Tech & Engineering Essay Examples and Topics. Page 37

5,901 samples

Video Games as Learning Tools

There are at least three major ways to redeem the value of video games in the context of the development of cutting-edge learning tools based on the same format that developers use to provide violent [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1181

Telepresence as a Modern Technology

The success of this invention can be attributed to the development of broadband Internet services that are available in different parts and regions across the globe.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 657

Methodology in Engineering Innovations

To determine the feasibility of the solution for the proposed experimentation, the researchers have reviewed the existing literature to find support for the intervention and justify its effective potential. Since engineering is a practical science, [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 143

Online Wikipedia: Threat Analysis

On the other hand, it is limited since a person willing to post information to its website or edit the already available information has to have access to a computer connected to the internet.
  • Subjects: Internet
  • Pages: 5
  • Words: 1582

Joint Technical Architecture

The components of JTA are budding and consist of interfaces, services areas, and standards that are compatible with the requirement of the DoD's architecture.
  • Subjects: Programming
  • Pages: 3
  • Words: 844

Web and Networking: Main Questions and Features

In the Defense Health IT System, the employees are able to access to programs, files, data from a database and documents elsewhere, while being in different location in the organization.
  • Subjects: Internet
  • Pages: 4
  • Words: 1305

Aircraft Navigation History

First, people had to use the tactics they utilized moving on the land, but the use of radio, radar, and, finally, satellites enabled people to improve navigation significantly.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1097

Administrative and Academic Software

This enhances the campus ecosystem which comprises of the student information system and mainly deals with the integration of departments as well as regulation of the flow of work within the respective departments.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 674

Cyber Law: Legal Environment of Business

Because internet and cyberspace are fast becoming a fundamental part of the society, all people should have knowledge about the dangers and damages of cyber tort.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 859

Information Technologies Compliance Audits

The Turkish courts, which were the subject of his study, could adopt specific guidelines to enhance effectiveness and the ease of IT compliance audits.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2212

Impact of Technology on the K-12 Education

The major asset of the present research is that the T-test will indicate the students' performance progression. The paired sample T-test is the core of the proposed quantitative research, which is designed to establish if [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 636

Iron Triangle: Project Management

In this regard, the iron triangle becomes not the only measure that could be used to evaluate the nature of a particular business, its outcomes, and success as new and significant criteria appear.
  • Subjects: Project Management
  • Pages: 2
  • Words: 552

The OPM Security Service

The further investigation likewise revealed that the attack was conducted by the so-called "outsider" an illegitimate user that accessed the system due to the flaws in the information security system.
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1396

Android and Apple’s iOS Platforms Advantages

Despite the overwhelming popularity of Apple's products and lifestyle that the company promotes, it is worth noticing that in 2015 the market share of Apple in the USA has fallen to its lowest point for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 578

Oracle Systems and Human Resource Management

The present paper describes the benefits of the technology and assesses the outcomes of the integration of in-house HR systems with Oracle, productivity changes, preservation of time, and mail administration under the new circumstances.
  • Subjects: Applications
  • Pages: 2
  • Words: 571

Riverside Community Park Project Management

The project manager communicated with the leaders of the teams to ensure efficient collaboration between all the groups involved. The project manager expressed the willingness to meet the needs and wants of the community.
  • Subjects: Project Management
  • Pages: 2
  • Words: 561

Human Factors in Aviation Accidents

This fatal accident led to the death of all the passengers and members of the crew. The second framework that can be used to analyze the role of human factors in aviation accidents is the [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1663

Using the Boks in the Field of Project

The BOKs used in the field of project management are the APM's BOK and the PMBOK created in the United States and the United Kingdom.
  • Subjects: Project Management
  • Pages: 2
  • Words: 606

The Three Types of Hackers

The article "They are attacking you: learn the three types of hackers' was written by Jonathan Nichols and explores the three main types of hackers that attack organizations and their clients, and the factors that [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

