Tech & Engineering Essay Examples and Topics. Page 4

4,409 samples

Cognitive Development: Information Processing Theory

Using the computer analogy, the proponents of this theory assert that the human mind is a hardware comprising of the brain and nerves as peripherals and that the mental processes are software.
  • Subjects: Data
  • Pages: 14
  • Words: 3948

Advantages & Disadvantages of Using Technology in Education

One of the significant advantages of using technology is that it enables teachers to design and implement interactive course materials that could be used to enhance learning experiences that are more pleasurable and meaningful to [...]
  • 2.5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 571

The Impact of Technology in Education

This essay addresses the issue of technology in education by summarizing a scholarly article on the subject and synthesizing the impact of technology in education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 582

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 4954

Geotechnical Failure

The purpose of the preliminary study is to examine suitability of the study for the proposed construction, economize the design, assess ground conditions, and evaluate impact on the pre-existing neighbouring structures.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1964

Cheating in the Internet

The presence of ecommerce has increased the number of fraudulent deals in the internet. However, with the increasing number of transactions in the internet, fraudsters are taking advantage of the situation.
  • 1
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Fire protection systems for Offshore oil rigs

The weight of the barge and the ballast water drives the support legs to the bottom of ocean or the sea in order to avoid further penetration when the rig is in operation.
  • 2
  • Subjects: Engineering
  • Pages: 14
  • Words: 3829

Decision Support Systems

A DSS has three major elements: Database management system that stocks huge volumes of data that is vital in finding solutions to problems for which the DSS has been designed to solve; Model-based management systems [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1369

Java is the best programming language

It is so simple to use, with a user friendly language vocabulary and so fast in compilation these have made it the widely used language in programming.
  • Subjects: Programming
  • Pages: 2
  • Words: 586

Overview of the Internet Age

Although the young tech-savvy generation has been closely associated with the fast growth of digital crime through the internet, it is understood that individuals who are above 35 years account for nearly 45% of all [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 598

The Internet’s Advantages and Disadvantages

The resent and the most influential invention in the life of people is the creation of the Internet. Nowadays, the invention of the Internet allows people monitor the work of the departments abroad, run relationships [...]
  • 5
  • Subjects: Internet
  • Pages: 4
  • Words: 1091

Use of Simulation in Military

The first type of simulation used in the military is live simulation. The second application of simulation in the military is the use of virtual simulation.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

Windows 10 Upgrade Plan for Tetra Shillings Accounting LLC

I believe Windows 10 Pro is the best and most advanced version of Windows currently available. Similarly, when a new update is downloaded, Windows 10 Pro notifies users before installing and restarts to avoid work [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 967

Researching of Ubuntu Operating System (OS)

The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2048

Artificial Intelligence as Technological Advancement

Automation and digitization of healthcare services, marketing, and financial systems through AI are beneficial. While AI is significant for social and economic growth, its application in education should be limited.
  • Subjects: AI
  • Pages: 1
  • Words: 292

America Burning: The Importance of Fire Safety

America Burning has acted as a road map for the fire service and the federal fire programs for the past 15 years, directing them toward enhancing fire safety in the United States."America Burning Revisited" served [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 563

Ethics and Artificial Intelligence

The various AI systems utilize patients' data without their consent and expose their private information. Many AI systems in the healthcare environment utilize patients' data and information without their full consent.
  • Subjects: AI
  • Pages: 1
  • Words: 400

Temperature Effects in Laser Diodes

Consequently, the emission wavelength of a semiconductor laser diode is described by a temperature dependence similar to the bandgap in the same linear order.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1913

Technology in Education and Business

The best forms of inspiration incorporate the thoughts and feelings of the whole team and encourage them to try something new.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 913

Timetable Scheduling Using Generic Algorithms

The results of the article state that the main advantages of using algorithms as the main technology is that it enables the programmers to eliminate early convergence and variation problems are the main challenges linked [...]
  • Subjects: Programming
  • Pages: 9
  • Words: 2667

Modern Communication Impacted by Technology

The purpose of this writing is to examine how communications have evolved as a result of technological advancement. The glorious thing about all of these choices is that people may select the one that best [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 317

Technical Evolution of Automobiles

In 1888, the practically of Benz's car would come to test when his wife, Bertha, and their two sons embarked on a journey using a better version of the car.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2235

Cybersecurity Dangers and Their Analysis

The officer clicks the file, and the malware attacks the system stealing the data and bypassing some security measures. The cyber security framework under the NIST is helping organizations to understand and manage cybersecurity.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2960

