Tech & Engineering Essay Examples and Topics. Page 20

5,894 samples

LAN Network Diagram Overview

The twisted-pair cable is used in the given diagram, which is considered the most common type of cabling for LAN. In the given Network Diagram, the unshielded twisted-pair cable is used.
  • Subjects: Internet
  • Pages: 1
  • Words: 158

Evolution of Autonomous Driving Technology

The torpedo could travel hundreds of meters while maintaining underwater depth due to its pressurization system known as 'The Secret.' The Secret was a combination of hydrostatic and pendulum that gave the hydroplane stability to [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1357

Leaders’ Attitude Toward AI Adoption in the UAE

A lack of interest in the technology from managers shows that the UAE has no intentions to adopt artificial intelligence. Leaders who are willing to prioritize learning about artificial intelligence are in a better position [...]
  • Subjects: AI
  • Pages: 3
  • Words: 820

Digital Self-Harm: Causes and Interventions

Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2258

The Importance of Trust in AI Adoption

Hengstler et al.suggest that the best approach to take in enhancing trust in the use of AI is viewing the relationship between the company and the technology from a human social interaction perspective.
  • Subjects: AI
  • Pages: 5
  • Words: 1456

Cutting-Edge Technologies: Blockchain and AI

The users can sign in their accounts and transact to another user and the blockchain records the transaction which is viewed by other users. It is difficult to collect taxes and trace malicious activities in [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1397

The Information Technology Security Strategy

Three excellent data practices are confidentiality, availability, and integrity: Confidentiality refers to the protection of confidential data by restricting access to it for those who have been trusted. The COBIT arrangement includes contractual contracts in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 875

Delta Glider Plane’s Technical Design

This report reviews the overall technical design of the Delta Glider Plane in detail in terms of the applicability of the aerodynamic models and the purpose of the electronic components of the overall system.
  • Subjects: Aviation
  • Pages: 3
  • Words: 895

Creating and Implementing Do-Type Learning Activities

Therefore, we will discuss on how to create an email address using a Google account and using that email address to create a Facebook account and store data using the two accounts. We need to [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 965

Cybersecurity Necessity and Benefits

Second, the exploration of human factors in the framework of cyber-security can assist in resolving the issues of understanding a defender's cognitive state, possibilities for automation, and an attacker's subjective traits.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1131

Qatar Airways Dinner Party: The Project

The project manager will have the overall responsibility of assigning roles to ensure that all aspects of the project are on schedule for the dinner party.
  • Subjects: Project Management
  • Pages: 7
  • Words: 724

Budget Manager App’s Market and Persona

Overall, the budgeting manager app will help Nick understand his expenses, determine what items he spends the most money on and plan his expenses a month ahead. The use of a budgeting manager app will [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 932

Online Voting and Corporate Social Responsibility

The primary problem in this research is the insecurity in the online voting system due to the increase of cybercrimes. It is essential to comprehend the related dangers as political up-and-comers progressively go to the [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1947

A Proposal of COVID-19 Proof App

The development of the electronic vaccination and the testing app would positively affect the strategies to control the COVID-19 pandemic while also enhancing the economic restoration.
  • Subjects: Applications
  • Pages: 2
  • Words: 920

Autonomous Un-Guided Vehicle Usage

A prototype of an autonomous un-guided vehicle designed on the basis of Himoto Rock Crawler RCF-8 chassis was created to test its capabilities in various environments.
  • Subjects: Robotics
  • Pages: 5
  • Words: 818

Toyota Land Cruiser GXR: Model Description

The region and the use of the car will guide the owner on the required level of protection. The ballistic level of protection depends on the owner of the vehicle's requirements.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1118

Artificial Intelligence in Drone Technology for Farming

Automated drones fitted with spraying features are used in the monitoring of agricultural processes and crops to schedule tasks and expeditiously address the observed issues throughout plant life.
  • Subjects: Robotics
  • Pages: 11
  • Words: 3010

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 55
  • Words: 14365

Remote Sensing Monitoring the Ground Water Quality

The overall view of the water quality index of the present study area revealed that most of the study area with > 50 standard rating of water quality index exhibited poor, very poor and unfit [...]
  • Subjects: Other Technology
  • Pages: 20
  • Words: 7005

