Tech & Engineering Essay Examples and Topics. Page 26

5,902 samples

Advanced Antenna Technology

To date, antennas are available in a variety of sized, shapes, and provide for a number of operations; their geometry is designed by the use of varying level of electromagnetic computational functions.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2136

Advent of Information Technology in Business

This article also talks about the need to tie together the bonds of a business manager and an IT manager. Based on this article and the analysis I have made, I personally believe that each [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Cybercrime and Legislation Margin

Originally, there are several types of cybercrimes: Against persons Against Business and Non-business organizations Crime targeting the government The fact is that all the three types are described in the legislation, nevertheless, it should be [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 512

Hackers’ Role as Information Security Guardians

This article points out the fact that information technology has enabled increased efficiency, increased effectiveness, and an increased amount of IT-enabled processes within the personal and industrial fields.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1966

Engineering: Engineering Disaster Analysis

The collapse of Schoharie Creek Bridge in 1987 was as a result of error in the engineering design, and one of the major causes of the collapse of the Schoharie Creek Bridge was the excessive [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2454

Telecommunications Design Project: From 1G to 3G

The initial activity for this communication system is the installation of a suitable number of base stations to be put up into operation to form a network The report covers the different aspects in location [...]
  • Subjects: Other Technology
  • Pages: 27
  • Words: 7185

Tech & Engineering: System on Chip

The team has realized that for the design reuse to succeed, they must have a clear method of developing macros that are easily integrated into the system-on-chip.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2328

Fluorescent High Bay Technology

The improved technology of fluorescent lamps and the invention of new HIF fixtures have composed the most cost effective choice as fluorescent lighting for indoor areas like warehouses, big retail stores, factories and athletic facilities.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1123

Peer-to-Peer Computing Technology

Complexity This is another important issue the developers of the routing have to keep in mind. Napster is an important application of the peer to peer routing systems.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2863

Video Distribution Systems

The decoding of the various distributions of streams is accomplished through the use of a Windows media player, thereby enabling the users to not only watch these streams, but also listen to them.
  • Subjects: Programming
  • Pages: 2
  • Words: 691

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1686

Social Media Within Academic Library Environment

The main focus of these web pages is interactive information sharing among users, user centered design of the page that can be modified and edited by the user and whatever changes are made to the [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 3102

Comparison UML and Modelscope

The main objective of library system implementation is to support the readers as well as the management in the process of borrowing and reserving books.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1043

Maintaining GNP by Using Smart Technology

A consumer survey by the Centers for Disease Control and Prevention has shown that a majority of North Americans are not aware of the infectious diseases they are at risk neither of nor of the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

The Monitor Convergence and the Television Consumption

Explain what those are used for, history on what development on TV and monitor and how the 2 have in common and how they are different The monitor and the television are both viewing devices [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 1366

Kinds of IP-Servers and Their Characteristics

The IP addresses allocation in the new IT infrastructure model for Acme is based on the guidelines and policies of the IANA and ARIN in relation to IP addresses allocation as well as the routing [...]
  • Subjects: Internet
  • Pages: 20
  • Words: 1751

Digital Certificates Generation

The article features the research findings by Internet Security experts from different countries enlisting USA, Switzerland and Netherlands who have experiment with the functionalities of a popular internet security encryption method known as MD5 to [...]
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1675

Automation of Accounting and Monitoring Procedures

Therefore, the integration of IT into auditing functions contributes to the promptness in transactions' ascertainment processes and the validation of the accounting and financial information prepared from relevant records.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 913

Technologies and Barriers in Higher Education

This paper uses the relevant scholarship and argues that the high interactivity offered by digital technology has the opportunity to enhance the quality of higher education for students regardless of their age or technological prowess.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1592

Are Internet and Google Making Us Stupid?