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

AppMaker: Threat Agents of Web Attacks

These factors are the capability of the agent, the motivating factor, and the opportunity to attack. This is the main reason most security agents are consistent in exploring web applications with hopes of identifying complicated [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 854

LAN Network Diagram Overview

The twisted-pair cable is used in the given diagram, which is considered the most common type of cabling for LAN. In the given Network Diagram, the unshielded twisted-pair cable is used.
  • Subjects: Internet
  • Pages: 1
  • Words: 158

Artificial Intelligence in Self Driving Cars

The field of Artificial intelligence is one of the newest areas in science and engineering. When explained in terms of thinking critically, AI is the desired outcome of human effort to make computers think, portrayed [...]
  • Subjects: AI
  • Pages: 11
  • Words: 3114

Relational Database: The University Database

A tutor also qualifies as a module coordinator and hence the primary key of any of the tutors is the ModCoord. The association between the module coordinator and the student table is a one-to-many type.
  • Subjects: Data
  • Pages: 10
  • Words: 1912

Aviation Industry: New Technologies

The reason behind this is due to the fact that the researcher believes that as a student attempting to attain a Bachelor of Science in Aeronautics with a Minor in Safety and Human Factors his [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1928

The Development of the Internet

Licklider of MIT suggested a way of linking computers in 1962, and relocated to DARPRA later in the same year to champion the efforts of developing it.
  • Subjects: Internet
  • Pages: 4
  • Words: 554

How Has Technology Affected Your Life?

In this essay, I will provide examples proving the positive and negative influence of technology. I believe that filtering content and controlling the time spent on social networks will maximize the positive influence of technology.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 398

IPhone Product Life Cycle Analysis

The product life cycle is one of the most crucial methods describing the processes of development, introduction, growth, maturity, and decline of a product.
  • Subjects: Phones
  • Pages: 2
  • Words: 557

The Effects of Technology on Our Life

First, to demonstrate how technology has taken up the role of directing people's actions, she uses the example of the balloon that appears at the right bottom side of the computer.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 874

Cyberbullying as a Serious Issue

However, it is easy to postpone the completion of the course work and take a longer time to complete a course.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Resource Description and Access (RDA) in Library

It is printed together by the Canadian Library, The American Library Association, Association as well as the Information Professionals along with the Chartered Institute of Library within the UK.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2396

Fluid Mechanics. Vortex Amplifier

In this way a flow of air is maintained in through the System under control, through the VXA, and out through the vent system.
  • Subjects: Engineering
  • Pages: 4
  • Words: 417

The Increasing Human Dependence on Computers

Large amounts of information can be stored in the computer that is instantly available with the click of the mouse, which enables the ordering and tracking of resources in a very convenient and fast manner.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1443

Computer Virus User Awareness

It is actually similar to a biological virus wherein both the computer and biological virus share the same characteristic of "infecting" their hosts and have the ability to be passed on from one computer to [...]
  • Subjects: Computer Security
  • Pages: 1
  • Words: 685

Information Technology in the Employment Field

Information technology is the branch of technology devoted to the study and application of data and the processing thereof. Moreover, the development and use of the hardware, software, firmware, and procedures associated with this processing [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2155

Geographic Information Systems and Remote Sensing

Use of telescope to look at objects many miles away is an example of remote sensing. Electromagnetic Radiation is usually used to carry data and information in remote sensing.
  • Subjects: Applications
  • Pages: 5
  • Words: 1152

Information Visualization: Task by Data Type Taxonomy

In the Department of Tourism and Commerce Marketing, the way the TTT may be implemented at the individual, group, and organizational levels can be substantially defined by both the types of data used at those [...]
  • Subjects: Data
  • Pages: 10
  • Words: 2734

Personal Protection Equipment in Aviation

Airline workers are habitually exposed to numerous hazards, the significance of which can vary from minor to immediately dangerous to life and health. It is worth remembering that eye PPE can limit the field of [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 557

Wireless Networks’ Historical Development

The paper concludes by describing the implications of wireless networks for different emergency agencies and the police. The history of wireless networks is "founded on the development of the first wireless telegraph".
  • Subjects: Internet
  • Pages: 8
  • Words: 2276

Vibration Control in Rotating Equipment

Vibration in rotating machines occurs because the centre of rotation of a machine does not coincide with center of mass. Machine imbalance is the most common cause of vibration in rotating machines.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2170

Software Bugs Types, Causes and Consequences

A software bug is a term that is used to denote a fault, error, or failure in a piece of computer software, which yields an undesirable result such as a software crash, incorrect behavior of [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 681