How Animation Can Teach Children History

The development of interest in the subject will be greatly enhanced if there is a close partnership between the animators and teachers in designing the desired syllabus with the acquaintance of the tools of animation.
  • Subjects: Technology in Education
  • Pages: 20
  • Words: 7334

VMware Server Virtualization Solution

This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
  • Subjects: Computer Science
  • Pages: 45
  • Words: 13587

Novel Framework to Assist the Novice

The failure mode for SS-FMEA is thus represented as a violation of logical relations in the combination of elements that are specific for each system.
  • Subjects: Other Technology
  • Pages: 12
  • Words: 3472

Firefighting Methods, Technology Availability in Qatar

The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
  • Subjects: Other Technology
  • Pages: 36
  • Words: 8540

Network Security: Why Is It Important?

Network safety, regardless of the company size, is one of the most important things to remember when operating over the Web, local area network or other technologies.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 656

Artificial Intelligence in Self Driving Cars

The field of Artificial intelligence is one of the newest areas in science and engineering. When explained in terms of thinking critically, AI is the desired outcome of human effort to make computers think, portrayed [...]
  • Subjects: AI
  • Pages: 11
  • Words: 3114

Boston Dynamics’ Spot Robot Dog

Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
  • Subjects: Robotics
  • Pages: 4
  • Words: 357

Business Report: Demand for Electricity

For instance, contemporary concerns about global warming and the 'carbon footprint' of the UK power industry virtually dictate official attention to matters of fuel in use and the national volume of electricity consumption.
  • Subjects: Engineering
  • Pages: 36
  • Words: 3495

Opportunity Assessment (OPASS)

This opportunity assessment is about the potential opportunities in the field of remanufacturing the laser toner industry in the USA. That is, the cartridges are designed to carry toners.
  • Subjects: Engineering
  • Pages: 9
  • Words: 3550

Cyber Theft: Security Measures for Organizations

Relative to this fact, Mukhopadhyay et al.say that the uptake of technology and the prominence of the Internet of Things, which is a network of objects that communicate with each other, has increasingly exposed companies [...]
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 7690

Project Initiation Document and Measuring Project Success

5
In project management, the project initiation document is crucial as it outlines the project's scope, power, and criteria to measure the project's success. A project is said to be successful if the aim for its [...]
  • Subjects: Project Management
  • Pages: 7
  • Words: 2500

The Importance of Database Design

It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
  • Subjects: Data
  • Pages: 2
  • Words: 649

Acoustic and Electric Recordings

At the moment, it develops even faster; however, one of the crucial factor for this development was the transition from the acoustic to the electric recording.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 567

Analysis of Packet Sniffing Aspects

By definition, packet sniffing is the process of gathering data packets passing through a particular network for analysis, regardless of how the packets are addressed.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 888

Importance of Designing an Interface Model

The process goes through five stages: the discovery of what is required by the user, the analysis, designing and prototyping, and, finally, the implementation.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1826

The Resilience of Austria to the Threat of Cyber-Attack

The study will focus on examining the resilience of Austria to the threat of cyber-attack. The significance of the study will help in contributing to the literature about cybercrime and ways to respond to the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 489

The Boundaries of Integrating Machines Into Human Life

In the third stage, with the advent of the Internet, PC, and multiple interactive devices, the focus was shifted to the perception of the mechanism as an autopoietic system in a social setting.
  • Subjects: Robotics
  • Pages: 7
  • Words: 1954

The Vasa Launch Disaster: Causes and Prevention

The building of the Vasa Ship construction exposed the project to several risks leading to the vessel's capsizing. The king authorized the craft's launch despite previously identified stability challenges, and the ship capsized in front [...]
  • Subjects: Project Management
  • Pages: 1
  • Words: 362

Ethics of Information and Personal Data Protection

The right to privacy and confidentiality of correspondence is a constitutional right, and violation of this jeopardizes the law. Thus, access to confidential information should be provided to law enforcement agencies only in case of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1043

