Tech & Engineering Essay Examples and Topics. Page 22

4,441 samples

Technologies and Barriers in Higher Education

This paper uses the relevant scholarship and argues that the high interactivity offered by digital technology has the opportunity to enhance the quality of higher education for students regardless of their age or technological prowess.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1592

Hot-Mix Asphalt and Portland Cement Concrete

The purpose of this paper is to compare and contrast the two materials based on their properties, requirements, production, and the use in road construction.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 639

Daily Workouts App Evaluation

I will be discussing the free version in terms of the features which it has to offer, the functions of the app, and its overall convenience.
  • Subjects: Applications
  • Pages: 3
  • Words: 873

Certification Related to Electrical Engineering

In addition, in the future, the license will be an advantage in earning the clients' trust and the ability to take a superior level of responsibility for the employer.
  • Subjects: Engineering
  • Pages: 2
  • Words: 638

Control Philosophy. Variable Speed Drives

The second one is the management and provision of adequate and stable pressure connected to all the identified stakeholders in the project.
  • Subjects: Engineering
  • Pages: 1
  • Words: 396

What’s Hot in Digital Media

The digital marketing practices continue to evolve with companies and individuals who uphold innovation achieving its benefits. Only organizations and individuals who follow innovative digital methods that provoke diverse engagement can flourish in the market.
  • Subjects: Internet
  • Pages: 2
  • Words: 461

Researching Capacitive Touch Sensor

The closeness of electrodes in a single-touch electrode in the two layers determines the coordinate system. The operation of a capacitive touch sensor is based on a capacitor's response to change in capacitance.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1504

Top Companies in the Virtual Reality Industry

Currently, Google is the leading search engine company, and there are signs that the company might emerge as one of the heavyweights in the virtual reality industry.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 626

The New Software Implementation

The new software had to organize the work of three teams: the PM team, equipment reliability team, and information and communications technology team.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 576

Overview of Computer Languages – Python

A computer language helps people to speak to the computer in a language that the computer understands. Also, Python Software Foundation, which is a not-for-profit consortium, directs the resources for the development of both Python [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 818

The Importance of Coding Analysis

In the survey conducted by the World Forum, about 91% of the employers involved in the study revealed the need for new staff with relevant technical proficiencies, and 51% reported the regular hiring of freelancers [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1111

Mobile App Development Career Speech

On the other hand, mobile app development might be a tedious task, which requires superior analytical skills and mastery of programming languages. In conclusion, mobile app development is a fascinating and rewarding career.
  • Subjects: Applications
  • Pages: 2
  • Words: 772

MTC: Strategic Use of Technology

Due to the necessity to introduce more rigid control tools for the target setting, it will be necessary to incorporate innovative tracking and monitoring tools as the means of supervising the production process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 611

How Customer Evolution Has Affected Airlines

To prove this point, it will review the recent changes in the characteristics and behaviours of airline passengers and the measures that airlines have taken in response.
  • Subjects: Aviation
  • Pages: 7
  • Words: 1958

Systems Thinking in IT Projects

Systems thinking is an approach to system analysis based on the interconnectedness of the elements in a system. It states that the component of the system acts differently in and out of the system.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 888

Social Engineering Attack and Response Methods

The detectives interrogated each of the employees in order to eliminate the risk of information leaks inside the company. Hence, the underestimation of cyber-attacks is a major mistake made by the enterprise's management, as it [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 547

Information Technologies and Disaster Management

In this article, Sakurai and Murayama present examples of the application of information technology in various stages of disaster management, including preparedness, recovery, response, and risk reduction.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 434

The Community Impact of the Schiphol Airport

The Schiphol Airport in Amsterdam, which is one of the busiest in the world, is an excellent example of how to benefit the community while minimising the damage.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3000

Delay of New Intel CPU Problem Overview

The public anticipated the new chip to be the main innovation of the year, yet the defects identified were revealed in time.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 563

Google Scholar, Microsoft Academic and Worfram Alpha

In addition to Microsoft Academic and Google Scholar, there are other information sources, such as Wolfram Alpha, that try to convince academicians of the validity of the information that they constitute.
  • Subjects: Internet
  • Pages: 7
  • Words: 1987

Infrastructure for IT Security Policy: Remote Workers

The purpose of the research paper is to analyze the security policy for remote workers in Dubai, define its requirements and methods of protection, and give recommendations regarding the existing security holes.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1130

Human Factor in Enabling and Facilitating E-Crimes

For instance, the utilization of networked internet technologies, surfing on public computers, voluntary and involuntary disclosure of personal information, and deviant online activities, exacerbate the occurrence of e-crimes. Conclusively, the conduct and interests of the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 558