Texting Effects on Students Academic Performance

The use of abbreviation and manipulation of the phonological sounds of words improves the imagination and creativity of students. One of the benefits of texting is that it improves academic performance by promoting the spelling [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1692

Accidents and Ramp Damage – Aviation

In order to prevent substantial expenses described afore, it is undoubtedly worthwhile for airlines and aviation companies to invest in ground operations safety and train all the staff working in the ramp and gate areas.
  • Subjects: Aviation
  • Pages: 2
  • Words: 560

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 575

Apple Versus Samsung Smartphones

With the introduction of the Samsung Galaxy S series smartphones, Samsung competes with Apple's iPhone. The screen, look and feel of Samsung smartphones is strikingly similar to that of the iPhone.
  • 4.5
  • Subjects: Other Technology
  • Pages: 3
  • Words: 859

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

Using Smartphones in Learning

The other purpose of the study is to understand the recent developments that have been made to the smartphones and how people are able to adopt the changes.
  • 4.3
  • Subjects: Technology in Education
  • Pages: 22
  • Words: 6084

Monopolistic Competition of Smart Phones

In the flurry of the responses that followed, there was concern whether the smart phone market was becoming monopolistic. This was a clear indication that the competition in the smart phone market was becoming monopolistic.
  • 4
  • Subjects: Phones
  • Pages: 3
  • Words: 863

Bioinformatics and Biotechnology

The purpose of this study is to provide an overview of bioinformatics and to illustrate how bioinformatics can be utilised in the design of drugs and the enhancement of agricultural products.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2598

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

Data Warehousing and Its Benefits for Organizations

The report defines what data warehousing is and explains in details the importance of data warehousing in an organization. The implementation of the SAP in Lenovo has brought more benefits to the Company.
  • Subjects: Data
  • Pages: 5
  • Words: 1372

Impact of Information Technology on Customers

Most businesses in the globe have adopted the digital way and businesses are sacrificing their time and finances to bring in advanced technologies to tackle and manage their processes within the business effectively and efficiently.
  • Subjects: Applications
  • Pages: 6
  • Words: 1642

Contingency Plan for Generation Next Airport

In the event that all lavatories become inoperable during a tarmac delay, the airline will return to the gate as soon as practical or make other arrangements to immediately service the aircraft to return the [...]
  • Subjects: Aviation
  • Pages: 22
  • Words: 5807

Facing Ethical Issues as a Software Engineer

Applying the Kantian theory of ethics the software engineer will have to inform the stakeholders including the investors of the company and the clients that there will be a delay in the launching of the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 998

Improper Internet Use at Work

However, every company has written or unwritten policy for the use of internet and the employees must ensure that they: Comply with the policy Use internet in an acceptable way Do not create unnecessary risk [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1418

Music Industry and Technology

The paper further describes some of the technological innovations and analyses how the innovations have contributed to the positive growth of the music industry.
  • Subjects: Other Technology
  • Pages: 14
  • Words: 3878

Design a helper

Therefore, personal robots in addition to making life easier should be able to perceive and understand the surroundings. However, robots are a source of worry in the future as they can be risky to humans.
  • Subjects: Robotics
  • Pages: 4
  • Words: 1091

Challenges of Computer Technology

Computer Technologies and Geology In fact, computer technologies are closely connected to any sphere of life, and it is not surprisingly that geology has a kind of dependence from the development of computers and innovative [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1673

GLONASS: Russia’s Global Navigation Satellite System

Older GLONASS-M and GLONASS-K1 satellites are still part of the GLONASS system and work with the newer GLONASS-K2 satellites. In addition to the primary ones in Moscow and Krasnoyarsk, several data processing facilities for the [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1793

Natalie Wexler: Reconsidering Classroom Technology

By sharing her experience with Kevin, a student from a minority group with a poor financial background, she demonstrates that the students struggle to interact with technology.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 398

Artificial Intelligence in Aviation

The findings demonstrate that the absence of AI-based laws and regulations in the aviation sector has hampered the deployment of safety-critical AI.
  • Subjects: AI
  • Pages: 1
  • Words: 318

The Impact of Photoshop on Graphic Design

Many digital artists have stated that Photoshop is more than just a means to an end, it is a blank slate that encourages them to create something extraordinary with their talents.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1129

Technology Trends and Ethical Considerations

It is important to note that all the trends are significant to society, but some have fewer impacts on the community. In addition, the ability of the robots to have their rights is considered.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 634

Graph Analytics in the Aviation Industry

In response to this significance, several frameworks have been designed to deal with big numbers, given the availability of data and the complex agent interactions. Data extraction and analysis have been in the face of [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2968

