Tech & Engineering Essay Examples and Topics. Page 3

4,317 samples

Researching Capacitive Touch Sensor

The closeness of electrodes in a single-touch electrode in the two layers determines the coordinate system. The operation of a capacitive touch sensor is based on a capacitor's response to change in capacitance.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1504

Mobile App Development Career Speech

On the other hand, mobile app development might be a tedious task, which requires superior analytical skills and mastery of programming languages. In conclusion, mobile app development is a fascinating and rewarding career.
  • Subjects: Applications
  • Pages: 2
  • Words: 772

Amateur Football Club Database Design

For the enhancement of data management, a local amateur football club needs database program to keep personal data of its member in order to have the record of attendance of the club member, best club [...]
  • Subjects: Data
  • Pages: 6
  • Words: 1525

Modern Technologies and Their Impact on Youth

This study presents an analysis of the impacts of the modern technology on the communication skills, personalities and social behaviors of the youth in the technological context that characterizes the network society.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 933

Mobile Phones and True Communication

This problem led to the invention of mobile phones which foster true communication in the following aspects. The radio enhances communication because one is capable to get world news despite the compactness of the phone.
  • Subjects: Phones
  • Pages: 2
  • Words: 560

Aviation Security, Threats and Strategies

The given study delves into the critical aspects of the modern aviations functioning and the work of the international organisations as IATA or ICAO aimed at the improvement of safety measures and creation of a [...]
  • Subjects: Aviation
  • Pages: 60
  • Words: 13889

The Systems Development Life Cycle

The Systems Development Life Cycle is a conceptual model for IT specialists to institutionalize system development through the conventional phases of planning for defining system development resource requirements, analysis for determining end user requirements, and [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 483

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 780

Cybersecurity Dangers and Their Analysis

The officer clicks the file, and the malware attacks the system stealing the data and bypassing some security measures. The cyber security framework under the NIST is helping organizations to understand and manage cybersecurity.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2960

Modern Medical Technologies

Since the user-friendliness of a device or software is imperative, a healthcare manager should ensure that the user-interface and user-experience of the technology can be easily understood.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1392

Propeller-Driven Performance vs. Jet-Driven Performance

Propeller-driven aircraft is more efficacious at low speeds than jet-driven aircraft, for they create higher propulsive efficiency and, consequently, greater thrust while the craft is moving at lower airspeed; however, jet-driven aircraft experience the deficiency [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 655

Qantas Airways: Cross Culture and Safety Management

The latest development in the field is relevant to cross-cultural issues and their impact on safety which still requires further study and appropriate application in the airline industry as merger and acquisition of airlines is [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3740

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1686

Fire Incident and Emergency Services Reflection

As for the matters of the analysis, the context and the details of the incident will be analyzed from the perspective of possible impacts and consequences, and the scales of these consequences.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2474

Interactive Smartboard: Advantages & Disadvantages

But the interactive Smartboard is not just a way to entertain teachers and students or avoid using the chalk, it is not "a new toy for the teacher to relieve the boredom of delivering the [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 580

Mobile Telephones and Social Life

The main purpose of the project is exploring the positive and negative aspects of mobile phone use in society since the technology is at the forefront of most interactions between modern people.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

The Challenger Space Shuttle Disaster

The case of the space shuttle Challenger is, probably, one of the biggest disasters in the history of American space exploration.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1104

Technology in Society, Healthcare and Education

However, the research on this topic is extensive and shows the impact of technology to be a positive one. Further research on this and other topics should be considered due to the widespread presence of [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1061

The Carnival Triumph Cruise Ship’s Crisis Management

This paper is a critical analysis of the crisis communication surrounding the marooning of the Carnival Triumph Cruise ship. The contribution of the Carnival's PR in addressing the Triumph crisis is subject to analysis to [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2838

Computer’s Memory Management

Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.
  • Subjects: Computer Science
  • Pages: 20
  • Words: 5417

Influence of Information Systems

The smooth flow of information in a business enterprise is essential for the survival of the business. Due to the limited scope of the traditional information systems, there was little functionality in the management of [...]
  • Subjects: Data
  • Pages: 7
  • Words: 2056

Electrical Multimeters: Overview and Application

It is a crucial tool for the electrical and electronics industries because it enables electricians and techs to identify electrical issues, analyze circuitry, and test electrical parts [1].
  • Subjects: Other Technology
  • Pages: 2
  • Words: 589

Graph Analytics in the Aviation Industry

In response to this significance, several frameworks have been designed to deal with big numbers, given the availability of data and the complex agent interactions. Data extraction and analysis have been in the face of [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2968