Google Technologies That Are Currently Developing

One of the areas that Google invests in and promotes is self-driving automobiles. The company is working with the Renewable Energy Buyers Alliance to promote legislative changes that simplify corporate procurement of wind and solar [...]
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2681

Relation Between Technology and Data Gathering

For instance, the tool can collect data on what a customer has chosen and predict what they may want to buy. No traditional data collection method can be that effective in the gathering of customer [...]
  • Subjects: Data
  • Pages: 1
  • Words: 322

Internet Explorer: Software Reviewing

Internet explorer is available with the Microsoft operating systems interfaces. There are various important components on the example of an internet files window.
  • Subjects: Applications
  • Pages: 16
  • Words: 1239

Telecommuting: Benefits and Disadvantages

As the research states, telecommuting generally allows people to work from home, which reduces office space and, as a result, the expenses associated with the operating costs and the amount of energy use.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 976

Cloud Computing in Business

Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
  • Subjects: Cloud Computing
  • Pages: 13
  • Words: 880

Phishing Victimization on Internet Banking Awareness

Therefore, the study is meant to determine and evaluate consumer susceptibility to e-banking victimization through phishing attacks. Subsequently, the study will be designed to evaluate the effectiveness of phishing victimization training to E-banking consumers.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4145

Tabletop Centrifuge Manual

The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Dangers of Logic and Artificial Intelligence

The following are the dangers of logic and artificial intelligence when applied in various areas. The last danger of logic and artificial intelligence relates to autonomous weapons.
  • Subjects: AI
  • Pages: 5
  • Words: 1239

Aviation Crisis Management Toolkit

The impacts on these organisations vary considerably depending on the type of crisis, the severity of the crisis and the way in which the organisation has planned for, and responded to the crisis.
  • Subjects: Aviation
  • Pages: 9
  • Words: 3593

Big Data and Artificial Intelligence

Of course, there are cons associated with deep fake technology; its core concept is to create a fake so good that it can be considered authentic.
  • Subjects: AI
  • Pages: 1
  • Words: 286

ARC-IT Communications View Description

Architecture Reference for Cooperative & Intelligent Transportation terms the protocol stacks as solutions and consists of a collection of standards to regulate the communication process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 570

Internet Hacking and Cybersecurity Conundrum Analysis

Many people have gained access to computer systems, the Internet, and related products and services, leading to the emergence of cyber-related threats. Cybersecurity improvements are vital to the continuous developments in information technology, national security, [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 824

Internet Hacking and Cybersecurity Conundrum

Therefore, the increasing number of attacks during the pandemic could be handled with the help of machine learning and have the numerous human workers assigned to less crucial tasks that actually require human judgment.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1206

Health and Environment: The Impact of Technology

This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
  • Subjects: Technology Effect
  • Pages: 20
  • Words: 5816

Solid Mechanics: The Two Main Components of the System

However, considering the bending stress of the RHS element, and the sizes of CHS, the loads will be mainly concentrated in the place of RHS and CHS contact, and the square of the contiguity will [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1090

Impact of Cybercrimes on Business

The SolarWinds cyber-raid is described as the most sophisticated and the most significant assault in the world. The vulnerabilities in SolarWind and its customers, such as Microsoft can lead to the loss of millions to [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 878

Nuclear Energy: High-Entropy Alloy

One of the tools for reducing the level of greenhouse gas emissions is the development of nuclear energy, which is characterized by a high degree of environmental efficiency and the absence of a significant impact [...]
  • Subjects: Engineering
  • Pages: 12
  • Words: 4165

Dubai WI-Fi Management

The purpose of this undeniably ambitious project is to make major changes to the social and technological environment of Dubai.
  • Subjects: Project Management
  • Pages: 10
  • Words: 1404

Creating a Database in Microsoft Access

During the database design, it is not possible to delete the primary key fields in the datasheet view until one changes to the design view, since the primary key represents a unique identification field of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 758

Manifestation of Strategic Cultures in Cyber Conflict

The discourse in strategic culture can be traced back to over four decades ago where it incited a renewed thinking of both the origins of the concept of strategy and the strategic choices in politics.
  • Subjects: Cyber Security
  • Pages: 27
  • Words: 7451