Smartphone-Related Cognitive and Ethical Issues

The remarkable rise of smartphones and the rapid adoption of mobile computing are two of the most important developments in contemporary information and communication technology.
  • Subjects: Phones
  • Pages: 6
  • Words: 1780

The Smart Parking Space App and Its Functions

The median occupancy rate for the two days of the week, Monday and Friday, is exactly the same. There is a breakdown of the occupancy rates for each lot, broken down by day and hour.
  • Subjects: Applications
  • Pages: 5
  • Words: 908

Artificial Intelligence: The Trend in the Evolution

Thus, the lens of history is a great way to consider knowledge and understanding of society and technology from a different angle in terms of comprehending the dynamics of society and the importance of technology [...]
  • Subjects: AI
  • Pages: 1
  • Words: 393

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 342

The 2018 Atlanta Government Ransomware Attack Analysis

The legal case showed the poor enforcement of the cybersecurity laws by the municipal government bodies and the resulting unpreparedness of the city governance units to cyber threats.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 928

The Boeing Failure Case Analysis

Several crucial factors contributed to Boeing's issues and consequent crashes of the 737 Max in Indonesia and Ethiopia, disrupting the company's reputation and finances.
  • Subjects: Aviation
  • Pages: 1
  • Words: 455

Airline Certification Process and Dot Operational Requirements

The certification course involves examining the techniques that will be utilized to verify that the systems and the plane conform with federal regulations, carrying out flight and ground tests, and assessing the aircraft to ascertain [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1114

Processor Intel Core i5 and Its Features

The second stage is instruction decode, where instructions are decoded, and file register retrieved to acquire the register values used in the instructions. ALU operations, branch resolution, memory address calculation, and CSR read/write are done [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1177

Cybersecurity: The Matter of National Security

However, if the security of cyberspace is critically evaluated and all the risks eliminated, cyberspace can be an asset that will continue to transform the world.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 332

Analyzing the iPhone as an Artifact

At the time of the release of the first iPhone, it was a challenge for thinking and action for the whole world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1140

Cybercrime and Cybersecurity as Challenges

One will also learn the defensive cyber security technologies and techniques used in modern organizations to protect systems data and achieve Knowledge of the maintenance and design of reliable and safe information systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 560

Phones and Teenagers’ Mental Health Connection

This essay aims to discuss the connection between phones and teenagers' mental health and explain why the use of smartphones is merely a reflection of problems that children would face either way.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 587

Mechanical and Electrical Engineering Branches

It is mainly characterized by the deepening of the specialization of production and the expansion of its scale."Small" metallurgy should be added to the listed divisions of mechanical engineering.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1436

Common Security Models

In the Clark-Wilson model, users do not access the object directly, as an intermediary serves to ensure the integrity of the data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 614

Technology Influence on Problems of Modern Society

In the globalized and digitalized era, it is vital to preserving the balance and control physical activity, food habits, and relationship patterns to avoid suffering from the negative aspects of technologies and their dominance in [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Airport Operations and Cargo Transportation

Considering the significant number of employees in an airport, and the importance of areas restricted for security reasons, staff identification is a crucial part of an airport's landside security.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

How Computer Works?

In order for a computer to function, stuff such as data or programs have to be put through the necessary hardware, where they would be processed to produce the required output.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 891

Computer Network: Data Flow and Protocol Layering

The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

Advancement of Communication Through Technology

From this it can be seen that advances in communication are intertwined with advances in technology and as such this paper will explore the various new forms of communication that have occurred as a direct [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 804

Steganography in Current Digital Media

When the hair grew, the slave went to the recipient of the message who shaved the head to expose the hidden message. In these methods, the hidden information within files may be known to the [...]
  • Subjects: Computer Security
  • Pages: 13
  • Words: 3674

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1077

The Digital Divide Term Description

Currently, the wouldigital divide' is increasingly used to refer to differences not only in access, but also in skill and proficiency level in the field of computers, the net, telecommunications, and information and communication technologies [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1319

Qantas Airways: Cross Culture and Safety Management

The latest development in the field is relevant to cross-cultural issues and their impact on safety which still requires further study and appropriate application in the airline industry as merger and acquisition of airlines is [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3740

Building a PC, Computer Structure

The choices available are Western Digital 320GB and Seagate 320GB and my advice would be to go for Western Digital as it is a good performer all along.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 910

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

Engineering: Engineering Disaster Analysis

The collapse of Schoharie Creek Bridge in 1987 was as a result of error in the engineering design, and one of the major causes of the collapse of the Schoharie Creek Bridge was the excessive [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2454