Tech & Engineering Essay Examples and Topics. Page 28

4,370 samples

Technology in the English Learning Classroom: Mixed-Method Study

The success of research usually depends on several factors, including the quality of sources, the abilities of researchers, and the established timeframes. The next step in the development of a data collection plan is a [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1162

Information Security Management: Legal Regulations

Considering this, the present paper aims to evaluate the significance of the regulatory aspect of organizational information protection endeavors and identify the extent to which they may facilitate or hinder the work of security managers.
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2771

Technology Design and Management in Teaching

The course I undertook as part of my master's program in IT and education managed to enhance my knowledge of information technology management to a great degree.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 845

Incidence Management for University Laboratories

This paper presents a comprehensive strategic plan to manage the risks and accidents in the practical laboratories at the university. The plan integrates administrative, procedural, and personal protective equipment controls.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 545

Hazard Mitigation Planning and Training

The training will focus on the collection and review of relevant data to aid in risk assessment. Training public officials on capability assessment will be critical to promoting the ability of the participating county to [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1403

Interactive Whiteboards in Saudi Arabian Schools

A comprehensive understanding of the benefits of adopting technology and the barriers to its maximal integration and implementation in learning institutions will create a better platform from which to review the existing literature and explore [...]
  • Subjects: Technology in Education
  • Pages: 18
  • Words: 4862

Risk Assessment Plan in Health & Human Services

For this purpose, risk management plans include the step of risk assessment the process of "determining the probability that a risk will occur and the impact that event would have, should it occur".
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 327

Disruptive Innovation in the Current Classroom

Additionally,it is vital for the companies to heed and understand disruptive innovation because they could sometime affect even well managed companies.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 611

Wireless Sensor Network, Its Topology and Threats

Wireless sensor Network consists of independent sensors, which are dispersed to examine physical and environmental conditions such as temperature, pulsation, pressure and movement; in fact, they collect data and transmit to the main location through [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 565

Cybersecurity as a Leadership Challenge

Cybercrime can lead to the leakage of important data, system interference, and the delivery of unsatisfactory services to consumers. This sophistication has amplified the insecurity of information systems to the extent of creating more threats [...]
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3090

Global Internet Usage and Nutrition Applications

In the year 2013, the number of global internet users had increased to 2. The resulting estimate was the average rate of growth of internet users for the five-year period, and it is this figure [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1086

Audio Conferencing for Smart Phones: Project Management

Inasmuch as variety of products exist in the market, a few of the products have the capability of offering audio conferencing services via the smart phones. The aim will be to generate a blueprint that [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2571

Failure Scenarios Ranking in Engineering

To determine the overall ranking of a scenario, the projected impact is divided by the total cost to the adversary. When making the decision to trigger a failure scenario, it is important to consider the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 561

Dubai Technological Advancement: the Smart City

The city of Dubai is the capital of the Emirate of Dubai and the largest city in the UAE. According to Salem, the readiness of society and the government to embrace technology is a vital [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1913

Risk-Based vs. Traditional Aviation Security Models

On the whole, it is hypothesised that the implementation of the risk-based, outcomes-focused approach to aviation security will allow for attaining a considerable advantage in comparison to the traditional, prescriptive aviation security model.
  • Subjects: Aviation
  • Pages: 14
  • Words: 3896

Toughening Mechanisms for Epoxies Quality Improvement

Furthermore, cavitated CSR nanoparticles allow for the creation of a shear band and the increase in the shear band zone, therefore, preventing the increase in the fragility of the material.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Public Key Infrastructure and Certification Authority

Digital certificates, on the other hand, can be considered the core of a PKI because they are used to create a linkage between the public key and the subject of a given certificate.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 864

Zonk Aircraft Accident in Retrospect Analysis

One must admit, though, that the lack of proper corporate ethics and the inability of the organization to establish control over the production process are not the only factors that triggered the disaster.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 867

Industry Changes: Floating Liquefied Natural Gas

The entire process from extracting natural gas to delivering it to the market will be modified by the FLNG model, which makes FLNG a game-changer in the industry.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 571

Fatigue in Air Traffic Controllers

Therefore, it is paramount to be aware of risk factors and causes of fatigue among air traffic controllers, and use methods which would allow for mitigating these factors and causes.
  • Subjects: Aviation
  • Pages: 2
  • Words: 672

Physical and Logical Information Systems Security

The concept of a physical threat is usually described as an incident that can end up in the loss of sensitive data or serious damage to the company's information system.
  • Subjects: Computer Security
  • Pages: 9
  • Words: 2483

Industrial Hygiene in Air Traffic Control

Industrial hygiene can be described as the "science and art" dedicated to detecting, assessing, and managing those factors and stressors present in the workplace that can affect workers' health or well-being negatively or cause them [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 574