In the past, people used to do their research in libraries and labs, but nowadays, with the advent of the internet, Google has become an easy source of information for almost all questions.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 391

Daily Workouts App Evaluation

I will be discussing the free version in terms of the features which it has to offer, the functions of the app, and its overall convenience.
  • Subjects: Applications
  • Pages: 3
  • Words: 873

Certification Related to Electrical Engineering

In addition, in the future, the license will be an advantage in earning the clients' trust and the ability to take a superior level of responsibility for the employer.
  • Subjects: Engineering
  • Pages: 2
  • Words: 638

DMCA and Unlawful Cloud-Based Filesharing Issue

Nevertheless, it is hardly applicable to cloud-based filesharing of copyrighted products, as the only reason one can store the copy is to replace the original in case of damage and loss.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1450

Control Philosophy. Variable Speed Drives

The second one is the management and provision of adequate and stable pressure connected to all the identified stakeholders in the project.
  • Subjects: Engineering
  • Pages: 1
  • Words: 396

What’s Hot in Digital Media

The digital marketing practices continue to evolve with companies and individuals who uphold innovation achieving its benefits. Only organizations and individuals who follow innovative digital methods that provoke diverse engagement can flourish in the market.
  • Subjects: Internet
  • Pages: 2
  • Words: 461

Researching Capacitive Touch Sensor

The closeness of electrodes in a single-touch electrode in the two layers determines the coordinate system. The operation of a capacitive touch sensor is based on a capacitor's response to change in capacitance.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1504

Top Companies in the Virtual Reality Industry

Currently, Google is the leading search engine company, and there are signs that the company might emerge as one of the heavyweights in the virtual reality industry.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 626

COBIT5 vs. ITIL4 in Cybersecurity

Significantly, ITSM is the alignment of information systems and enterprise IT services with business and the needs of the customer who is the end-user.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2318

The Problem of Childrens’ Cyberbullying

The rapid spread of the Internet and children's easy access has facilitated the promotion of traditional bullying by granting it an opportunity to expand from the school grounds into the vast and complex cyberspace, which [...]
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2075

The New Software Implementation

The new software had to organize the work of three teams: the PM team, equipment reliability team, and information and communications technology team.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 576

Overview of Computer Languages – Python

A computer language helps people to speak to the computer in a language that the computer understands. Also, Python Software Foundation, which is a not-for-profit consortium, directs the resources for the development of both Python [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 818

Benefits of WPA3 over WPA2 Analysis

The attackers' purpose is to obtain the credentials of a Wi-Fi network. It appears to have the name of the Wi-Fi network the user is trying to connect to.
  • Subjects: Internet
  • Pages: 3
  • Words: 860

MTC: Strategic Use of Technology

Due to the necessity to introduce more rigid control tools for the target setting, it will be necessary to incorporate innovative tracking and monitoring tools as the means of supervising the production process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 611

How Customer Evolution Has Affected Airlines

To prove this point, it will review the recent changes in the characteristics and behaviours of airline passengers and the measures that airlines have taken in response.
  • Subjects: Aviation
  • Pages: 7
  • Words: 1958

Laser Drilling: Extracting Oil and Gas

The conventional oil production method is still used today, where the oil, by means of traditional pumping and drilling methods, is extracted from the ground to reservoirs. The conventional drilling process is drilling the reservoir [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1603

Systems Thinking in IT Projects

Systems thinking is an approach to system analysis based on the interconnectedness of the elements in a system. It states that the component of the system acts differently in and out of the system.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 888

Social Engineering Attack and Response Methods

The detectives interrogated each of the employees in order to eliminate the risk of information leaks inside the company. Hence, the underestimation of cyber-attacks is a major mistake made by the enterprise's management, as it [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 547

The Rick Racer Amusements Web Portal’s Requirements

The purpose of the system is to improve operations, processes, and collaboration. The portal will implement functionalities to forward information to the relevant stakeholders for quicker and informed decision-making.
  • Subjects: Applications
  • Pages: 15
  • Words: 5046

The Community Impact of the Schiphol Airport

The Schiphol Airport in Amsterdam, which is one of the busiest in the world, is an excellent example of how to benefit the community while minimising the damage.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3000

Delay of New Intel CPU Problem Overview

The public anticipated the new chip to be the main innovation of the year, yet the defects identified were revealed in time.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 563

Google Scholar, Microsoft Academic and Worfram Alpha

In addition to Microsoft Academic and Google Scholar, there are other information sources, such as Wolfram Alpha, that try to convince academicians of the validity of the information that they constitute.
  • Subjects: Internet
  • Pages: 7
  • Words: 1987

Infrastructure for IT Security Policy: Remote Workers

The purpose of the research paper is to analyze the security policy for remote workers in Dubai, define its requirements and methods of protection, and give recommendations regarding the existing security holes.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1130

Are Digital Natives a Myth or Reality?