Automation and the Future of Jobs

The suggested paper offers the analysis of two different opinions on the issue presented by Autor and Rotman in their articles, discussion of their arguments, and reflection on the future of people in the age [...]
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2776

How AI Increases Web Accessibility

Some of the innovative organizations also create different interpretations of the language and the subtitles of the disabled's answers. AI-based innovations allowed impaired or partially disabled users to recognize the content of the images and [...]
  • Subjects: AI
  • Pages: 3
  • Words: 876

Visa Tap to Phone Program Overall Review

As opposed to the data on a magnetic-stripe card, the data involved in an NFC transaction is encrypted and dynamic, meaning it's constantly changing.
  • Subjects: Applications
  • Pages: 5
  • Words: 1035

Shaping the Future of UAE Through Digital Tools

The definition for the term sustainability is the efforts to reduce the environmental and other risks that seriously jeopardize the human species and to ensure the survival of future generations.
  • Subjects: Technology Effect
  • Pages: 12
  • Words: 840

Thinking, Learning, and Literacy in the Internet Age

However, one can present a counterargument to the given statement by claiming that it is not reading that is negatively affected by the web, but rather the style or format of the activity.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 559

Cyberspace and the Identity of Users

For the past decade, Sherry Turkle has been engaging in a clinical and ethnographic study to explore people's representation on the Internet and how they negotiate the "real".
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 594

The Opportunities of VR Technology for Life

Presence is a sense of being inside a space that is created by VR with the help of tools that allows the users to interact with and feel within a simulated world.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1105

Theoretical Approaches to Rootkits

The findings of the research demonstrate how to protect computers from rootkits, expose the legitimate uses of rootkits, and predict the future of rootkit computer security.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 988

Internet Retail: Economy and Future Trends

The primary function of the internet is to share information. The penetration of the internet to many parts of the world has not bolstered competition due to these factors.
  • Subjects: Internet
  • Pages: 4
  • Words: 1100

Financial Crime and Employment

Sensitizing staff to be more cautious when clicking on hyperlinks or emails with COVID-19 content and enhancing the security of VPN services would ensure the security of data and reduce this threat.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 842

Internet Function and Potential in a Democratic Society

This situation is comparable to the Medieval Age before the introduction of printing in the 1440s. The church and the courts monopolized books, and the population had no chance to learn an alternative opinion on [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1733

Critical Infrastructure Vulnerability and Protection

In this session-long project, the topic of interest is the critical infrastructure protection (CIP) of information and communication in the United States. Specifically, the report will assess and analyze the overall development of the US’s critical information infrastructure protection (CIIP). Internet technologies during its existence have created both a host of new opportunities for economic […]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 541

Electronic Monitorin

I believe that benefits outweigh the drawbacks as electronic monitoring is associated with fewer expenses to the government and less restriction to the offender in comparison with incarceration.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 321

Technology and Progress Interconnection

The roots of the idea of the power of science and technology lie in the philosophy of the Enlightenment in the era of the First Industrial Revolution.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1763

The Technological Singularity

The other possible form of the Intelligence formulation is the combination of the abilities of a machine to 'think', to collect data, and to adapt [10].
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1709

Integrated Computation and Communication

Industrial edge computing, which requires more time, can optimize data, computation, and storage resources through smart gateways and local clouds. As a supplement, industrial edge computing can ensure interoperability, self-optimization, and reduction of industrial clouds' [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 265

Whats Mean Robotics Welding

Epping and Zhang define robotic welding as the utilization of programmable systems and tools that mechanize and automate the way welding is done.
  • Subjects: Robotics
  • Pages: 2
  • Words: 601

Blockchain and Bitcoin Technology

The literature review presented below describes the possible future trends of blockchain and bitcoin technology, future trends of its application, and the potential implementation in the United Arab Emirates private and government sectors.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1694

Pricing of Video Streaming Services

Similar to other platforms, users are offered access to a library of television shows and films, as well as original content produced by Amazon, following the footsteps of Netflix.
  • Subjects: Internet
  • Pages: 9
  • Words: 2582

Individual Business Opportunity Canvas: Clothing’s Alive

The key objective of the analysis is to study the trends in the current market for men's and women's clothing and the characteristics of consumer behaviour of men and women in the clothing market, significant [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 2011

Radio Technology Invention and Development

In 1906 he broadcasted a Christmas concert, including his voice and violin play with the help of 400-foot towers to the ships of the United Fruit Company, which were equipped with Marconi's radios. In 1922 [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 397

Artificial Intelligence in Smart Farming

Owing to the development of the smart farming concept and precision agriculture, farmers all over the world gained a chance to implement digital tech to their daily operations and utilize AI to support some of [...]
  • Subjects: AI
  • Pages: 8
  • Words: 2204

