Tech & Engineering Essay Examples and Topics. Page 3

4,370 samples

Computer Virus User Awareness

It is actually similar to a biological virus wherein both the computer and biological virus share the same characteristic of "infecting" their hosts and have the ability to be passed on from one computer to [...]
  • Subjects: Computer Security
  • Pages: 1
  • Words: 685

Aviation Security, Threats and Strategies

The given study delves into the critical aspects of the modern aviations functioning and the work of the international organisations as IATA or ICAO aimed at the improvement of safety measures and creation of a [...]
  • Subjects: Aviation
  • Pages: 60
  • Words: 13889

Electrical and Electronics Engineering Career

The main aim of the report is to enable the career consultants who will be acting as career advisors to be able to understand my career field and in the process, they will be able [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 621

Information Visualization: Task by Data Type Taxonomy

In the Department of Tourism and Commerce Marketing, the way the TTT may be implemented at the individual, group, and organizational levels can be substantially defined by both the types of data used at those [...]
  • Subjects: Data
  • Pages: 10
  • Words: 2734

Accidents Comparison: UA Flight 232 and Baghdad DHL A300

The crew was able to land the plane without conventional control at the airport of Sioux City, but the right-wing of the airliner hit the runway, and the plane broken into several parts.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 557

Technology in Society, Healthcare and Education

However, the research on this topic is extensive and shows the impact of technology to be a positive one. Further research on this and other topics should be considered due to the widespread presence of [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1061

The Importance of Strong Password

A password is what confirms to the computer or any other digital device that is protected by a secret code that the person accessing the information is who he/she claims to be. One of the [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 575

Telegram Role in Communication

The telegram was the easiest and the fastest means of communication in the nineteenth century. I was very excited and any other scheduled activity came to a standstill as I focused my attention on the [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 866

Are Cell Phone Dangerous?

Among the first ideas to consider, the one that manifests the use of cell phones as the most logical phenomenon and the key feature of the XXI century is the fact that cellular communications are [...]
  • Subjects: Phones
  • Pages: 16
  • Words: 4254

Making a PowerPoint Presentation

Tim Washer, attempts to highlight some of the issues that affect the effectiveness of a PowerPoint presentation and how one can solve these issues. In addition, Washer suggests that developing a story relevant to the [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 572

Singapore Airline

The main objective of the analysis is to have firsthand experience of the problems facing the company and gain knowledge concerning probable developments and potentials.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1596

Electrical and Electronics Engineering Career Development

Electronics engineering is the branch of electrical engineering, which deals with the uses of "the electromagnetic spectrum and with the application of such electronic devices as integrated circuits, transistors, and vacuum tubes".
  • Subjects: Engineering
  • Pages: 10
  • Words: 2743

The Dishwasher Advantages

Many people now rely on the dishwasher, and the traditional method of manually cleaning the utensils has become a thing of the past.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1068

A Review of Dover AFB C-B Crash 2006

The essay reviewed the chain of events that led to the mishap and measures that the pilot could have taken to prevent it.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2827

Civil Engineering as a Professional Career

The reason why civil engineering is dominant over other engineering disciplines is that it is broad and deals with many things such as design, building, and refurbishment of corporeal and ordinary built environment.
  • 4
  • Subjects: Engineering
  • Pages: 4
  • Words: 1254

Challenges of Computer Technology

Computer Technologies and Geology In fact, computer technologies are closely connected to any sphere of life, and it is not surprisingly that geology has a kind of dependence from the development of computers and innovative [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1673

The Crash of Avianca Flight 52

The flight was registered in Columbia, and the final destination was in Boston; however, because of poor weather conditions and the fact that the airplane ran out of fuel, the jet crashed.
  • Subjects: Aviation
  • Pages: 3
  • Words: 876

Refrigeration Process and Mechanical Cycle

The main components of the vapor compression refrigeration cycle are the compressor, condenser, expansion valve/throttle valve, and evaporator. The final aim of the cycle is to continuously take heat from inside the object and transfer [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 306

The Solar Powered Flashlight and Its Advantages

Once fully charged, the solar powered flashlight will play an important role of ensuring one is able to navigate all the challenges that might arise at night.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 556