The tremendous change with the appearance of progressive technology is believed to give birth to inherently new technological and cognitive skills in people born in the era of technology.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 634

Human Factor in Enabling and Facilitating E-Crimes

For instance, the utilization of networked internet technologies, surfing on public computers, voluntary and involuntary disclosure of personal information, and deviant online activities, exacerbate the occurrence of e-crimes. Conclusively, the conduct and interests of the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 558

Automation and the Future of Jobs

The suggested paper offers the analysis of two different opinions on the issue presented by Autor and Rotman in their articles, discussion of their arguments, and reflection on the future of people in the age [...]
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2776

Technology Ruins One-on-One Interaction and Relations

Last but not least is the contribution of social media to constructing unrealistic ideas of relationships, which makes a lot of people depressed and dissatisfied with what they have.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 571

Layout Planning: Operations Management

The cellular layout is the type of facility planning where the equipment is grouped according to the performed function for a set of similar products.
  • Subjects: Project Management
  • Pages: 1
  • Words: 289

How AI Increases Web Accessibility

Some of the innovative organizations also create different interpretations of the language and the subtitles of the disabled's answers. AI-based innovations allowed impaired or partially disabled users to recognize the content of the images and [...]
  • Subjects: AI
  • Pages: 3
  • Words: 876

Visa Tap to Phone Program Overall Review

As opposed to the data on a magnetic-stripe card, the data involved in an NFC transaction is encrypted and dynamic, meaning it's constantly changing.
  • Subjects: Applications
  • Pages: 5
  • Words: 1035

Shaping the Future of UAE Through Digital Tools

The definition for the term sustainability is the efforts to reduce the environmental and other risks that seriously jeopardize the human species and to ensure the survival of future generations.
  • Subjects: Technology Effect
  • Pages: 12
  • Words: 840

Thinking, Learning, and Literacy in the Internet Age

However, one can present a counterargument to the given statement by claiming that it is not reading that is negatively affected by the web, but rather the style or format of the activity.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 559

Highs and Lows of the COVIDSafe App in Australia

However, this decision has negatively impacted the economy, and the government has opted for the COVIDSafe app meant to speed up the process of locating exposed and infected individuals. The only challenge is that the [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1093

Museum Construction Stakeholder Analysis

The purpose of this report is to justify the existence of the project and discuss the various stakeholders that will be involved in it.
  • Subjects: Project Management
  • Pages: 8
  • Words: 2213

Dubai Metro Project Stakeholders

The first group of stakeholders that should be considered for the Dubai Metro Project is the city community, who will be the ones using the system.
  • Subjects: Project Management
  • Pages: 2
  • Words: 589

Cyberspace and the Identity of Users

For the past decade, Sherry Turkle has been engaging in a clinical and ethnographic study to explore people's representation on the Internet and how they negotiate the "real".
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 594

The Opportunities of VR Technology for Life

Presence is a sense of being inside a space that is created by VR with the help of tools that allows the users to interact with and feel within a simulated world.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1105

Deadlock Avoidance Top Secret, Inc.

