Tech & Engineering Essay Examples and Topics. Page 26

5,366 samples

Electric vs. Gasoline-Powered Cars

However, the positive impact of the electric automobiles on the economy in terms of the maintenance costs is likely overstated. Another aspect of operating an electric vehicle as opposed to the gasoline-powered one is their [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 894

Artificial Intelligence in Finland

The first major driver behind the development of AI technologies is the startup environment and the support of the scientific development of a given country.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 550

An Analysis of Statistics on Cybercrime and Fraud

The statistical data analysis can provide insights on the trends in the occurrence of the electronic crimes, the frequency of the incidents depending on the region, and help to classify the offences.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2020

Business security: IC Insider Threats

The most critical aspects that define an insider are access to the system, the ability to represent the system to outsiders, as well as the trust of the organization and knowledge.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 649

The Concept of Artificial Neural Networks

The concept of artificial neural networks as a method of imitating the functioning of the human brain is currently defined as "a tool for predicting and modeling the phenomena that is inspired by the human [...]
  • Subjects: AI
  • Pages: 1
  • Words: 292

PUBG: Positive Aspect of Negative Video Games

This increasing popularity of the multigenre computer world is reflected in the concerns of the world community about the potential harm to gamers.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 943

How To Create an Engaging Reddit Thread About Gaming

For example, you can start a discussion titled "Best Games to Play After Work " or "What is the Most Popular Game in Australia?" Next, you can think of topics that are especially interesting for [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 863

The Concept behind Spear Phishing

The example of how Russian groups are using spear-phishing to infiltrate European governments and media outlets is relatable and it underscores the pervasive nature of this technique.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1121

IPhone Product Life Cycle Analysis

The product life cycle is one of the most crucial methods describing the processes of development, introduction, growth, maturity, and decline of a product.
  • Subjects: Phones
  • Pages: 2
  • Words: 557

Importance Data Science in Business

Veracity refers to the degree of accuracy and precision in the analysis and interpretation of results, which is critical to decision-making and business development.
  • Subjects: Data
  • Pages: 5
  • Words: 1434

Reddit’s r/gaming Analysis

Most of the content is made up of various memes; there is also a discussion of video games, related news, and sharing of experience.
  • Subjects: Internet
  • Pages: 2
  • Words: 552

Lunar Energy: Formic Acid Case

Lunar Energy would like to make an offer to the hospital regarding the provision of energy in the form of formic acid.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 737

Smart Grid Technology: Chattanooga Electric Power Board

Considering the rapid growth of the modern technology-based society, the daily requirements of energy consumption are as well increasing. After a severe weather situation in 2012, the EBP reported that due to automation, its smart [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1538

Information Technology: The Impact of Paperless

Thus, this theory will be helpful for the proposal since it will facilitate the process of converting paper documents into a digital form. Therefore, this theory will promote the process of going paperless.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 380

Agricultural Sector: The Use of Drones

Thompson states that the application of drones in agriculture, specifically in the United Kingdom, can promote the enhancement of the crops and reduce the usage of pesticides.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 666

Main Challenges of Medical Technology Startups

Further, in the second part, the author draws attention to misunderstandings between developers of startups in the field of medical technology and representatives of public medical institutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 631

Technology Impact on Working in Modernity

The authors consistently and exhaustively study the scientific problem of the impact of technology on the organizational infrastructure and features of the workspace.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 648

The Assess the Legal Merits of a Contract Case

The development of in-app purchases in various apps and social platforms has become more evident at the beginning of the previous decade. In the case of the Lee family, the situation can be discussed through [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 549

Sunrise Life Skills Software Business

To ensure that the workability of the new proposed system, data sorting will be done where a particular task will be worked on, its requirements analyzed and matched with the core competencies to ensure effective [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1092

Future Innovation in the Energy Industry

The technological revolution of the 21st century will continue to shape the way people live now and in the future. Specifically, in the field of agriculture, technological innovation is likely to introduce precision in agriculture [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1133

The Role of Digital Technologies in Education

The interactive Mother's Day card and the story of a 13-year-old boy convey the idea of the importance of technology for an individual's development.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 937

Attraction of Investment for Robotization of Production

If a business is associated with simple routine tasks and much of the work is automated already, this decision is possible and even desirable for the reason the business owners and investors will benefit from [...]
  • Subjects: AI
  • Pages: 3
  • Words: 893

The Idea of Quantum Computing at D-Wave

The most important point about the idea of quantum computing at D-Wave is that the company quickly realized the marketing potential of it and took over the quantum computing market.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1150