Industry 4.0: Technical and Social Innovation Interplay

0 and define the number of features that make it a system at the confluence of technical and social innovation, it is necessary to summarize the data reported by previous researchers in the field.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1184

Information Technology Impact on Zayed University

The structural dimension of an organization refers to concepts that point to the internal environment of the organization. Organizational culture refers to the dominant practices, such as the modes of communication and the hierarchy of [...]
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2682

Aviation Training Efficiency and Evaluation

The literature review reveals that plenty of research studies on the topic of aviation training are directed at the provision of security and safety to both the crew and the passengers.
  • Subjects: Aviation
  • Pages: 2
  • Words: 564

Programming Teams and Development Methods

The concept of extreme programming is essential in an organization and can be applied in management through team work. Integration of programming teams within other aspects of the organizations is important in strengthening the coordination [...]
  • Subjects: Programming
  • Pages: 4
  • Words: 1018

Technological Innovation in Law Enforcement

It shows that criminals may use the same methods as police officers and also indicates that the storage of personal information in cyberspace is related to major safety risks.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 870

Wireless Sensor Networks in Military Applications

A wireless sensor network can be characterized as a self-designed framework of remote systems to screen physical or ecological conditions such as temperature, sound, vibration, weight, movement, or contaminations and to pass information through the [...]
  • 5
  • Subjects: Other Technology
  • Pages: 3
  • Words: 839

Internet of Things Security in Smart Cities

Among the goals of hackers in attacks on the critical IoT of smart cities, there is the intentional organization of accidents or power outages, theft of personal information of users, interception of control of devices [...]
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1130

Malicious Attacks, Threats, and Vulnerabilities

The organization has to have an eye for the presence of null bytes and the location of shellcode to counterattack the exploiters of this type of malicious attack.
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1468

Privacy Policies in Information Technology Firms

In addition to the protection of the firms' network, the IT firms must maintain the physical security of the computers. Physical security is important since it helps to protect the privacy of the data stored [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 646

“A Whole New Mind” by Daniel Pink

In his book A Whole New Mind, Daniel Pink focuses on a discussion of one of the major changes in the modern society that have occurred under the influence of such professes as industrialization and [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 849

How to Improve Student Presentations with Technology?

Also, having created a book dedicated just to the creation of presentations at school, the author pointed out the importance of this skill, as well as its complex nature and a variety of components that [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 912

Technology Tools for Classrooms

Richardson provides a number of ideas concerning the application of all of these resources for the purpose of creating the innovative and interactive teaching process and the kind of learning that is connected to the [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 862

Computer Emergency Readiness Team

The purpose of this case study is to discuss the role of the US-CERT in disaster and recovery management, the importance of the ICS-CERT for addressing the Stuxnet problem, the role of alternate sites in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 857

Geographic Information Systems in Dubai

For instance, it is possible to recommend the implementation of the technology of GIS in Dubai with the purpose of facilitation of car parking in the city.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 679

Regulatory Requirements for Flight Crew: US and UAE

Considering the volume of air traffic, airports, and operators in the US, the FAA has extensive rules and regulations. To a large extent, GCAA has followed the rules and regulations of the FAA on many [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2314

Microsoft Operating Systems on Trial

The incompatibility of older software and the enhanced capabilities of the new operating system in some cases force users to upgrade to perform their job, meaning that they would not have a choice but receive [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 561

Cyber Threats: Incident Response Revamp

It is crucial for the team to be provided with instrumental and technical resources to react to the threats effectively. It is advisable to measure the effectiveness of the team in handling the incidents.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 894

Evaluating Access Control Methods

This classification is grounded in a collection of rules that designate the relations between subjects and objects due to the fact that the former can obtain access to the latter.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1147

Developing More Sustainable Civil Engineering Practices

It is possible to observe that of the better policies, which are proposed in the research and which could be applied to the sphere of civil engineering, is the development and use of new tools [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 572

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Web and Networking: Main Questions and Features

In the Defense Health IT System, the employees are able to access to programs, files, data from a database and documents elsewhere, while being in different location in the organization.
  • Subjects: Internet
  • Pages: 4
  • Words: 1305

Cyber Law: Legal Environment of Business

Because internet and cyberspace are fast becoming a fundamental part of the society, all people should have knowledge about the dangers and damages of cyber tort.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 859

Information Technologies Compliance Audits

The Turkish courts, which were the subject of his study, could adopt specific guidelines to enhance effectiveness and the ease of IT compliance audits.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2212

Impact of Technology on the K-12 Education

The major asset of the present research is that the T-test will indicate the students' performance progression. The paired sample T-test is the core of the proposed quantitative research, which is designed to establish if [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 636

