Tech & Engineering Essay Examples and Topics. Page 4

4,372 samples

Hyperloop Case Study

The concept of a relatively new technology named Hyperloop is expected to change the way we view transportation. It is not a jetpack but rather a sort of high-speed train.
  • Subjects: Other Technology
  • Pages: 20
  • Words: 3691

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Subjects: Internet
  • Pages: 4
  • Words: 1285

Cloud Computing in Business

Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
  • Subjects: Cloud Computing
  • Pages: 13
  • Words: 880

Aspects of Laptop Rental Service

Upon return of the product, the computer will be evaluated, and the student will be billed fully for the full time the product was rented. Therefore, students attending the university will be the target market [...]
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3052

Propeller-Driven Performance vs. Jet-Driven Performance

Propeller-driven aircraft is more efficacious at low speeds than jet-driven aircraft, for they create higher propulsive efficiency and, consequently, greater thrust while the craft is moving at lower airspeed; however, jet-driven aircraft experience the deficiency [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 655

Network Reconnaissance Using Command Line

The command enters works through the interactive mode when no arguments are stated, or when the in itial argument is a - and the following argument is the server's internet address name or the host [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2247

Use of Seatbelt While Driving

The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1038

Mobile Devices and Convenience

Mobile devices that fulfill such requirements provide the merit of functionality optimization, mobile network security with the consequence of the reduction in costs associated with downtimes while not negating the privilege of reduced general costs [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1618

How Solar Traffic Lights Works

One of the most serious challenges in the world today is the scarcity of energy resources. The Americans started using traffic lights in 1912."Salt Lake City is where the traffic lights were first used to [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1371

Low-Cost Carriers and Secondary Airports

LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
  • Subjects: Aviation
  • Pages: 2
  • Words: 929

Qantas Airways: Cross Culture and Safety Management

The latest development in the field is relevant to cross-cultural issues and their impact on safety which still requires further study and appropriate application in the airline industry as merger and acquisition of airlines is [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3740

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

Screen Readers’ Evolution and Their Current Usability

The study results constitute a linear account of the instruments, technologies, and events that caused the advance of assistive technologies and screen readers specifically, outlining their history.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2091

Data Visualization Software: The Case of Nike

This is why data visualization is a crucial business asset that may be used to realize the organization's full potential with the help of experts in the field and all the insights gained from the [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2301

The Concept of Artificial Neural Networks

The concept of artificial neural networks as a method of imitating the functioning of the human brain is currently defined as "a tool for predicting and modeling the phenomena that is inspired by the human [...]
  • Subjects: AI
  • Pages: 1
  • Words: 292

Cyberbullying as a Serious Issue

However, it is easy to postpone the completion of the course work and take a longer time to complete a course.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Router as Component of a Network Connection

In terms of their mode of operation, routers generally make use of protocols for communicating with other computers on the network in order to find the best path between them.
  • Subjects: Internet
  • Pages: 5
  • Words: 1397

Sherry Turkle’s “Can You Hear Me Now”

In one of the conferences she attended in Japan, the author observed how engrossed the attendees of the conference were with their laptops and PDA's.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 1019

Computer Security: Bell-Lapadula & Biba Models

Cybersecurity policies require the formulation and implementation of security access control models like the Bell-LaPadula and the Biba, to successfully ensure availability, integrity, and confidentiality of information flows via network access.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 882

Information Technology in the Employment Field

Information technology is the branch of technology devoted to the study and application of data and the processing thereof. Moreover, the development and use of the hardware, software, firmware, and procedures associated with this processing [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2155

Modern Technology: Advantages and Disadvantages

The disadvantages of modern technology involve numerous risks related to people's cognitive intelligence and children's healthy development. The problem related to the exposure to age-inappropriate materials with the help of new technology can be solved [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 904

Home Networks, Their Functions and Features

A home network is a small local area network that enables communication among two or more computing devices within a limited area of a home. Typical elements of a home network are a modem, a [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 552

Evie.ai: Artificial Intelligence and Future Workforce

That is why it is crucial to analyze some trends in artificial intelligence that are being adopted by many businesses for better functioning, in particular, the implementation of Evie.ai, its functions, and the consequences.
  • Subjects: AI
  • Pages: 4
  • Words: 1215

The Bring Your Own Device Policy

What are the advantages and disadvantages of allowing employees to use their personal smartphones for work? Compare the BYOD experiences of IBM and Intel.
  • Subjects: Phones
  • Pages: 7
  • Words: 2015