Artificial Intelligence in Marketing

Artificial intelligence in marketing is a method of using customer data and AI concepts, including machine learning, to predict the next step of the consumer and meet his needs, even those that the consumer has [...]
  • Subjects: AI
  • Pages: 2
  • Words: 621

Zoom Technology and Its Ethical Issues

According to Zoom operators, the organization promised end-to-end encoding, but the commission alleges the end-to-end encryption provided was being stored on its server.
  • Subjects: Internet
  • Pages: 5
  • Words: 1456

AirAsia: Crisis Management Case Study

The crash was the first to be recorded in the eighteen years of operation of AirAsia. It was described as the third worst plane crash in the year 2014.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 1098

Propeller-Driven Performance vs. Jet-Driven Performance

Propeller-driven aircraft is more efficacious at low speeds than jet-driven aircraft, for they create higher propulsive efficiency and, consequently, greater thrust while the craft is moving at lower airspeed; however, jet-driven aircraft experience the deficiency [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 655

Aircraft Crash and Emergency Management: Flight UA232

There was no indication of any type of problem that could have warned the pilots of the impending disaster that would force them to crash-land the DC-10 that carried 285 passengers and eleven crew members.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2038

Router as Component of a Network Connection

In terms of their mode of operation, routers generally make use of protocols for communicating with other computers on the network in order to find the best path between them.
  • Subjects: Internet
  • Pages: 5
  • Words: 1397

Information Technology in the Employment Field

Information technology is the branch of technology devoted to the study and application of data and the processing thereof. Moreover, the development and use of the hardware, software, firmware, and procedures associated with this processing [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2155

Evie.ai: Artificial Intelligence and Future Workforce

That is why it is crucial to analyze some trends in artificial intelligence that are being adopted by many businesses for better functioning, in particular, the implementation of Evie.ai, its functions, and the consequences.
  • Subjects: AI
  • Pages: 4
  • Words: 1215

Cyber Attack on eBay Company: The Summer of 2014

Thus, one of the most famous cases in the world, which related to the hacking of important information, was the attack on the database of the world-famous online store eBay.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3081

Web-Based School Management Mobile Application

The implementation process was scheduled to commence with the infrastructural development of the web-based system and upload all school data into the system.
  • Subjects: Technology in Education
  • Pages: 35
  • Words: 9824

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
  • 5
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1413

The Uses and Abuses of Technologies and Medias

However, it is apparent that using smartphones is one of the major distractions in class, and it is likely to result in the lowering of the performance levels of the students.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1373

Vibration Control in Rotating Equipment

Vibration in rotating machines occurs because the centre of rotation of a machine does not coincide with center of mass. Machine imbalance is the most common cause of vibration in rotating machines.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2170

Disney Resort Crisis Communication Plan

When dealing with an emergency, the head of crisis communication has to carefully follow a crisis communication plan. He or she will compile a list of key publics that have to be notified of the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1987

Sliderocket Use in Education: Step-by-Step Guide

For instance, to add a picture, click on the 'Picture' icon and select the location of the picture. Select what to import, whether PDF or PowerPoint and click on the 'Next' button as shown below.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1638

The Role of Social Media in Aviation Crisis Management

Therefore, this paper considers the general role that social media might play in a crisis or emergency in the airline industry and describes methods that could be used to deal with the potential adverse outcomes [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 3603

Google Glass Innovation’s Strengths and Weaknesses

These are some of the main advantages that this device can offer. In particular, they should focus on the development of software that can maximize the benefits of this wearable computer.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Colgan Flight 3407: Human Factors of the Accident

The cause of the accident was attributed to the failure of the flight crew to monitor airspeed according to the rising position of the low-speed cue, the flight crew's failure to stick to the cockpit [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1845

The Evolution of the Car Engine

France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2226

Bioinformatics and Biotechnology

The purpose of this study is to provide an overview of bioinformatics and to illustrate how bioinformatics can be utilised in the design of drugs and the enhancement of agricultural products.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2598

Ethical Industrial Engineering Ethics

Failure to embrace this by past engineers led to the establishment of code of ethics that guide all engineers in their day to day execution of services.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1872

Geotechnical Failure

The purpose of the preliminary study is to examine suitability of the study for the proposed construction, economize the design, assess ground conditions, and evaluate impact on the pre-existing neighbouring structures.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1964