Managing the Cyber Intelligence Mission

To manage the risk in the future, equities should be reconciled, and resources should be allocated as per the collective decision of the personnel.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 580

About IT Security of Institutions

The security check discovered that autologin is configured on this computer, meaning that anyone who is able to obtain access to the computer can retrieve all the computer's contents.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2216

Libra by Facebook Analysis

The simplicity of the mechanism is a valuable aspect that explains the intention of Facebook management to include this system as a single platform for paying for goods and services via the social network.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2211

Electric vs. Gasoline-Powered Cars

However, the positive impact of the electric automobiles on the economy in terms of the maintenance costs is likely overstated. Another aspect of operating an electric vehicle as opposed to the gasoline-powered one is their [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 894

An Analysis of Statistics on Cybercrime and Fraud

The statistical data analysis can provide insights on the trends in the occurrence of the electronic crimes, the frequency of the incidents depending on the region, and help to classify the offences.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2020

The Influence of Memes on Our Lives

After the third grade, I went to my grandparents on vacation in the village, and I planned to have fun with my friends and spend time in the fresh air in the countryside.
  • Subjects: Internet
  • Pages: 6
  • Words: 1683

The Concept of Artificial Neural Networks

The concept of artificial neural networks as a method of imitating the functioning of the human brain is currently defined as "a tool for predicting and modeling the phenomena that is inspired by the human [...]
  • Subjects: AI
  • Pages: 1
  • Words: 292

The Influence of Robots and AI on Work Relationships

In the early 20th century, Taylor's work focused on production management and labor efficiency, which led to the attention of managers to the problems of selection, the motivation of employees, and their training.
  • Subjects: AI
  • Pages: 3
  • Words: 903

Agricultural Sector: The Use of Drones

Thompson states that the application of drones in agriculture, specifically in the United Kingdom, can promote the enhancement of the crops and reduce the usage of pesticides.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 666

Main Challenges of Medical Technology Startups

Further, in the second part, the author draws attention to misunderstandings between developers of startups in the field of medical technology and representatives of public medical institutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 631

Technology Impact on Working in Modernity

The authors consistently and exhaustively study the scientific problem of the impact of technology on the organizational infrastructure and features of the workspace.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 648

The Assess the Legal Merits of a Contract Case

The development of in-app purchases in various apps and social platforms has become more evident at the beginning of the previous decade. In the case of the Lee family, the situation can be discussed through [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 549

Future Innovation in the Energy Industry

The technological revolution of the 21st century will continue to shape the way people live now and in the future. Specifically, in the field of agriculture, technological innovation is likely to introduce precision in agriculture [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1133

Natural Language Processing in Business

The introduction of the Turing Test in 1950 is often referred to as the very start of NLP and AI. When it comes to business, customer service and enterprise chatbots can probably be called the [...]
  • Subjects: AI
  • Pages: 8
  • Words: 1419

Internet Resources: Wcag 2.1 Guidelines

As it can be seen in Figure 24, there is a man's face and a small signature at the bottom of the poster. This is not following the principle stated in 1.3.
  • Subjects: Internet
  • Pages: 2
  • Words: 517

The Big Dig Project in Boston

While constructing the last missing link of the highway to connect the tunnel beneath the channel to interstate 90, the engineers encountered two critical problems, namely, the daily train moves and the soft soil beneath [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 554

The Effect of Student’s Online Visibility on Their Performance

The article primarily focuses on the disruptive aspect of read-only participants in an online learning community setting. The research problem is based on the fact that a student’s online visibility affects their performance, which inevitably influences the outcome of courses. There are two main research questions where the first one addresses whether online participation has […]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 277

OSHA: Death Caused by Ladder Falls

The first one is selecting the wrong type of ladder, which stems from the lack of understanding of essential tools. The most common cause of ladder accidents is the incorrect use of them.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 856

Marijuana Use May Double the Risk of Accidents for Drivers

According to the Department of Safety and Homeland Security, the number of Americans driving under the influence of illegal substances has risen drastically. The risk of a crash is also related to the number of [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 548

Performance Gap at eBay

Gathering large quantities of data is essential in maximizing the performance of eBay. The collection of large amounts of data makes it more challenging to analyze and make meaning out of it.
  • Subjects: Data
  • Pages: 4
  • Words: 1142

Michael Dell and Andy Grove: A Comparison

One of the challenges and resistance that Dell faced was in the application of the customer-based strategy in the organization since some of the managers who opposed this approach forced their views on the customer.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 852

The Conveyor System in American Culture

Conveyors were first used in the 19th century when Thomas Robins began his creation that in the end led to the development of the Conveyor Machines. The invention of the conveyor belt revolutionized the entire [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 826