Role of Manager in an Accounting Software

This allows one to configure the software to show only the categories that are relevant to one's particular business, making it more convenient to use.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1137

Natural Language Processing in Business

The introduction of the Turing Test in 1950 is often referred to as the very start of NLP and AI. When it comes to business, customer service and enterprise chatbots can probably be called the [...]
  • Subjects: AI
  • Pages: 8
  • Words: 1419

Internet Resources: Wcag 2.1 Guidelines

As it can be seen in Figure 24, there is a man's face and a small signature at the bottom of the poster. This is not following the principle stated in 1.3.
  • Subjects: Internet
  • Pages: 2
  • Words: 517

Geographical Information System and Machine Learning

Without the need for a more detailed discussion of the advantages and disadvantages of each method, it is essential to postulate that both DT and SVM have sufficient potential to improve flood modeling in hydrological [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2335

The Big Dig Project in Boston

While constructing the last missing link of the highway to connect the tunnel beneath the channel to interstate 90, the engineers encountered two critical problems, namely, the daily train moves and the soft soil beneath [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 554

The Effect of Student’s Online Visibility on Their Performance

The article primarily focuses on the disruptive aspect of read-only participants in an online learning community setting. The research problem is based on the fact that a student’s online visibility affects their performance, which inevitably influences the outcome of courses. There are two main research questions where the first one addresses whether online participation has […]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 277

UMRS Mobile Communications Center: Implementation Plan

To that end, it is first necessary to determine the scope of the project, and outline at the minimum: A minimum number of vehicles must be outfitted with the solution to be effective.
  • Subjects: Project Management
  • Pages: 3
  • Words: 865

OSHA: Death Caused by Ladder Falls

The first one is selecting the wrong type of ladder, which stems from the lack of understanding of essential tools. The most common cause of ladder accidents is the incorrect use of them.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 856

A Sampling Plan to Survey the Early iPad Adopters

At launch, four market segments are ripe prospects for the iPad: the Apple core of loyal users, current users of Kindle and other portable readers, those new to the portable reader market now swayed by [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 857

Marijuana Use May Double the Risk of Accidents for Drivers

According to the Department of Safety and Homeland Security, the number of Americans driving under the influence of illegal substances has risen drastically. The risk of a crash is also related to the number of [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 548

Performance Gap at eBay

Gathering large quantities of data is essential in maximizing the performance of eBay. The collection of large amounts of data makes it more challenging to analyze and make meaning out of it.
  • Subjects: Data
  • Pages: 4
  • Words: 1142

Michael Dell and Andy Grove: A Comparison

One of the challenges and resistance that Dell faced was in the application of the customer-based strategy in the organization since some of the managers who opposed this approach forced their views on the customer.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 852

Whether Network Neutrality Should Continue or Not

Network neutrality, also in a short form referred to as net neutrality, is more of a freedom call for the internet users not to be restricted by internet service providers on the web content they [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 538

Do We Need the NSA?

The citizens of the United States took the news of the NSA spying on them with shock and discomfort. When the whistleblower broke the news that the NSA was running an illegal program that was [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 863

The Conveyor System in American Culture

Conveyors were first used in the 19th century when Thomas Robins began his creation that in the end led to the development of the Conveyor Machines. The invention of the conveyor belt revolutionized the entire [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 826

Digital Transformation: E-Services in the UAE

In the United Arabs Emirates, there has been a major transformation in the adoption of electronic services aimed to improve the quality of service delivery.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 900

Information Security Issues Concerning Limewire LLC

LimeWire is software that enables the downloading and sharing of services on the P2P network, with features that enable individual and corporate users to inadvertently provide confidential information to criminals.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 810

Developing WBS: Project Management

From these, she would be able to objectively identify the processes and programs that need to be developed to ensure the successful implementation of the activities of the tournament.
  • Subjects: Project Management
  • Pages: 2
  • Words: 545

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Problems of the Existing Gaming Industry

This creates a barrier in the communication between a generation that is game-centered and people who do not spend as much time in front of the screen. Younger people are more susceptible to the influence [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 574

A Project Delivery Methods

We believe that the chosen project delivery method is one of the main keys to success in the process of a project's realization.
  • Subjects: Project Management
  • Pages: 3
  • Words: 601

The Willingness of Organizations to Deal With Incidents

An analysis of the development of an incident-response policy revealing processes like the formulation of an incident-response team, a disaster recovery process, and a plan for business continuity at Gem Infosys to minimize network downtime [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 652

Systematic Terminological Investigation on Passive House

Identification of different terms is important, especially in two cases, when the language where the term is taken is a second one for a student and when the term is taken from the specific field [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 843