The Art of Leading a Team: Project Management

Traditionally, the scope of PM is defined by the differences between the goals of a particular project and the tools that are used to attain the set objectives.
  • Subjects: Project Management
  • Pages: 2
  • Words: 594

Elsevier Publisher: Technologies Solutions

As reported by Gowers, Elsevier has earned the title of a "gorilla of scholarly publishers" because of the way it manages the business and the knowledge that is available to it, the access to which [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 822

Deutsche Telecom Company’s Cyber Security

The present work deals with the issue of DDoS attacks and builds a case on one of the well-known IT companies to single out the problem, the immediate solutions and preventive practices, and the lessons [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1377

Innovation in Textiles: New Fabric

According to researchers, combining two types of electricity generation into one textile paves the way for developing garments that could provide their own source of energy to power devices such as smart phones or global [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 1001

Business Algorithms: Analytics and Optimization

The most widely known example is algorithmic trading which allows the business to evaluate the price of the trade, assess the risks related to the trade, and calculate the time necessary for the trade.
  • Subjects: Programming
  • Pages: 2
  • Words: 560

Digital Labor in Contemporary Asia

Such changes can be seen in the way of living of people nowadays, as well as in the status of development in the majority of the countries.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2447

Cyberbullying and Suicide

In other countries where religion plays a key role in the values and norms of the people, suicide is a topic that is rarely discussed.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 850

Fifth Generation Mobile Networks Technology

The most promising direction in a new generation of mobile networking is the use of millimeter-wave band transmission, which has the potential to fulfill some of the criteria specified above.
  • Subjects: Phones
  • Pages: 5
  • Words: 1454

Cyber Risks in Emerging Markets

The article includes a description of major threats and concerns, as well as particular recommendations as to companies' further development in the area of cyber security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 949

Spot Mini Robot by Boston Dynamics

While the bigger robots by Boston Dynamics are designed to operate in extreme conditions, Spot Mini is a household robot, which makes it marketable to a wider community and, therefore, profitable.
  • Subjects: Robotics
  • Pages: 2
  • Words: 551

Website and Application: New Opportunities

The targeted idea is to design a website and an app that can support the needs of graduates from different parts of the world. The proposed website will be linked with the app to ensure [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 569

Computer Literacy: Parents and Guardians Role

Filtering and monitoring content on the internet is one of the most important roles that parents in the contemporary world should play, and it reveals that parents care about their children.
  • Subjects: Internet
  • Pages: 2
  • Words: 576

The Digital Revolution Creating

The efforts and activities of these innovators made it possible for numerous gains to be made in the future. The second interesting thing is that most of the achievements made in the world of technology [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 854

Boeing 767 Crash: Mass Disaster Investigation

For this reason, it is vital to investigate reasons that predetermined the failure and guarantee the creation of the efficient solution needed to avoid the same incidents in the future.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 833

Katy Independent School District Curriculum Software

This curriculum software can be used for a variety of purposes, which include: Management of the Curriculum Program, which includes Curriculum Mapping, analysis, and exemplars.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 835

Cybersecurity Risks Affecting Enterprises

From a national security standpoint, it is crucial to know and understand the nature of the enemy and be prepared for an increase in cyberterrorism attempts.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 546

Emerging Risks in Cyberspace Security

Therefore, the security requirements of cyberspace infrastructure and flow of information coincide with some of the national security imperatives and have to be protected by government actors.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 587

Li-Fi as the Future of Wireless Technology

It is important to discuss the problem associated with the use of wireless communication technologies, accentuate the goals and significance of this study, present research questions, and review the recent literature on the topic of [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1591

TransAsia Airways Flight 235 Accident

The purpose of this paper is to review the Flight 235 accident, as well as to analyze the causes of its origin and the importance of the human factor, which made a critical contribution to [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2171