Lighting Techniques in 3D Animation

In distinction with 2D animation where every frame should be painstakingly painted and filled in with the required tints, lights, and shadows, lighting in 3D animation is performed by pointing the source of light, while [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1122

Concepts of Technology: Good or Bad

Since the advent of industrial revolution, technological innovations have been the primary determinant of the quality of life, a fact that every individuals can attest, because of the human dependence on technology in everything they [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1182

The Internet: Arguments Against and for It

The internet has brought a lot of changes to the information industry. This is because there are a number of deficiencies found on the net that leave it wanting.
  • Subjects: Internet
  • Pages: 3
  • Words: 636

The History of Welding

Welding, which is "the fusion of material by the use of heat," dates back to the Middle Ages. Nevertheless, arc welding developed only after the invention of the electric generator in the middle of the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 590

The Mobile Game “Clash of Clans”

In the following paper, we will concentrate on the history of mobile games, describe "Clash of Clans" and examine the reasons for its popularity, and, finally, we will discuss the disadvantages of mobile games. The [...]
  • Subjects: Phones
  • Pages: 11
  • Words: 2448

Toaster, Its Elements and Working Mechanism

When the piece of the appliance is triggered by the insertion of the piece of bread foods, the electrical stream increases the temperature of the bimetallic element; the element is in this manner refracted to [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 564

Space Shuttle Challenger’s Explosion Factors

A fault tree analysis can be used to identify and examine the major factors that led to the failure of the O-rings in the Solid Rocket Boosters. The failure of the O-rings led to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 836

How the Internet is Changing Your Brain?

One of the most evident things that can be observed nowadays is that the Internet has a considerable impact on people, the development of relations, the ways of how information is exchanged, etc.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1128

Apple Versus Samsung Smartphones

With the introduction of the Samsung Galaxy S series smartphones, Samsung competes with Apple's iPhone. The screen, look and feel of Samsung smartphones is strikingly similar to that of the iPhone.
  • 4.5
  • Subjects: Other Technology
  • Pages: 3
  • Words: 859

Electrical and Electronics Engineering Career Development

Electronics engineering is the branch of electrical engineering, which deals with the uses of "the electromagnetic spectrum and with the application of such electronic devices as integrated circuits, transistors, and vacuum tubes".
  • Subjects: Engineering
  • Pages: 10
  • Words: 2743

Biometric Security Systems

One of the advantages of the facial biometric system is that it requires no contact and this addresses the worry of numerous people touching the same system as in the case of a fingerprint system.
  • 5
  • Subjects: Other Technology
  • Pages: 26
  • Words: 5999

The Improvement in Technology

The better technology the industry has, the greater the computing power and in effect the faster, persuasive and competitive the product becomes.
  • Subjects: Applications
  • Pages: 10
  • Words: 2824

Ethical Industrial Engineering Ethics

Failure to embrace this by past engineers led to the establishment of code of ethics that guide all engineers in their day to day execution of services.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1872

Concept of Industrial Accident

For example in the transportation industries, about 70% of the accidents are caused by negligence of the drivers[2]. Most of the accidents are caused by the poor conditions of the working environment and to minimize [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 470

Pros and Cons of Information Technology

Some of the disadvantages of the improved technology include new forms of pollution that are as a result of the gadgets used to access the resource.
  • Subjects: Internet
  • Pages: 2
  • Words: 609

The Automotive Technology Evolution

This marked the beginning of the car industry, which ultimately led to the development of modern automobiles and opened the way for their production. The reliability and safety of automobiles have increased due to technological [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1921

Artificial Intelligence and Machine Learning

There are both benefits and challenges to the use of AI and ML in the customer complaint resolution process. The ability of a company to provide a customer experience depends on that business's power to [...]
  • Subjects: AI
  • Pages: 2
  • Words: 707

Ethical Issues of the Information Age

Accuracy refers to the accountability for errors in information and the subsequent choice of the person to blame. Property deals with the question of ownership of information and the means of its transmission.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 298

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Importance of Data Analysis

In order to determine the methods of mathematical and statistical processing, first of all, it is important to assess the nature of the distribution for all the parameters used.
  • Subjects: Data
  • Pages: 4
  • Words: 1118

Malé International Airport: The Landside

The Male International Airport is the main international airport of the Republic of Maldives. This island can be found in the North Male Atoll, not far from the isle of Male, the city on which [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1165