Research Tools Used by Computer Forensic Teams

Computer Forensics is a branch of digital forensics which is used in "identifying, preserving, recovering, analyzing and presenting facts and opinions about the information".
  • Subjects: Other Technology
  • Pages: 2
  • Words: 536

The Functioning of a DVB-T Tuner With the Nebula DigiTV Software

In order to understand the different factors that affect the functioning of the DVB-T tuner when used together with the Nebula DigiTV software, a clear depiction of the features, characteristics and capabilities of both hardware [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 587

Maintenance and Establishment of Computer Security

This is so, especially since the application of technology in delivering services is now a basic need to any organization that desires to compete favorably in the market economy, given the rise and move towards [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 615

Excel Software Utilization in Business Setting

The sheet which is available in Excel makes it easier to record all the business revenues and expenditures. Excel has a function called goal to seek which makes it easier for the task to be [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 541

Aerodynamic Controls of a Typical Aircraft

The drag created as a result of the occurrence of a lift is called induced drag, while the other type of drag, parasitic drag, is not related to the lift.
  • Subjects: Aviation
  • Pages: 3
  • Words: 842

Technical Communication: Public Key Infrastructure

In case of data leak or loss, the company is squarely responsible for it as there are key staff assigned to monitor and control the data. In conclusion, data and information security are key and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 598

Breach of Private Information: Air Canada

This includes; The firm should encourage high moral and ethical Practices in relation to protection of unauthorized access of corporate information.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 543

Economics of Information Systems

The only tangible benefit that the learning institution will experience is the annual estimated revenue from outsider students registering to learn French in the institution.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1124

Storeroom Technology and Issuing Systems

Besides, because of the population growth the amount of necessary goods and services increases permanently. This work is devoted to the analysis of functions of one of these systems.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Understanding Emerging Technologies

The main aim of its introduction was to develop voice recognition software that could aid in communication and business transactions in United Arab Emirates.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1189

Triple Constraint in the View of Work Environment

After interpreting their findings, the authors conclude that there is "a significant relationship between the components of work environment and the triple constraint," which is consistent with other previously conducted research.
  • Subjects: Project Management
  • Pages: 2
  • Words: 559

Data Integrity and Management

According to the guidelines published by Medicines and Healthcare products Regulatory Agency, the universal, suitable for any type of research data, integrity requirements consist of the following points: Establishing data criticality and inherent integrity risk...[with] [...]
  • Subjects: Data
  • Pages: 2
  • Words: 619

Non-Contact Driver Drowsiness Detect System

The Non-contact Driver Drowsiness Detect System is a product which can be embedded within the structure of a car to measure the level of drowsiness of a driver.
  • Subjects: Engineering
  • Pages: 3
  • Words: 877

Cybersecurity and Social Networks

Recently, there have been many trends the security of information and communication technologies, in particular, due to the expansion of the reach of social media which increase the size of social network, which has taken [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 2895

Human Evolution: Electronic Immortality

This, and the idea that the human race cannot evolve any further in the traditional sense lead to assuming that the next step would be to transcend beyond human bodies of flesh to something much [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 288

Basic Models of Accident Causation

The implication of the sequential technique is that establishing the root cause of the accident will help prevent it from reoccurring.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 618

Are We Too Much Reliant on Technology

The modern world is full of all sorts of novelties in the science, technology, and medicine spheres. Today, figuratively speaking, a person can get news from the pocket, connect to a network that exists only [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 842

Enterprise Key Management for Slack Communications

The enterprising key management policy for Slack Communications will require the company to use technologies for encrypting sensitive and confidential data for protecting the integrity of customers as well as employees.
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2780

The Concept of Network Security Information

The main concerns of security are maintaining the functionality of the network environment, securing privacy and providing the integrity of confidential information.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 581

Machines Chances of Replacing Humans at Work

Both of these beliefs have a right to exist, and although it would be difficult to describe every way modernization influences the ways of employment, and eventually will influence the everyday life the society was [...]
  • Subjects: Robotics
  • Pages: 5
  • Words: 1394

China as Perpetual Cyberthreat to the United States

Contrary to the ongoing speculation about the Islamic State of Iraq and Syria being the major threat to the US cyberspace, China is still considered the United States' biggest cyber enemy.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 839

Using Free Antivirus Programs: Pros and Cons

So, you should always remember that it is of great importance to keep your computer and personal data safe by installing an antivirus program.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 534

Various Types of Cybercrime

Cybercrime is any kind of offense committed with the help of a computer and the internet. The first one is attacking the hardware or software of a PC.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 577