Presentation Mistakes “You Suck at Powerpoint”

Further, the speaker should spend enough time for designing and preparing for the presentation, which is half a success. However, the mechanism of analyzing and tracing is a bit different.
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Educational Technologies and Their Integration

The primary goals of technology include 1) orientation of the learners of the widespread of the educational technology; 2) information on how the educational technology can be used as the media opportunities of the teaching [...]
  • Subjects: Technology in Education
  • Pages: 13
  • Words: 3641

Information and Communication Technology in Learning

According to the results of the experiment during which the students had to work with an interactive board, the incorporation of ICT into the academic process allows students to acquire the needed abilities faster and [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1188

The Challenger Space Shuttle Disaster

The case of the space shuttle Challenger is, probably, one of the biggest disasters in the history of American space exploration.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1104

The Printing Technology: Principles and Applications

It has been established that the thickness of the dead zone is in the range of tens of micrometres, which calls for a judicious estimation of the correct parameters to be used as conceptualised in [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1687

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
  • 5
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1413

Time Travel: Is It to the Past or Future?

The purpose of this paper is to investigate the domain of time travel and to provide evidence that traveling to the future is more likely than to the past if the necessary conditions have been [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 894

Space Shuttle Challenger’s Explosion Factors

A fault tree analysis can be used to identify and examine the major factors that led to the failure of the O-rings in the Solid Rocket Boosters. The failure of the O-rings led to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 836

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

Frequency Modulation, Its Applications and Future

The main reason the review of frequency modulation is the focus of the research is the rise in popularity of the digital media, which requires the novel approach and means of operation.
  • Subjects: Other Technology
  • Pages: 12
  • Words: 3371

Security and Logical Functions of Microsoft Excel

This consists of the cell which can be a text or value which identifies the information in the cell. IS" can be described as another function of the excel program that describes the nine functions [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 599

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1162

Closed-Circuit Television Surveillance and Security

This aspect has led to the emergence of new forms of physical security systems to counter the changing security threats by improvising mechanisms of security threats perceptions and surveillance.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4207

Colgan Flight 3407: Human Factors of the Accident

The cause of the accident was attributed to the failure of the flight crew to monitor airspeed according to the rising position of the low-speed cue, the flight crew's failure to stick to the cockpit [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1845

The Ballpoint Pen: Materials, Process and Issues

This essay explores the geological information of the raw materials, the processing steps and the environmental issues. With the raw materials ready, brass is obtained from a mixture of the two, with copper dominating the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 645

How Does Technology Affect the Economy?

The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
  • 5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 887

Engineers and Ethical Dilemmas

Recently in the Kenyan media there was a situation in which a road engineer had been approached by the government to aid in the design and construction of a road in the Langata area.
  • Subjects: Engineering
  • Pages: 2
  • Words: 585

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Subjects: Computer Science
  • Pages: 35
  • Words: 2834

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Internet Filtering Positives and Negatives

The issue of keeping of information by governments does not hold because as the government leaves the internet open to no filtering, it only protects the rights of a few individuals.
  • Subjects: Internet
  • Pages: 4
  • Words: 1042

The Evolution of the Car Engine

France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2226

Comparison Between two Operating Systems

Windows XP ensures that any free memory in the RAM is allocated to a certain process so as to help in improving the performance of the operating system.
  • Subjects: Computer Science
  • Pages: 19
  • Words: 5256

Geotechnical Failure

The purpose of the preliminary study is to examine suitability of the study for the proposed construction, economize the design, assess ground conditions, and evaluate impact on the pre-existing neighbouring structures.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1964

Technology Development In Asia

The science and technology in the Republic of India, for example, has employed advanced technologies in the manufacture of commercial vehicles.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1619

The Dishwasher Advantages

Many people now rely on the dishwasher, and the traditional method of manually cleaning the utensils has become a thing of the past.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1068

Benefits and Dangers of Ethical Hacking

The advantages of ethical hacking The following are some of the advantages associated with the use of ethical hacking in an organization.
  • 5
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1613

Cheating in the Internet

The presence of ecommerce has increased the number of fraudulent deals in the internet. However, with the increasing number of transactions in the internet, fraudsters are taking advantage of the situation.
  • 1
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Calculator Use in Education

