Hunting Netiquette Violations

This is a message attached to people's mails without their consent. An example of this violation is a word-for-word plagiarism.
  • Subjects: Internet
  • Pages: 2
  • Words: 430

LAN Network Diagram Overview

The twisted-pair cable is used in the given diagram, which is considered the most common type of cabling for LAN. In the given Network Diagram, the unshielded twisted-pair cable is used.
  • Subjects: Internet
  • Pages: 1
  • Words: 158

Evolution of Autonomous Driving Technology

The torpedo could travel hundreds of meters while maintaining underwater depth due to its pressurization system known as 'The Secret.' The Secret was a combination of hydrostatic and pendulum that gave the hydroplane stability to [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1357

Leaders’ Attitude Toward AI Adoption in the UAE

A lack of interest in the technology from managers shows that the UAE has no intentions to adopt artificial intelligence. Leaders who are willing to prioritize learning about artificial intelligence are in a better position [...]
  • Subjects: AI
  • Pages: 3
  • Words: 820

Digital Self-Harm: Causes and Interventions

Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2258

The Importance of Trust in AI Adoption

Hengstler et al.suggest that the best approach to take in enhancing trust in the use of AI is viewing the relationship between the company and the technology from a human social interaction perspective.
  • Subjects: AI
  • Pages: 5
  • Words: 1456