Digital Transformation: E-Services in the UAE

In the United Arabs Emirates, there has been a major transformation in the adoption of electronic services aimed to improve the quality of service delivery.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 900

Problems of the Existing Gaming Industry

This creates a barrier in the communication between a generation that is game-centered and people who do not spend as much time in front of the screen. Younger people are more susceptible to the influence [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 574

The Willingness of Organizations to Deal With Incidents

An analysis of the development of an incident-response policy revealing processes like the formulation of an incident-response team, a disaster recovery process, and a plan for business continuity at Gem Infosys to minimize network downtime [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 652

Systematic Terminological Investigation on Passive House

Identification of different terms is important, especially in two cases, when the language where the term is taken is a second one for a student and when the term is taken from the specific field [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 843

Research Tools Used by Computer Forensic Teams

Computer Forensics is a branch of digital forensics which is used in "identifying, preserving, recovering, analyzing and presenting facts and opinions about the information".
  • Subjects: Other Technology
  • Pages: 2
  • Words: 536

Excel Software Utilization in Business Setting

The sheet which is available in Excel makes it easier to record all the business revenues and expenditures. Excel has a function called goal to seek which makes it easier for the task to be [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 541

Technical Communication: Public Key Infrastructure

In case of data leak or loss, the company is squarely responsible for it as there are key staff assigned to monitor and control the data. In conclusion, data and information security are key and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 598

Breach of Private Information: Air Canada

This includes; The firm should encourage high moral and ethical Practices in relation to protection of unauthorized access of corporate information.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 543

Economics of Information Systems

The only tangible benefit that the learning institution will experience is the annual estimated revenue from outsider students registering to learn French in the institution.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1124

Understanding Emerging Technologies

The main aim of its introduction was to develop voice recognition software that could aid in communication and business transactions in United Arab Emirates.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1189

Data Integrity and Management

According to the guidelines published by Medicines and Healthcare products Regulatory Agency, the universal, suitable for any type of research data, integrity requirements consist of the following points: Establishing data criticality and inherent integrity risk...[with] [...]
  • Subjects: Data
  • Pages: 2
  • Words: 619

Cybersecurity and Social Networks

Recently, there have been many trends the security of information and communication technologies, in particular, due to the expansion of the reach of social media which increase the size of social network, which has taken [...]
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 2895

Human Evolution: Electronic Immortality

This, and the idea that the human race cannot evolve any further in the traditional sense lead to assuming that the next step would be to transcend beyond human bodies of flesh to something much [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 288

Basic Models of Accident Causation

The implication of the sequential technique is that establishing the root cause of the accident will help prevent it from reoccurring.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 618

Are We Too Much Reliant on Technology

The modern world is full of all sorts of novelties in the science, technology, and medicine spheres. Today, figuratively speaking, a person can get news from the pocket, connect to a network that exists only [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 842

Enterprise Key Management for Slack Communications

The enterprising key management policy for Slack Communications will require the company to use technologies for encrypting sensitive and confidential data for protecting the integrity of customers as well as employees.
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2780

The Concept of Network Security Information

The main concerns of security are maintaining the functionality of the network environment, securing privacy and providing the integrity of confidential information.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 581

Machines Chances of Replacing Humans at Work

Both of these beliefs have a right to exist, and although it would be difficult to describe every way modernization influences the ways of employment, and eventually will influence the everyday life the society was [...]
  • Subjects: Robotics
  • Pages: 5
  • Words: 1394

College’s Database Purpose and Entities

The main purpose of a database is to collect and organize data. Also, it helps the college to keep track of students' activities and interests, and, thus, shows what is better for them and what [...]
  • Subjects: Data
  • Pages: 2
  • Words: 672

Various Types of Cybercrime

Cybercrime is any kind of offense committed with the help of a computer and the internet. The first one is attacking the hardware or software of a PC.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 577

Cloud-Based Solutions for Individuals and Businesses

There are a number of cloud-based solutions that enable users to process and store data using remote servers. The Achilles heel of these solutions is that they are vulnerable to a security breach.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 558

Thermal Imaging and Its Industrial Use

Moreover, the paper also looks into the importance of thermal to the industries that use them and to the extent to which thermal imaging has revolutionized progressed firms.
  • Subjects: Engineering
  • Pages: 11
  • Words: 3145

Controlling Fully Automated Cockpit Systems

Human operators often question the commands of an automated system because one cannot control the "indirect" mode changes of the system."Indirect" mode changes impede teamwork between operators and automated systems."Automation surprises" is a term used [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 576

IBM SPSS Software Analysis

IBM SPSS is one of the statistical packages used for analyzing and interpreting data. Validity has two distinct sections namely the research section and the degree to which a test measures some data.
  • Subjects: Programming
  • Pages: 2
  • Words: 568