How an Air Conditioner Works

The air conditioner cools the room by taking out hot air from the house and cycling it back as cool air, a cycle that continues until the house attains the desired temperature.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1232

Cyber Crimes: Court – United States vs. Ancheta

Reasoning: The jury argued that the defendant conspired to violate the Computer Fraud Abuse Act as well as the CAN-SPAM Act, caused havoc to computer networks of the national defense department of the federal government, [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 548

Microsoft Office Applications

When I was introduced to the internet, I learned to use the search bar, the chat, the email facility and the facility to play a video or watch a movie.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 900

Computers and Transformation From 1980 to 2020

The humanity dreams about innovative technologies and quantum machines, allowing to make the most complicated mathematical calculations in billionths of a second but forgets how quickly the progress of computers has occurred for the last [...]
  • 5
  • Subjects: Computer Science
  • Pages: 3
  • Words: 1058

Child Under 10 Years of Age With a Mobile Phone

The resulting impact of mobile phones on the rate of cancers and neurological diseases is still to be researched, and the risk for children should not currently be considered acceptable.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 512

Pros and Cons of Mobile Phones

A cell phone, in other words also referred to as a mobile phone is a gadget that is operated electronically using frequencies of radio telecommunication which operates on a two-way basis within a given network.
  • Subjects: Phones
  • Pages: 2
  • Words: 586

The Role of the Internet for Modern Society

Five years later, the internet was plagued by worms which deterred the development and use of the internet altogether. Parents should therefore restrict access to internet websites through the use of internet tools.
  • Subjects: Internet
  • Pages: 3
  • Words: 904

Why Internet Filters Should Be Used?

Internet filters give parents a sense of control over their children in the only area of their lives where parents cannot get in, that is the internet.
  • Subjects: Internet
  • Pages: 2
  • Words: 723

Advantages of Using Computers at Work

I have learned what I hoped to learn in that I have become more aware of the advantages of using computers and why I should not take them for granted.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 582

Fluid Mechanics. Vortex Amplifier

In this way a flow of air is maintained in through the System under control, through the VXA, and out through the vent system.
  • Subjects: Engineering
  • Pages: 4
  • Words: 417

Social Media in Education

Social media should become a part of the learning process since it is evident that it helps to enhance education by providing the means to share, receive feedback and use academic works in a way [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1370

Educational Technologies and Their Integration

The primary goals of technology include 1) orientation of the learners of the widespread of the educational technology; 2) information on how the educational technology can be used as the media opportunities of the teaching [...]
  • Subjects: Technology in Education
  • Pages: 13
  • Words: 3641

Technology Use among Children: Ethical Issues

The use of technology has triggered innovations and enhanced the skills of children and adults. Some of the contents in the internet are very dangerous to the children.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1378

The Impact of iPad on Children between 2-10 Years

The objective of this program is to bring out the negative effects of using iPads among the children. The program intends to enlighten the parents on the need to limit the number of hours their [...]
  • Subjects: Phones
  • Pages: 4
  • Words: 1024

Benefits and Dangers of Ethical Hacking

The advantages of ethical hacking The following are some of the advantages associated with the use of ethical hacking in an organization.
  • 5
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1613

Smart Grid Technology

The most common application of smart grid technology is in electricity distribution. In conclusion, smart grid technology has changed the way power is generated and transmitted.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Sony Pictures: The Cyber Attack

The incident also highlighted the vulnerability of large companies to cyberattacks and the need for better security measures."Guardians of Peace" was the hacker organization that breached the computer networks of Sony Pictures Entertainment, a prominent [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 858

Satellite Imagery: Strengths and Weaknesses

It is unreliable for detecting low clouds at night because the temperature emitted by underlying clouds and fog is somewhat the same as in surrounding areas This technology is often applied to detect the presence [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Artificial Intelligence in the Transportation Industry

Following that, key achievements in the transportation business included the introduction of bicycles in the early nineteenth century, automobiles in the 1890s, railroads in the nineteenth century, and airplanes in the twentieth century.
  • Subjects: AI
  • Pages: 5
  • Words: 1402

The Systems Analyst Profession

The profession of a system analyst in the modern labor market is one of the most demand due to the rapid development of information technology.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 909

Science Personal and Professional Life

Our decision to eat baked yams instead of fries, the car we drive in, our mobile phones, the oral drugs we use to treat certain illnesses and the purified water we drink at the end [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1146

The Usage of VR Technologies in Football

In sports, VR is on its way to becoming one of the essential tools for a sports organization that aims to acquire a competitive advantage.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 562