Falcon 24 Aircraft: Project Management

According to Cooke-Davies, the project involves the design and production of an aircraft that has a supersonic speed of 2,400 km/h. The aircraft uses the state of the art technology that has been tested and [...]
  • Subjects: Project Management
  • Pages: 12
  • Words: 3299

Cyber Security and Employees

The major factors that define the thriving of cyber ganging are the insufficient level of employees' competence, the lack of knowledge about the technical side of information protection, and non-compliance with safety standards.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 544

Monitoring Toddlers and Technology

The interactive elements are very engaging for toddlers and the unlimited nature of the video on demand services such as YouTube and Netflix, and game programs can be addictive to the children who have not [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 842

Cybercrime and Digital Money Laundering

The result of the investigation was the indictment of Western Express and a number of the company's clients for several charges including stolen credit card data trafficking and money laundering.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 574

Information Security and Potential Risks

Meanwhile, it is necessary to admit that the implementation of the new IS strategy implies a series of risks. Lastly, a pilot test is likely to be useful in terms of the expenses' assessment.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 827

Television, Its Invention and Technical Evolution

The history of television involves the contribution of several engineers from different parts of the world. This paper seeks to explore the technical evolution of the television from its invention to the current developments.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1099

Workplace Safety Issues in the Mining Sector

There are several factors such as the increase in pollutants and the emergence of more communicable diseases in the workplace, which might put the lives of the employees in danger.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 886

Information Security Management System: ISO 27001

According to the existing description of the standard, the process of facilitating a control over the data management processes in a company is crucial to the security of its members.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 868

Science and Innovation in Saudi Arabia Society

The sphere of communication improved with the creation of the telegraph and telephone. The automobile and the airplane entered the lives of the general public, affecting the nature of cities.
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4150

Pedestrian Crossing Upgrade Project in Ku-ring-gai

The overall outcomes of the project included changes that pertain to the practices of the council and other operational changes that occurred after the completion of the project.
  • Subjects: Project Management
  • Pages: 6
  • Words: 1652

Virtual Reality’ Sports Training System Working Steps

The efficiency of the given technology is evidenced by the fact that it is used by various coaches and teams to provide training for their players. For this reason, it is possible to predict the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 563

Cybersecurity and Vital Elements

The focus of any risk management effort is a standard system or a framework that help organizations and individuals to manage integrity, confidentiality, and data and ensure critical resources availability.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2220

Network Security for Mobile Devices

The main concerns of security are maintaining the functionality of the network environment, securing privacy, and providing the integrity of confidential information.
  • Subjects: Cyber Security
  • Pages: 15
  • Words: 4344

Computer Viruses, Their Types and Prevention

A memory-resident virus is one of the most resilient types of viruses out there since it resides in the RAM of the computer and comes out of stasis every time the computer's OS is activated.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1108

Nintendo Game Innovation: Wii’s Principles

In this case, it has to be mentioned that Sony's PlayStation was paying substantial attention to the quality of the image, sound, and speed of the processor to build a perception of one of the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 820

Virtual Reality Technology in Referee Training

Referees need to experience the practical nature of the profession during the training process, and the VR technology will eliminate the underlying challenges to the development of experience in the profession.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1138

Security Management: Addressing Challenges and Losses

Indeed, designing the strategy that would allow introducing people quickly and efficiently to the essentials of security in the workplace, as well as in their private use of the Internet and the related resources is [...]
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1114

The US National Cyber-Security Initiative

The first initiative of the national cyber-security program is to integrate the functions of the Federal Enterprise into one unit using Trusted Internet Connections.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 926

Cyber Law, Cyber Compliance and Information Assurance

Another instance is the violation of the company's rules related to the spread of the information in the social media, and it might be regarded as a primary cause of the dismissal of the employee.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 748

The National Cyber-Security Legislation

In regards to the receipt of threats related to cyber, policies and procedures should be created by the President according to the proposals of the House.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 550