Calculator Use in Education

This is because with the use of calculators it becomes fast to solve mathematics problem in less time and by use of little energy. Calculators make students be used to them; this makes the students [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 596

Virtual Reality Technology

The third negative impact of virtual reality is that it causes human beings to start living in the world of fantasy.
  • 5
  • Subjects: Other Technology
  • Pages: 2
  • Words: 610

Facing Ethical Issues as a Software Engineer

Applying the Kantian theory of ethics the software engineer will have to inform the stakeholders including the investors of the company and the clients that there will be a delay in the launching of the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 998

Fire sprinkler system

Objectives Ascertain the history of fire sprinkler system Portray the role of fire sprinkler system Establish the recommendations for improvement of fire sprinkler system Significance of Study This study is significant in identifying the growth [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3314

Is Modern Conveniences and Technology a Curse or a Blessing?

However, although modern conveniences and technological innovations have some negative effects, the benefits of such conveniences and innovations overshadow such effects; hence, modern conveniences and technological developments have greatly improved the quality of life; hence, [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 845

Technological Driver of Change

Businesses have been pushed to alter how they design and build their websites and applications as a result of the popularity of mobile devices.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 636

New Technologies: Advancements and Challenges

The advent and improvement of new technology are crucial to realizing the finite opportunities in the various contexts of society. In conclusion, the advancement of new and sophisticated technology has been of significant positive influence.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 695

Aspects of Malware: Detection and Analysis

The host of malware is software that the virus itself has infected. Even if a system is rebooted, the majority of malware will continue to operate.
  • Subjects: Computer Security
  • Pages: 27
  • Words: 7535

Aviation: F/A-18E Super Hornet

Due to the strengthening of chassis supports in particular and the design of the aircraft in general, the upgraded fighter bomber has a maximum landing weight of 4100 kg more than the F/A-18C/D.
  • Subjects: Aviation
  • Pages: 4
  • Words: 792

CRISPR: The Emerging Biotechnology

The understanding of CRISPR can negatively impact the manufacture and deployment of bioweapons through the application of technology to improve the lethality of bacteria or potential viruses.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 635

The Place of Humanity in the Robotic Future

The developers are trying to implement the brain, the human mind, in a digital environment. Paying attention to mechanical machines, commonly called "robots", can be seen that they are created in the image and likeness [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 401

The Internet of Things (IoT) Security

The security of iOS devices is ensured primarily by maintaining the integrity of the code, verifying the authenticity of users and devices, and assigning ownership rights to users.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 307

Classification of Mobile Applications

Utility apps are the kind of applications that people need daily. The user session time is one of the longest in entertainment and social media apps.
  • Subjects: Applications
  • Pages: 2
  • Words: 576

Cybersecurity Dangers and Their Analysis

The officer clicks the file, and the malware attacks the system stealing the data and bypassing some security measures. The cyber security framework under the NIST is helping organizations to understand and manage cybersecurity.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2960

Analyzing the iPhone as an Artifact

At the time of the release of the first iPhone, it was a challenge for thinking and action for the whole world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1140

Impact of Video Games on People’s Physical Health

The hypothesis in the article engulfs determining the effect of video gaming on the increase in lean and fat mass, men showing more adverse effects than women, and the positive impact of the intervention program.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 917

Electric Coffee Maker: The Use of Pseudocode

Program Name: Coffee Maker Functions Code for Coffee Maker Functions: Apply PresetTime to begin brewing while the coffee maker is OFF IF want to set CoffeeMakerTime Press ON x 2 Apply input HH:MM Press ON [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 327

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

Mobile Phone Use Effects on People’s Lifestyles

Therefore, it is important to study how mobile phones affect individuals' lifestyles to prevent the development of mobile phone addiction. According to Gligor and Mozo , smartphone addiction in students is associated with chronic stress, [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1161

Photoshop: The Story and the Impact

Photography and graphic design play an important role in the life of the modern society. Photography an Photoshop are the parts of a variety of fields and industries today.
  • Subjects: Applications
  • Pages: 7
  • Words: 895

Use of Seatbelt While Driving

The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1038

Al Taweelah Desalination Plant

The three firms on the site were the Al Taweelah Power Company that ran the B and B2 plants, the Gulf Total Tractebel Power Company that ran A1's phase 1 and phase 2 plants and [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 627