Presenting E-Learning and Design Concepts

E-learning is the use of electronic technologies to create learning experiences (Horton, 2012). It is a broad definition of the field of using technology to deliver learning.
  • Subjects: Technology in Education
  • Pages: 15
  • Words: 1081

The Latest Cyber Defense Methods

Conversely, if the application's ability to perform specific tasks is limited, the attacker's objectives may not be fulfilled, and the scope of the damage can be minimized. As a result, it is inadvisable to remain [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1094

Cyber Vulnerabilities and Threats

It is the cyber defense specialist's task to remain aware of the latest threats and issues in security so that they can prepare for potential attacks and be ready to respond to them.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1104

Implementation of the Boston’s Smart City Concept

Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 608

Protecting Organizations From Hackers and Thieves

Relative to this fact, Mukhopadhyay et al.say that the uptake of technology and the prominence of the Internet of Things, which is a network of objects that communicate with each other, has increasingly exposed companies [...]
  • Subjects: Cyber Security
  • Pages: 28
  • Words: 7649

Front End Web Development Job Market Reflection

The 2% of large businesses in Vancouver offer minimal growth prospects for front-end web development entry-level graduates because the experienced staff have a competitive advantage and satisfy the demand.
  • Subjects: Programming
  • Pages: 3
  • Words: 797

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1175

Information Age, Future, and Big Data

According to Blecker et al, the prevalence of heart failure has been on the rise despite the few reported cases of admissions and readmissions in hospitals.
  • Subjects: Data
  • Pages: 2
  • Words: 600

Analysis of The Veteran Affairs Data Breach

The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 589

Cyber Threats: The Safety of Individuals

Even though people are aware of the problem and consider it to be serious, almost nothing is done to prevent the appearance of the problem.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 268

POD Placement Factors

The size of the population is what might affect the ability of the local emergency agencies to respond to an incident.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 313

Robotics and Artificial Intelligence in Organizations

Otherwise, cognitively complex tasks and those demanding emotional intelligence will be performed by humans, with the support of robotics and AI. Therefore, this study speaks of the importance of employee trust in AI and organization.
  • Subjects: AI
  • Pages: 7
  • Words: 2005

IPad Product and Apple’s Project Management

The iPad's project management reveals how the attention to the details and high level of requirements helped a company build a revolutionary product.
  • Subjects: Project Management
  • Pages: 2
  • Words: 663

HindSight: Direct Encoding of Personal Interaction History

Finally, the two properties which are of the most relevance to the presented research: the extent to which history is directly tied to an object or recorded separately and whether history is tied to an [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1430

Business Information System

In order to ensure that no shortfall from the individual and collective ends of the personnel involved, the British Computer Society has developed a code of conduct as a criteria for membership that defines the [...]
  • Subjects: Applications
  • Pages: 7
  • Words: 1901

Implementing Skype over Ip Phone

The paper uses decision tree calculation to do a financial analysis of the using IP phones and Skype, and then we provide an argument for using IP phones over Skype.
  • Subjects: Applications
  • Pages: 2
  • Words: 772

George Winslow: Preparing for Next-Gen HD

This is mostly the norm for recording of TV programs but the author argues that Blu-Ray offers a higher resolution of 1080p which improves the quality of the media.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 547

Electromagnetic Compatibility Testing and Its Design

The sink and the source act as radio antennae where the electromagnetic waves emanating from the source crosses the open space and is received by the sink, McFee, S and Giannacopoulos, D.
  • Subjects: Engineering
  • Pages: 3
  • Words: 988

WebEx Web Conferencing and Online Meeting Services

In common with other providers of multimedia conferencing, WebEx services can be used for any number of participants from a 1:1 to a full event conference linking many thousands of people.
  • Subjects: Applications
  • Pages: 4
  • Words: 2087

Particle Swarm Optimization: Definition

Particle swarm optimization (PSO) is an artificial intelligence (AI) or a computational method for getting solutions to problems through maximization and minimization of numeric.
  • Subjects: AI
  • Pages: 10
  • Words: 349