The main issues of the work of headquarters are the reason for the business-related challenges including technological lag, the urgent need to switch to modern hardware, and security vulnerabilities.
  • Subjects: Internet
  • Pages: 2
  • Words: 562

Theoretical Approaches to Rootkits

The findings of the research demonstrate how to protect computers from rootkits, expose the legitimate uses of rootkits, and predict the future of rootkit computer security.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 988

Using IoT Low-Cost Sensors for Smallholder Farms

It is, therefore, essential for the users and IoT systems and devices developers to collectively ensure that the internet and the users of such components are not exposed.
  • Subjects: Internet
  • Pages: 8
  • Words: 2508

Internet Retail: Economy and Future Trends

The primary function of the internet is to share information. The penetration of the internet to many parts of the world has not bolstered competition due to these factors.
  • Subjects: Internet
  • Pages: 4
  • Words: 1100

Financial Crime and Employment

Sensitizing staff to be more cautious when clicking on hyperlinks or emails with COVID-19 content and enhancing the security of VPN services would ensure the security of data and reduce this threat.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 842

Internet Function and Potential in a Democratic Society

This situation is comparable to the Medieval Age before the introduction of printing in the 1440s. The church and the courts monopolized books, and the population had no chance to learn an alternative opinion on [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1733

The Concept of Artificial Intelligence

While it may take a significant amount of time for humans to process the information provided by the customers, AI can do that in an accurate and organized way.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 260

Digital Divide: Homework Gap in Society’s 21st Century

Despite the near-complete Internet penetration of some countries, not all social groups have the chance to equally enjoy the opportunities that the rise of the digital age presents. One of the aspects that require closer [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 327

Critical Infrastructure Vulnerability and Protection

In this session-long project, the topic of interest is the critical infrastructure protection (CIP) of information and communication in the United States. Specifically, the report will assess and analyze the overall development of the US’s critical information infrastructure protection (CIIP). Internet technologies during its existence have created both a host of new opportunities for economic […]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 541

Engineering Hardware Identification

However, the growth of innovative design has enabled people to invest in ways of making natural materials stronger quality and in different types, which are used in a wide range of applications like the construction [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1139

Introduction to Information System

In order for ordinary people to keep up with the times and for various companies to stay competitive, it is of vital importance to know why and how to use electronic devices, as well as [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 664

Electronic Monitorin

I believe that benefits outweigh the drawbacks as electronic monitoring is associated with fewer expenses to the government and less restriction to the offender in comparison with incarceration.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 321

Screen Readers’ Evolution and Their Current Usability

The study results constitute a linear account of the instruments, technologies, and events that caused the advance of assistive technologies and screen readers specifically, outlining their history.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2091

Technology and Progress Interconnection

The roots of the idea of the power of science and technology lie in the philosophy of the Enlightenment in the era of the First Industrial Revolution.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1763

BioWare Video Game Project Management

For example, Dragon Age: Inquisition, the third installment of the company's flagship series, switched to the Frostbite engine used by most of the EA games and succeeded in delivering the product despite the technical difficulties [...]
  • Subjects: Project Management
  • Pages: 9
  • Words: 2505

Technological Progress and Human Perfection

This process, undoubtedly, has both positive and negative sides, and Condorcet wrote about the role of progress in human life in the 19th century.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 274

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

The Technological Singularity

The other possible form of the Intelligence formulation is the combination of the abilities of a machine to 'think', to collect data, and to adapt [10].
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1709

Integrated Computation and Communication

Industrial edge computing, which requires more time, can optimize data, computation, and storage resources through smart gateways and local clouds. As a supplement, industrial edge computing can ensure interoperability, self-optimization, and reduction of industrial clouds' [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 265

Updating the Metro Network of Adelaide: Audit Project

The project proposal on the construction of the Adelaide Metro Railway road is well-organized in terms of the delivery of the information concerning the planning and execution.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1130

Whats Mean Robotics Welding

Epping and Zhang define robotic welding as the utilization of programmable systems and tools that mechanize and automate the way welding is done.
  • Subjects: Robotics
  • Pages: 2
  • Words: 601

Factors that Affect Control Valve Pressure Drop

Moreover, the pressure drop in a fluid that goes through a control valve is subject to numerous factors, relating to the design of aperture, type of fluid, piping system of fluid, temperature, and pressure.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1174