Avoiding Technological Determinism: Aspects and Challenges

For instance, Volti specifically warns the reader that the perspective on the technology that is presented in the chapter "Winners and Losers" may be "a bit negative" and makes sure to mention the positive effects [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1644

Deutsche Telecom Company’s Cyber Security

The present work deals with the issue of DDoS attacks and builds a case on one of the well-known IT companies to single out the problem, the immediate solutions and preventive practices, and the lessons [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1377

Digital Labor in Contemporary Asia

Such changes can be seen in the way of living of people nowadays, as well as in the status of development in the majority of the countries.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2447

Cyberbullying and Suicide

In other countries where religion plays a key role in the values and norms of the people, suicide is a topic that is rarely discussed.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 850

Fifth Generation Mobile Networks Technology

The most promising direction in a new generation of mobile networking is the use of millimeter-wave band transmission, which has the potential to fulfill some of the criteria specified above.
  • Subjects: Phones
  • Pages: 5
  • Words: 1454

Spot Mini Robot by Boston Dynamics

While the bigger robots by Boston Dynamics are designed to operate in extreme conditions, Spot Mini is a household robot, which makes it marketable to a wider community and, therefore, profitable.
  • Subjects: Robotics
  • Pages: 2
  • Words: 551

Website and Application: New Opportunities

The targeted idea is to design a website and an app that can support the needs of graduates from different parts of the world. The proposed website will be linked with the app to ensure [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 569

Computer Literacy: Parents and Guardians Role

Filtering and monitoring content on the internet is one of the most important roles that parents in the contemporary world should play, and it reveals that parents care about their children.
  • Subjects: Internet
  • Pages: 2
  • Words: 576

Boeing 767 Crash: Mass Disaster Investigation

For this reason, it is vital to investigate reasons that predetermined the failure and guarantee the creation of the efficient solution needed to avoid the same incidents in the future.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 833

Li-Fi as the Future of Wireless Technology

It is important to discuss the problem associated with the use of wireless communication technologies, accentuate the goals and significance of this study, present research questions, and review the recent literature on the topic of [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1591

TransAsia Airways Flight 235 Accident

The purpose of this paper is to review the Flight 235 accident, as well as to analyze the causes of its origin and the importance of the human factor, which made a critical contribution to [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2171

Cyber Security and Employees

The major factors that define the thriving of cyber ganging are the insufficient level of employees' competence, the lack of knowledge about the technical side of information protection, and non-compliance with safety standards.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 544

Car Accidents in Kuwait

Foreigners are in a hurry because they have a lot of things to do and fail to meet the deadline. Thus, it cannot be denied that the improvement of traffic safety and driving behavior is [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 868

Virtual Reality’s Main Benefits

The rapid development and the growing popularity of virtual reality raise a logical interest concerning the advantages and disadvantages that are related to the application of this new technology in various spheres of knowledge and [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 909

Monitoring Toddlers and Technology

The interactive elements are very engaging for toddlers and the unlimited nature of the video on demand services such as YouTube and Netflix, and game programs can be addictive to the children who have not [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 842

Cybercrime and Digital Money Laundering

The result of the investigation was the indictment of Western Express and a number of the company's clients for several charges including stolen credit card data trafficking and money laundering.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 574

Television, Its Invention and Technical Evolution

The history of television involves the contribution of several engineers from different parts of the world. This paper seeks to explore the technical evolution of the television from its invention to the current developments.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1099

Information Security Management System: ISO 27001

According to the existing description of the standard, the process of facilitating a control over the data management processes in a company is crucial to the security of its members.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 868

Science and Innovation in Saudi Arabia Society

The sphere of communication improved with the creation of the telegraph and telephone. The automobile and the airplane entered the lives of the general public, affecting the nature of cities.
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4150

Virtual Reality’ Sports Training System Working Steps

The efficiency of the given technology is evidenced by the fact that it is used by various coaches and teams to provide training for their players. For this reason, it is possible to predict the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 563

Cybersecurity and Vital Elements

The focus of any risk management effort is a standard system or a framework that help organizations and individuals to manage integrity, confidentiality, and data and ensure critical resources availability.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2220

Nintendo Game Innovation: Wii’s Principles

In this case, it has to be mentioned that Sony's PlayStation was paying substantial attention to the quality of the image, sound, and speed of the processor to build a perception of one of the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 820

Virtual Reality Technology in Referee Training

Referees need to experience the practical nature of the profession during the training process, and the VR technology will eliminate the underlying challenges to the development of experience in the profession.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1138

Security Management: Addressing Challenges and Losses

Indeed, designing the strategy that would allow introducing people quickly and efficiently to the essentials of security in the workplace, as well as in their private use of the Internet and the related resources is [...]
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1114