The Hidden Lab Where Bankcards Are Hacked

The key goal of the institution is to prevent hacking activities aimed at bank cards and increase the security of payments and cash withdrawals. The wood base of the robot's structure helps to decrease the [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 553

Cloud-Based Solutions for Individuals and Businesses

There are a number of cloud-based solutions that enable users to process and store data using remote servers. The Achilles heel of these solutions is that they are vulnerable to a security breach.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 558

Thermal Imaging and Its Industrial Use

Moreover, the paper also looks into the importance of thermal to the industries that use them and to the extent to which thermal imaging has revolutionized progressed firms.
  • Subjects: Engineering
  • Pages: 11
  • Words: 3145

Controlling Fully Automated Cockpit Systems

Human operators often question the commands of an automated system because one cannot control the "indirect" mode changes of the system."Indirect" mode changes impede teamwork between operators and automated systems."Automation surprises" is a term used [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 576

IBM SPSS Software Analysis

IBM SPSS is one of the statistical packages used for analyzing and interpreting data. Validity has two distinct sections namely the research section and the degree to which a test measures some data.
  • Subjects: Programming
  • Pages: 2
  • Words: 568

Information Technology in Operations Management

In spite of the difficulty to automate driving in roads with heavy traffic as correctly observed by Levy and Murnane, the challenge of building a computer that can substitute for human perception and pattern matching [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 823

The Design of the Communication System

This will ensure that in case of failure, the base station is notified and corrective signals are sent to the weather station.
  • Subjects: Programming
  • Pages: 7
  • Words: 1952

Development in Communication and Its Impact on Human Life

The agricultural sector has always strived to meet the high population growth demand for food and this has influenced the need to have the best communication tools to enhance the exchange of information from agricultural [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 575

The Trade in Data as Business

The trade in data has in the recent past become a booming business considering the fact that it runs unregulated and it is done without the consent of the victims.
  • Subjects: Data
  • Pages: 2
  • Words: 559

Warmley Conservation Area Analysis

The prominent features in the area consist of the Warmley House, gardens, Clock Tower, Windmill Tower, Icehouse, the Grotto, the Mound, and a former 13 acre lake called Echo pond.
  • Subjects: Internet
  • Pages: 4
  • Words: 1192

Information Literate Society Issues

Information literacy skills that are taught by librarians are important to students in their jobs and lives, and this makes the task of visiting a library for students an inevitable one.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 613

Connectivism as a Learning Theory

From this point, it is important to discuss assumptions of Connectivism regarding the nature of learning, the nature of learners, and the character of knowledge among other aspects from several perspectives, including the views of [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1129

Singapore Airlines Mission, Image, and Purposes

To sum up, SIA's activities in the implementation of new technologies, customer service innovation and excellence policies, and human resources development secure the company in the highly competitive industry.
  • Subjects: Aviation
  • Pages: 3
  • Words: 875

Visible Spectrum: Discovery, Development, and Applications

The visible spectrum was discovered in the 17th century and studied throughout the late 18th and early 19th centuries as technology advanced, and today knowledge of the visible spectrum has found use in many areas [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 552

Materials Comparison About Packaging

Although the forests are cut down to manufacture paper-based containers, they are recyclable, and compared to wood, paper's recycling rate is the highest among recyclable materials, so it is more friendly to the environment than [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1124

Are We Scientific Experts Now?

This way of thinking is similar to what can be seen in the book "Are We All Scientific Experts Now" by Harry Collins wherein instead of a deteriorating belief of the public in the capabilities [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 737

Cloud-Based Systems: History, Applications, and Prospects

The main theme of the paper is the potential of cloud manufacturing and the current developments in that field. The article also describes the history and the current state of the cloud-based systems.
  • Subjects: Cloud Computing
  • Pages: 8
  • Words: 2200

Risk Formulating Information Systems Strategies and Plans

I know of a company that has failed to implement the updated security protocol after the security team failed to communicate the importance of the changes and the other employees protested the banning of certain [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 901

Project Management: Masdar City Project Success

To determine whether the Masdar City site was a success it is important to evaluate what the goals of the project were, if it succeeded at them and if it met the criteria above.
  • Subjects: Project Management
  • Pages: 3
  • Words: 921

The Hacker Subculture Nature and Allure

The Internet connected people all around the globe and changed the face of the society forever. However, with the development of the computer networks, the meaning of the term started to change.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1697

Dubai Wi-Fi: Connectivity and Communication in Public Spaces

Given the general goal of the project, the associated objectives include locating the public places where Wi-Fi connection will be provided and locating the activities for the feasibility study that will prove the potential of [...]
  • Subjects: Project Management
  • Pages: 27
  • Words: 4396