Blockchain and Bitcoin Technology

The literature review presented below describes the possible future trends of blockchain and bitcoin technology, future trends of its application, and the potential implementation in the United Arab Emirates private and government sectors.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1694

XBRL: Review

The main goal of HTML format is the presentation of data in an easy to understand and straightforward way. The benefit of iXBRL is that it provides structured and clear information to regulators and analysts.
  • Subjects: Programming
  • Pages: 2
  • Words: 603

Medical Informatics: Final Project Case Study

3
The project exceeded the budgeted cost by 20%, hence the supervision team has to source the required funds or stop the execution of the project.
  • Subjects: Project Management
  • Pages: 2
  • Words: 662

Pricing of Video Streaming Services

Similar to other platforms, users are offered access to a library of television shows and films, as well as original content produced by Amazon, following the footsteps of Netflix.
  • Subjects: Internet
  • Pages: 9
  • Words: 2582

Individual Business Opportunity Canvas: Clothing’s Alive

The key objective of the analysis is to study the trends in the current market for men's and women's clothing and the characteristics of consumer behaviour of men and women in the clothing market, significant [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 2011

History of Radio and Guglielmo Marconi

Marconi demonstrated the usability of the radio for military and naval purposes and launched the company to develop and distribute radio communication services and equipment.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 336

Radio Technology Invention and Development

In 1906 he broadcasted a Christmas concert, including his voice and violin play with the help of 400-foot towers to the ships of the United Fruit Company, which were equipped with Marconi's radios. In 1922 [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 397

Artificial Intelligence in Smart Farming

Owing to the development of the smart farming concept and precision agriculture, farmers all over the world gained a chance to implement digital tech to their daily operations and utilize AI to support some of [...]
  • Subjects: AI
  • Pages: 8
  • Words: 2204

Very-Low-Frequency Testing of Cables

The current paper aims to review the key elements of the VLF cable testing and outline the potential areas of development that could be addressed by the experts in the field to improve the quality [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1815

Wireless Networks Integration in Business

This paper will discuss the main categories of wireless networks that have the potential to be used in business, as well as the pros and cons of such a solution.
  • Subjects: Internet
  • Pages: 2
  • Words: 405

About IT Security of Institutions

The security check discovered that autologin is configured on this computer, meaning that anyone who is able to obtain access to the computer can retrieve all the computer's contents.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2216

Libra by Facebook Analysis

The simplicity of the mechanism is a valuable aspect that explains the intention of Facebook management to include this system as a single platform for paying for goods and services via the social network.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2211

Electric vs. Gasoline-Powered Cars

However, the positive impact of the electric automobiles on the economy in terms of the maintenance costs is likely overstated. Another aspect of operating an electric vehicle as opposed to the gasoline-powered one is their [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 894

Artificial Intelligence in Finland

The first major driver behind the development of AI technologies is the startup environment and the support of the scientific development of a given country.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 550

Business security: IC Insider Threats

The most critical aspects that define an insider are access to the system, the ability to represent the system to outsiders, as well as the trust of the organization and knowledge.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 649

The Influence of Memes on Our Lives

After the third grade, I went to my grandparents on vacation in the village, and I planned to have fun with my friends and spend time in the fresh air in the countryside.
  • Subjects: Internet
  • Pages: 6
  • Words: 1683

The Concept of Artificial Neural Networks

The concept of artificial neural networks as a method of imitating the functioning of the human brain is currently defined as "a tool for predicting and modeling the phenomena that is inspired by the human [...]
  • Subjects: AI
  • Pages: 1
  • Words: 292

PUBG: Positive Aspect of Negative Video Games

This increasing popularity of the multigenre computer world is reflected in the concerns of the world community about the potential harm to gamers.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 943

How To Create an Engaging Reddit Thread About Gaming

For example, you can start a discussion titled "Best Games to Play After Work " or "What is the Most Popular Game in Australia?" Next, you can think of topics that are especially interesting for [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 863

The Concept behind Spear Phishing

The example of how Russian groups are using spear-phishing to infiltrate European governments and media outlets is relatable and it underscores the pervasive nature of this technique.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1121