Cyber Attack: “Guardians of Peace”

In the next month, GOP threatened the company and urged it to cancel the release of the film "The Interview". Sony accepted the demand and did not let the film run on the cinema screens [...]
  • 4
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 911

The US National Cyber-Security Initiative

The first initiative of the national cyber-security program is to integrate the functions of the Federal Enterprise into one unit using Trusted Internet Connections.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 926

Graphic Card Industry and Evolution

A graphic card, usually, referred to as a video card or a graphic accelerator card is an electronic circuit installed on the motherboard inside the central power unit, mostly on Laptops and desktop computers.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2193

E-Spoon Restaurant Application Design and Functions

The company's E-Spoon mobile app will be designed for the United States market and will allow its users to search for food venues and make reservations based on a wide variety of parameters that include, [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 587

Radix Sort Algorithm, Its Logic and Applications

The sorting process starts from the rightmost digit based on the key or the positions of the numbers being sorted. LSD radix sorts the integers from the least to the most significant digit.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 823

SQL Injection Attacks and Database Architecture

The proximity of SQL infusion weakness enables an assailant to issue command prompts specifically for a web application's database and to subvert the planned use of the application.
  • Subjects: Computer Security
  • Pages: 11
  • Words: 2280

Students’ Mobile Learning in Higher Education

The current concept of m-tools as the household strategy for implementing the teaching and learning process is flawed to a significant extent due to the lack of guidance and support from the tutor that it [...]
  • Subjects: Technology in Education
  • Pages: 23
  • Words: 6075

Guitar Construction: Acoustical Features

It is at the front part of the guitar, and it is the most critical part of the instrument, because the back part and the sides of the guitar reflects the sound back to the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 891

Passive Solar Heating Systems and Their Benefits

The key benefit of passive solar heating systems is that they reduce the number of greenhouse gasses and hardly pollute the air if we compare them to conventional heating systems.
  • Subjects: Engineering
  • Pages: 2
  • Words: 278

Problems of the Software Piracy

This paper examines the modes of software piracy, the reasons behind it, who are the offenders, the cost of such actions, and how and who to control them.
  • Subjects: Programming
  • Pages: 6
  • Words: 1776

Planetary Gearbox System and Its Applications

The planetary gear system borrows its name from the behavior of the sun and the planets in the solar system, as the gears in the system behave in a similar manner to the planets.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2204

Bring Your Device Policy and Security in Business

Bring your device refers to the organizational policy of allowing employees to bring their technological devices to the workplace and use them to carry out organizational duties.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 850

Information Technology Department Security Measures

For the majority of modern companies, the process of data destruction is one of the essential procedures allowing the organization to run smoothly and manage their data efficiently while staying protected.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 596

Internet in American Politics, Society, Economics

The internet has and will continue to change the way people in the United States live because it provides necessary interruptions that have a profound effect on the way people think.
  • Subjects: Internet
  • Pages: 6
  • Words: 1643

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1111

Advantages of Fresnel Lenses

A Fresnel lens possesses a large aperture and a short focal length, which allows it to capture and focus more from a light source than a conventional lens, and project it over vast distances while [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 612

Surgeon Students’ Virtual Reality Learning Programs

In order for the students to feel like they are operating on living patients instead of waving instruments in the air, it is necessary to provide the environment that would compensate for the shortcomings of [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1135

Artificial Intelligence and Humans Co-Existence

Some strategies to address these challenges exist; however, the strict maintenance of key areas under human control is the only valid solution to ensure people's safety.
  • Subjects: AI
  • Pages: 2
  • Words: 658

A South Korean Copy of Snapchat

Snow has become popular because it is focused on the Asian market and, in fact, it introduced Asia-specific features earlier than Snapchat managed to develop them and offer local-language versions of the app.
  • Subjects: Applications
  • Pages: 2
  • Words: 572

How Children Are Currently Exposed to Technology?

What is currently happening is that parents are now aware of the fact that their children might spend more than enough time in front of the TV or phone/tablet screen, and that scares most of [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 664

Hacking: White, Black and Gray Hats

Living in the era of the Internet and online technology increases the vulnerability of the information stored online and on electronic devices.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1391

Digital Transformation: Hyper-Connectedness and Collaboration

The guiding principles for E2E economy formulated by the authors include the ability of organizations to provide optimal customer experiences through the right partnerships, capacity to use contextual and predictive analytics to generate customer value, [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 606

E-Books: An Interactive Technology Tool

Since the topic of the lesson is "Domestic Animals," an e-book can provide meaningful and engaging opportunities for the young learners to develop their phonemic awareness and reading skills.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 592