Photoshop: The Story and the Impact

Photography and graphic design play an important role in the life of the modern society. Photography an Photoshop are the parts of a variety of fields and industries today.
  • Subjects: Applications
  • Pages: 7
  • Words: 895

Relational Database: The University Database

A tutor also qualifies as a module coordinator and hence the primary key of any of the tutors is the ModCoord. The association between the module coordinator and the student table is a one-to-many type.
  • Subjects: Data
  • Pages: 10
  • Words: 1912

Cisco Packet Tracer: A Simulation Tool

The administration usage of the computers is represented by A. 255 as the address range of F Administration = 176.16.1.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 1326

Computer Laboratory Staff and Their Work

This will depend on the discretion of the staff to look into it that the rules that have been set in the system are followed dully. This is the work of the staff in this [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1531

Computer Network Types and Classification

For a computer to be functional it must meet three basic requirements, which are it must provide services, communications and most of all a connection whether wireless or physical.the connection is generally the hardware in [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 604

British Airways: Information Security Management

The purpose of this paper is to analyze the fundamental principles and practices of information security management within British Airways, considering the requirements for managing digital data.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2041

Threats of the Internet

Such digital giants as Google and Amazon have access to all the personal and behavioral information that we share on the net, and though they claim to use for our benefit, the algorithms of the [...]
  • 5
  • Subjects: Internet
  • Pages: 3
  • Words: 864

Introduction to Human-Computer Interaction

It is a scope of study that explores how individuals view and ponder about computer related technologies, and also investigates both the human restrictions and the features that advance usability of computer structures.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1148

The Process of Arc Welding: Main Aspects

The welding process is so broad that mechanical engineering as a discipline is part and parcel of it. Within the process of arc welding are other types which are described below: In this process, the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1155

Secure Software Development Life Cycle

Then there was a challenge response model according to which the system sent the user a challenge in the form of randomized character string, and the user responded with a computational value based on the [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2242

How Does Technology Affect the Economy?

The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
  • 5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 887

Cloud Computing Pros and Cons

In a computer system using cloud computing, the workload of running applications is shifted from the local computer to the cloud, which consists of network computers.
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2752

Car Maintenance Company Relational Database System

The Worker table tracks the company's employee details, the Customers table tracks the company's customer details, the Car table tracks the details of the cars serviced by the company and the Payment table tracks the [...]
  • Subjects: Data
  • Pages: 6
  • Words: 1555

The Evolution of the Car Engine

France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2226

Information Technology and Human Society

It led to the creation of the Internet that enabled computer users in India to communicate to computer users in the United Kingdom, the United States and even as far as New Zealand.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2262

The Role of the Internet in Business

The thesis statement The role of the Internet in business cannot be neglected, as the World Wide Web can be regarded as one of the most powerful and effective tools for conducting business.
  • Subjects: Internet
  • Pages: 4
  • Words: 1090

Technology in Hospitality Industry

Some customers would like to continue working while in the hotel or even to keep in touch with the progress of their businesses and information technology advancement has made this possible nowadays.
  • Subjects: Applications
  • Pages: 2
  • Words: 545

Decision Support Systems

A DSS has three major elements: Database management system that stocks huge volumes of data that is vital in finding solutions to problems for which the DSS has been designed to solve; Model-based management systems [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1369

Artificial Intelligence: History, Challenges, and Future

In the editorial "A Brief History of Artificial Intelligence: On the Past, Present, and Future of Artificial Intelligence" by Michael Haenlein and Andreas Kaplan, the authors explore the history of artificial intelligence, the current challenges [...]
  • Subjects: AI
  • Pages: 2
  • Words: 606

Unemployment Rate Due to Impact of Technology

By understanding the role of technology on unemployment, the public can develop innovative mechanisms to overcome the issue. The impact of technology on the labor market is relevant to my present and future life.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1109

Classification of Mobile Applications

Utility apps are the kind of applications that people need daily. The user session time is one of the longest in entertainment and social media apps.
  • Subjects: Applications
  • Pages: 2
  • Words: 576

Internet of Things for Home: Benefits and Challenges

The IoT can be characterized as the unification of the virtual and real worlds with the help of many devices and sensors connected to the same network and providing interaction between machines and people.
  • Subjects: Internet
  • Pages: 10
  • Words: 2771

Zoom Technology and Its Ethical Issues

According to Zoom operators, the organization promised end-to-end encoding, but the commission alleges the end-to-end encryption provided was being stored on its server.
  • Subjects: Internet
  • Pages: 5
  • Words: 1456