Radix Sort Algorithm, Its Logic and Applications

The sorting process starts from the rightmost digit based on the key or the positions of the numbers being sorted. LSD radix sorts the integers from the least to the most significant digit.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 823

SQL Injection Attacks and Database Architecture

The proximity of SQL infusion weakness enables an assailant to issue command prompts specifically for a web application's database and to subvert the planned use of the application.
  • Subjects: Computer Security
  • Pages: 11
  • Words: 2280

Students’ Mobile Learning in Higher Education

The current concept of m-tools as the household strategy for implementing the teaching and learning process is flawed to a significant extent due to the lack of guidance and support from the tutor that it [...]
  • Subjects: Technology in Education
  • Pages: 24
  • Words: 6075

Guitar Construction: Acoustical Features

It is at the front part of the guitar, and it is the most critical part of the instrument, because the back part and the sides of the guitar reflects the sound back to the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 891

The Big Data Definition

It can be used in any field that requires operations with the big data sets, including the fact that there is a possibility of utilizing the Big Data techniques for the purposes of resolving various [...]
  • Subjects: Data
  • Pages: 6
  • Words: 1743

Passive Solar Heating Systems and Their Benefits

The key benefit of passive solar heating systems is that they reduce the number of greenhouse gasses and hardly pollute the air if we compare them to conventional heating systems.
  • Subjects: Engineering
  • Pages: 2
  • Words: 278

Rooftop Package Units, Economizers, Ventilation

In other words, the sensors are not only able to measure the heat content of the two airstreams, these sensors are also able to compute the difference between the outside air and the air inside [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 848

The Printing Technology: Principles and Applications

It has been established that the thickness of the dead zone is in the range of tens of micrometres, which calls for a judicious estimation of the correct parameters to be used as conceptualised in [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1687

Internet in American Politics, Society, Economics

The internet has and will continue to change the way people in the United States live because it provides necessary interruptions that have a profound effect on the way people think.
  • Subjects: Internet
  • Pages: 6
  • Words: 1643

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1111

Indoor Ski Resort in Dubai Mall of the Emirates

The project is designed to be an attraction to the upcoming Mall of the Emirates. He is paid by the owner and plays the role of the troubleshooter on the team.
  • Subjects: Project Management
  • Pages: 2
  • Words: 562

Project Planning and Scope Management

Therefore, the application of the delay schedule analysis methods in the industry and research aspects is crucial for the improvement of project efficiency.
  • Subjects: Project Management
  • Pages: 6
  • Words: 1718

Advantages of Fresnel Lenses

A Fresnel lens possesses a large aperture and a short focal length, which allows it to capture and focus more from a light source than a conventional lens, and project it over vast distances while [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 612

Quality Performance Monitoring in Construction

Thus, the nature of the construction project presupposes several tasks that should be added to the existing project plan to guarantee the efficient monitoring of quality and overall success.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1117

Max Bögl Company’s Procurement Management

The list of the identified risks is provided in the following table where each risk factor is rated on a five-point scale according to the likelihood of its occurrence and potential impact on the project [...]
  • Subjects: Project Management
  • Pages: 7
  • Words: 2008

Surgeon Students’ Virtual Reality Learning Programs

In order for the students to feel like they are operating on living patients instead of waving instruments in the air, it is necessary to provide the environment that would compensate for the shortcomings of [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1135

Facebook and Employees Political Bias

Additionally, he refers to her personal opinions not discussed in her actual announcements, such as her posts on Twitter and Facebook.
  • Subjects: Applications
  • Pages: 2
  • Words: 251

A South Korean Copy of Snapchat

Snow has become popular because it is focused on the Asian market and, in fact, it introduced Asia-specific features earlier than Snapchat managed to develop them and offer local-language versions of the app.
  • Subjects: Applications
  • Pages: 2
  • Words: 572

The Cultural Impact of Technology in Modern Society

The primary purpose of the paper is to analyze two articles, namely Steve Jobs, Romantic Individualism and the Desire for Good Capitalism by Thomas Streeter and If Thoreau were to move to Walden today, Would [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 915

How Children Are Currently Exposed to Technology?