Mobile Devices and Convenience

Mobile devices that fulfill such requirements provide the merit of functionality optimization, mobile network security with the consequence of the reduction in costs associated with downtimes while not negating the privilege of reduced general costs [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1618

Cyber Crimes: Court – United States vs. Ancheta

Reasoning: The jury argued that the defendant conspired to violate the Computer Fraud Abuse Act as well as the CAN-SPAM Act, caused havoc to computer networks of the national defense department of the federal government, [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 548

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1686

Data Visualization Software: The Case of Nike

This is why data visualization is a crucial business asset that may be used to realize the organization's full potential with the help of experts in the field and all the insights gained from the [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2301

Impact of Science and Technology

If the answer to all such questions is in the negative then undoubtedly science and technology have made a great impact on our lives and surroundings.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 600

Communication Technologies: From Telegraph to the Internet

From the time the telegraph was invented up to the current time, the world population has continued to increase, triggering improvements in communication technology and leading to the invention of the current-day internet.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1101

The General Civil Aviation Authority’s Challenges

The first security and safety challenges targeted by the GCAA is the presence of consumer drones around airports. The purpose of this application is to allow officials across the nation to track the speed, location, [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1151

The Bring Your Own Device Policy

What are the advantages and disadvantages of allowing employees to use their personal smartphones for work? Compare the BYOD experiences of IBM and Intel.
  • Subjects: Phones
  • Pages: 7
  • Words: 2015

Presentation Mistakes “You Suck at Powerpoint”

Further, the speaker should spend enough time for designing and preparing for the presentation, which is half a success. However, the mechanism of analyzing and tracing is a bit different.
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Gas Station Fires, Their Causes and Effects

The final part of this essay will be to state the possible causes of fires that occur in gas stations. Direct fire will be the main cause of gas station fire that the essay will [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 583

Educational Technologies and Their Integration

The primary goals of technology include 1) orientation of the learners of the widespread of the educational technology; 2) information on how the educational technology can be used as the media opportunities of the teaching [...]
  • Subjects: Technology in Education
  • Pages: 13
  • Words: 3641

The Challenger Space Shuttle Disaster

The case of the space shuttle Challenger is, probably, one of the biggest disasters in the history of American space exploration.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1104

Internet Replacing Books as Learning Tool

The Internet is an opportunity to save time, find the required information, and use global connections, as well a threat of being isolated, misunderstood, and mislead; therefore, such factors as fashion, the role of parents, [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1735

Space Shuttle Challenger’s Explosion Factors

A fault tree analysis can be used to identify and examine the major factors that led to the failure of the O-rings in the Solid Rocket Boosters. The failure of the O-rings led to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 836

The Process of Arc Welding: Main Aspects

The welding process is so broad that mechanical engineering as a discipline is part and parcel of it. Within the process of arc welding are other types which are described below: In this process, the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1155

Closed-Circuit Television Surveillance and Security

This aspect has led to the emergence of new forms of physical security systems to counter the changing security threats by improvising mechanisms of security threats perceptions and surveillance.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4207

The Ballpoint Pen: Materials, Process and Issues

This essay explores the geological information of the raw materials, the processing steps and the environmental issues. With the raw materials ready, brass is obtained from a mixture of the two, with copper dominating the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 645

How Does Technology Affect the Economy?

The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
  • 5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 887

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

Comparison Between two Operating Systems

Windows XP ensures that any free memory in the RAM is allocated to a certain process so as to help in improving the performance of the operating system.
  • Subjects: Computer Science
  • Pages: 19
  • Words: 5256

Solar Furnace (Font Romeu – Odeillo, France)

The furnace stands as a demonstration of the potential of solar energy to the world and it remains amongst the world's greatest projects especially in the line of solar energy exploitation.
  • Subjects: Engineering
  • Pages: 12
  • Words: 3329

Benefits and Dangers of Ethical Hacking

The advantages of ethical hacking The following are some of the advantages associated with the use of ethical hacking in an organization.
  • 5
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1613

Contingency Plan for Generation Next Airport

In the event that all lavatories become inoperable during a tarmac delay, the airline will return to the gate as soon as practical or make other arrangements to immediately service the aircraft to return the [...]
  • Subjects: Aviation
  • Pages: 22
  • Words: 5807