This is because with the use of calculators it becomes fast to solve mathematics problem in less time and by use of little energy. Calculators make students be used to them; this makes the students [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 596

Contingency Plan for Generation Next Airport

In the event that all lavatories become inoperable during a tarmac delay, the airline will return to the gate as soon as practical or make other arrangements to immediately service the aircraft to return the [...]
  • Subjects: Aviation
  • Pages: 22
  • Words: 5807

Different Types of Cement

The other types of cement include the blended and the hydraulic cement. Type one and Type one-A constitute of the Portland cement used for most of the basic construction.
  • 5
  • Subjects: Engineering
  • Pages: 3
  • Words: 853

Computer System Electronic Components

The Random Access Memory commonly referred to as RAM is another fundamental component in a computer system that is responsible for storing files and information temporarily when the computer is running. The other storage component [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 526

Facing Ethical Issues as a Software Engineer

Applying the Kantian theory of ethics the software engineer will have to inform the stakeholders including the investors of the company and the clients that there will be a delay in the launching of the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 998

People Have Become Overly Dependent on Technology

This is because it has come to the knowledge of many that human being is prone to errors, and the only way these errors can be eliminated is to engage technology in order to ensure [...]
  • 4.3
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1095

How to Use an Automatic Gas Cooker

Place the gas control knob on to the gas cock axis and push it inward firmly. Maintenance of your gas cooker Always clean the top of your gas cooker with soap and water and dry [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 623

Inventions That the World Would Do Without

For instance, the invention of communication technology has been of great help to the entire world because of the convenience and reliability it has come with.
  • 5
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 568

Metaverse and Its Influence on Society

The metaverse has the potential to revolutionize entertainment, improve communication and collaboration, and increase equality. The possibility of using the metaverse as a tool for monitoring and management is a serious concern.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 824

Technological Driver of Change

Businesses have been pushed to alter how they design and build their websites and applications as a result of the popularity of mobile devices.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 636

Smartphone Technology: Impact on the Camera Industry

The camera industry has been disrupted due to smartphone technology because of the improved camera experience and the cloud's capabilities, thus, companies are recommended to adopt measures such as software implementation to avoid being eclipsed.
  • Subjects: Phones
  • Pages: 4
  • Words: 988

Forces on a Rotating System Laboratory

The mass appears to push outward due to its inertia in the case of a spinning system because the centripetal force pulls the mass inward to follow a curved path.
  • Subjects: Engineering
  • Pages: 2
  • Words: 576

Artificial Intelligence: History, Challenges, and Future

In the editorial "A Brief History of Artificial Intelligence: On the Past, Present, and Future of Artificial Intelligence" by Michael Haenlein and Andreas Kaplan, the authors explore the history of artificial intelligence, the current challenges [...]
  • Subjects: AI
  • Pages: 2
  • Words: 606

Recovery of Airbus A380 From Failure

The demise of the A380 can be linked to various issues, including a change in the market as well as reduced demand for the craft, that is regarded among the largest airplanes.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2316

New Technology’s Influence on the Future

This paper will focus on the analysis of this problem and what innovations in the current world are important and able to change the market industry in the future.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1719

Engineering: Technological Discipline

With software engineering, students are taught about computers and technology and how they can code programs and design applications, software and websites. The most popular and growing professions are electrical engineering.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Human Performance and Technology in Education

In the article "Application of Performance Technology in Educational Technology," Yingying Sun asserts the attention and concern channeled towards the performance technology in the educational technology framework.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1214

Data Presentation and Visualization

I would use a graphical method to present the data in the report. On the other hand, data presented in a column of numbers is difficult to understand and draw insights for decision-making.
  • Subjects: Data
  • Pages: 2
  • Words: 618

Drawing 3D Objects With Use of Robotic Arm

The hot end of the printer melts the material and embeds it onto the surface onto the intended surface. The research also utilized the Arduino development board to interface the programs written and the physical [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2759

Aspects of Malware: Detection and Analysis

The host of malware is software that the virus itself has infected. Even if a system is rebooted, the majority of malware will continue to operate.
  • Subjects: Computer Security
  • Pages: 27
  • Words: 7535

Experiences of Beginner in Python Programming

Difficulty in working with Python for me is understanding what and how to include in the code. Thus, Python is in high demand in IT and, at the same time, is known as a programming [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 570

The Solar Powered Flashlight and Its Advantages

Once fully charged, the solar powered flashlight will play an important role of ensuring one is able to navigate all the challenges that might arise at night.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 556