What is currently happening is that parents are now aware of the fact that their children might spend more than enough time in front of the TV or phone/tablet screen, and that scares most of [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 664

Rügen Bridge: Plan Procurement Management

During this time, the company in charge of the project had not only built a bridge, the core part of which is 4100 meters long, but also contracted other businesses to prepare the surface, smooth [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1201

Hacking: White, Black and Gray Hats

Living in the era of the Internet and online technology increases the vulnerability of the information stored online and on electronic devices.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1391

Digital Transformation: Hyper-Connectedness and Collaboration

The guiding principles for E2E economy formulated by the authors include the ability of organizations to provide optimal customer experiences through the right partnerships, capacity to use contextual and predictive analytics to generate customer value, [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 606

The Cultural Impact of Technology

In a third paragraph, the author argues that such things are not regarded as technological innovations now, and the term "technology" is limited to the description of new electronic devices and digital services which have [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1125

“The Dark Side of Big Data” by Tom Goodwin

The rise of social media and the improvements in data aggregation led to the collection of large quantities of user-generated data, and it was only a matter of time until businesses started using this data [...]
  • Subjects: Data
  • Pages: 2
  • Words: 498

Cultural Impact of Technology on Life

Indeed, much to the credit of the authors and the participants of the conversation, there is a strong tendency for people to view technology as a thing in itself.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 828

E-Books: An Interactive Technology Tool

Since the topic of the lesson is "Domestic Animals," an e-book can provide meaningful and engaging opportunities for the young learners to develop their phonemic awareness and reading skills.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 592

Online Media Publishing Options and Applications

The existing media world provides numerous options for the end-users to reach and scrutinize the information of interest. For the most part, CMS is intended to create a collaborative environment and allow the end-users to [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 1948

A New Weapon Used Against Youth

One of the most difficult issues connected to youth culture is their lack of consciousness when it comes to the use of modern means of communication and other things that were invented to promote knowledge [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1674

3D Printing: Pros and Cons

The authors compare the quick advancement and loss in the price of 3D printers with the rise of the personal computers.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 928

Video Games and Learning

The paper will also analyze the features of good educational video games and the types of skills that can be developed by the new approach to learning.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1132

Web Application Attack Scenario

The simplest example of the application of SQL injections is a situation when the query asks the database to pull the username and password from the database rows.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1191

Saudi Aramco Company’s Engineering Innovation and Ethics

The organization has been operating in the environment of the global market since 1933 and has gained a reputation of the company that promotes technological innovation as the foundational tool for attaining high-quality rates.
  • Subjects: Engineering
  • Pages: 11
  • Words: 3920

Microscopic Traffic SIMmulator Model

Unfortunately, these models are not suitable for ITS applications and large-scale traffic networks. With new ITS developments, incident management, mainline traffic control, and real-time route guidance become possible for traffic management systems.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 846

Attilio Ievoli Accident and Human Errors

The aim of this report is to present actual finding on the probable cause of the accident in which the 4,450 chemical tanker to run aground just some few moments after the change of guard [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2220

Internet Monopolies: Everybody Wants to Rule the World

The article stated that the majority of large and successful businesses that operate with the help of the Internet are fighting very hard to prevent fresh and new businesses from entering the market and capturing [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 569

Information Security Implementation in Healthcare

Consequently, if the policy is endorsed, it means that the administration fully supports it; if the policy is relevant, it means that the policy can be applied at an organizational level; if the policy is [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 636

Wireless Networks’ Historical Development

The paper concludes by describing the implications of wireless networks for different emergency agencies and the police. The history of wireless networks is "founded on the development of the first wireless telegraph".
  • Subjects: Internet
  • Pages: 8
  • Words: 2276