CRISPR: The Emerging Biotechnology

The understanding of CRISPR can negatively impact the manufacture and deployment of bioweapons through the application of technology to improve the lethality of bacteria or potential viruses.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 635

The Place of Humanity in the Robotic Future

The developers are trying to implement the brain, the human mind, in a digital environment. Paying attention to mechanical machines, commonly called "robots", can be seen that they are created in the image and likeness [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 401

Defining Data, Information, and Knowledge

Thus, information can be defined as data that develops in one's cognitive system with the help of context and human intention. Knowledge is the process of understanding and explaining the information that happens in the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 852

The Role of Databases in Organizations

In the contemporary technology-driven world of business, the use of information technologies is essential for the efficient and competitive implementation of business practices.
  • Subjects: Data
  • Pages: 1
  • Words: 291

The Autopilot Systems: Examples of Devices

The Pixhawk 4 and MP21283X autopilots with different characteristics to redundancy are analyzed, as well as the NASA Swift UAV using off-the-shelf autopilot solutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 702

Buffer Overflows and Data Execution Prevention

Since buffer overflow is about memory, the user can protect it by not writing beyond the specified space, which can be covered by the Data Execution Prevention method by preventing the application from being executed [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 858

Smoke Control Systems, Their Types and Analysis

The construction of a building determines the type of smoke control system that will be the most relevant in it because the effectiveness of control depends on the organization of space.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1721

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

Data Buses: Definition and Key Features

The significance of the address bus is to assist the CPU in locating specific information in the memory, while the control bus regulates data processing.
  • Subjects: Data
  • Pages: 1
  • Words: 286

Phones and Teenagers’ Mental Health Connection

This essay aims to discuss the connection between phones and teenagers' mental health and explain why the use of smartphones is merely a reflection of problems that children would face either way.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 587

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Cybersecurity Implementation Plan for PBI-FS

Therefore, the current plan will define the objectives, goals, and objectives, and scope of the implementation. The implementation of the cybersecurity management plan pursues both business and project goals and objectives.
  • Subjects: Cyber Security
  • Pages: 16
  • Words: 4430

Is the Internet Affecting People Negatively?

Opponents of the Internet tend to view and criticize it one-dimensionally as a source of mindless entertainment, whereas in reality, it is rich with potential uses that have their unique properties.
  • Subjects: Internet
  • Pages: 5
  • Words: 1306

Cybersecurity in the Energy Sector

The stable supply of energy is the key to the normal functioning of American society, as it fuels all essential industries that ensure the vitality of the nation.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 630

Mobile Phone Use Effects on People’s Lifestyles

Therefore, it is important to study how mobile phones affect individuals' lifestyles to prevent the development of mobile phone addiction. According to Gligor and Mozo , smartphone addiction in students is associated with chronic stress, [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1161

The Delta Airlines Flight 191 Crash

When the pilot successfully flies through to the other end of the microburst, the direction of the wind changes and becomes a tailwind because it is now behind the plane.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2849

How Computer Works?

In order for a computer to function, stuff such as data or programs have to be put through the necessary hardware, where they would be processed to produce the required output.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 891

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 50
  • Words: 14365

How Animation Can Teach Children History

The development of interest in the subject will be greatly enhanced if there is a close partnership between the animators and teachers in designing the desired syllabus with the acquaintance of the tools of animation.
  • Subjects: Technology in Education
  • Pages: 23
  • Words: 6441

Boston Dynamics’ Spot Robot Dog

Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
  • Subjects: Robotics
  • Pages: 4
  • Words: 357

Photoshop: The Story and the Impact

Photography and graphic design play an important role in the life of the modern society. Photography an Photoshop are the parts of a variety of fields and industries today.
  • Subjects: Applications
  • Pages: 7
  • Words: 895

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 974

The Flashlight Technology Description

The plastic casing of the husky flashlight consists of a 5 inch cylindrical plastic container with a very thin spring or a strip piece of metal that is used to make the electrical connections between [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 649

Recovering from Computer System Crashes

In the event of a crash, the first step is to identify the type of crash and then determine the best way to recover from the crash.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1442

Method of Construction of Hydro Schemes

In the first section, the construction techniques used in the construction of the dams and their hydropower stations are given in detail.
  • 4
  • Subjects: Engineering
  • Pages: 18
  • Words: 4900