Tech & Engineering Essay Examples and Topics
- Subjects: Phones, Tech & Engineering
- Pages: 5
- Words: 1454
The most promising direction in a new generation of mobile networking is the use of millimeter-wave band transmission, which has the potential to fulfill some of the criteria specified above.
- Subjects: Cyber Security, Tech & Engineering
- Pages: 3
- Words: 949
The article includes a description of major threats and concerns, as well as particular recommendations as to companies' further development in the area of cyber security.
- Subjects: Robotics, Tech & Engineering
- Pages: 2
- Words: 551
While the bigger robots by Boston Dynamics are designed to operate in extreme conditions, Spot Mini is a household robot, which makes it marketable to a wider community and, therefore, profitable.
- Subjects: Tech & Engineering, Technology in Education
- Pages: 2
- Words: 630
In addition, when the information is pre-recorded, it is possible to schedule the class according to the individual needs of a student.
- Subjects: Internet, Tech & Engineering
- Pages: 2
- Words: 569
The targeted idea is to design a website and an app that can support the needs of graduates from different parts of the world. The proposed website will be linked with the app to ensure [...]
- Subjects: Internet, Tech & Engineering
- Pages: 2
- Words: 576
Filtering and monitoring content on the internet is one of the most important roles that parents in the contemporary world should play, and it reveals that parents care about their children.
- Subjects: Computer Science, Tech & Engineering
- Pages: 3
- Words: 854
The efforts and activities of these innovators made it possible for numerous gains to be made in the future. The second interesting thing is that most of the achievements made in the world of technology [...]
- Subjects: Accidents & Protection, Tech & Engineering
- Pages: 3
- Words: 833
For this reason, it is vital to investigate reasons that predetermined the failure and guarantee the creation of the efficient solution needed to avoid the same incidents in the future.
- Subjects: Tech & Engineering, Technology in Education
- Pages: 3
- Words: 835
This curriculum software can be used for a variety of purposes, which include: Management of the Curriculum Program, which includes Curriculum Mapping, analysis, and exemplars.
- Subjects: Phones, Tech & Engineering
- Pages: 3
- Words: 833
The risk of failure of Smartphones is mainly in the memory access violation and mobile phone hardware such as the batteries and the shell [2].
- Subjects: Cyber Security, Tech & Engineering
- Pages: 2
- Words: 546
From a national security standpoint, it is crucial to know and understand the nature of the enemy and be prepared for an increase in cyberterrorism attempts.
- Subjects: Cyber Security, Tech & Engineering
- Pages: 2
- Words: 587
Therefore, the security requirements of cyberspace infrastructure and flow of information coincide with some of the national security imperatives and have to be protected by government actors.
- Subjects: Internet, Tech & Engineering
- Pages: 6
- Words: 1591
It is important to discuss the problem associated with the use of wireless communication technologies, accentuate the goals and significance of this study, present research questions, and review the recent literature on the topic of [...]
- Subjects: Accidents & Protection, Tech & Engineering
- Pages: 8
- Words: 2171
The purpose of this paper is to review the Flight 235 accident, as well as to analyze the causes of its origin and the importance of the human factor, which made a critical contribution to [...]
- Subjects: Project Management, Tech & Engineering
- Pages: 12
- Words: 3299
According to Cooke-Davies, the project involves the design and production of an aircraft that has a supersonic speed of 2,400 km/h. The aircraft uses the state of the art technology that has been tested and [...]
- Subjects: Cyber Security, Tech & Engineering
- Pages: 2
- Words: 544
The major factors that define the thriving of cyber ganging are the insufficient level of employees' competence, the lack of knowledge about the technical side of information protection, and non-compliance with safety standards.
- Subjects: Accidents & Protection, Tech & Engineering
- Pages: 5
- Words: 868
Foreigners are in a hurry because they have a lot of things to do and fail to meet the deadline. Thus, it cannot be denied that the improvement of traffic safety and driving behavior is [...]
- Subjects: Other Technology, Tech & Engineering
- Pages: 3
- Words: 909
The rapid development and the growing popularity of virtual reality raise a logical interest concerning the advantages and disadvantages that are related to the application of this new technology in various spheres of knowledge and [...]
- Subjects: Tech & Engineering, Technology in Education
- Pages: 3
- Words: 842
The interactive elements are very engaging for toddlers and the unlimited nature of the video on demand services such as YouTube and Netflix, and game programs can be addictive to the children who have not [...]
- Subjects: Cyber Security, Tech & Engineering
- Pages: 2
- Words: 574
The result of the investigation was the indictment of Western Express and a number of the company's clients for several charges including stolen credit card data trafficking and money laundering.
- Subjects: Computer Security, Tech & Engineering
- Pages: 3
- Words: 827
Meanwhile, it is necessary to admit that the implementation of the new IS strategy implies a series of risks. Lastly, a pilot test is likely to be useful in terms of the expenses' assessment.
- Subjects: Internet, Tech & Engineering
- Pages: 3
- Words: 786
However, in a larger perspective, depending on the scope of usage of a particular network, there are also Metropolitan area networks and Campus area networks.
- Subjects: Phones, Tech & Engineering
- Pages: 4
- Words: 1425
The product development process for the Apple i7 mobile handset suits the pull strategy since it fulfills the need for handset functionality and ease of use by customers.
- Subjects: Other Technology, Tech & Engineering
- Pages: 4
- Words: 1099
The history of television involves the contribution of several engineers from different parts of the world. This paper seeks to explore the technical evolution of the television from its invention to the current developments.
- Subjects: Accidents & Protection, Tech & Engineering
- Pages: 3
- Words: 886
There are several factors such as the increase in pollutants and the emergence of more communicable diseases in the workplace, which might put the lives of the employees in danger.
- Subjects: Computer Security, Tech & Engineering
- Pages: 3
- Words: 868
According to the existing description of the standard, the process of facilitating a control over the data management processes in a company is crucial to the security of its members.
- Subjects: Tech & Engineering, Technology Effect
- Pages: 15
- Words: 4150
The sphere of communication improved with the creation of the telegraph and telephone. The automobile and the airplane entered the lives of the general public, affecting the nature of cities.
- Subjects: Project Management, Tech & Engineering
- Pages: 6
- Words: 1652
The overall outcomes of the project included changes that pertain to the practices of the council and other operational changes that occurred after the completion of the project.
- Subjects: Other Technology, Tech & Engineering
- Pages: 2
- Words: 563
The efficiency of the given technology is evidenced by the fact that it is used by various coaches and teams to provide training for their players. For this reason, it is possible to predict the [...]
- Subjects: Data, Tech & Engineering
- Pages: 3
- Words: 931
The merits of consolidations of data on the SAN data facility compared to the dispersion of the arrangements are always evident in the modern business environment.
- Subjects: Cyber Security, Tech & Engineering
- Pages: 8
- Words: 2220
The focus of any risk management effort is a standard system or a framework that help organizations and individuals to manage integrity, confidentiality, and data and ensure critical resources availability.
- Subjects: Cyber Security, Tech & Engineering
- Pages: 15
- Words: 4344
The main concerns of security are maintaining the functionality of the network environment, securing privacy, and providing the integrity of confidential information.
- Subjects: Computer Security, Tech & Engineering
- Pages: 4
- Words: 1108
A memory-resident virus is one of the most resilient types of viruses out there since it resides in the RAM of the computer and comes out of stasis every time the computer's OS is activated.
- Subjects: Tech & Engineering, Technology Effect
- Pages: 4
- Words: 1119
The development of computers is a major breakthrough in the history of humanity which has drastically changed the way humans live nowdays.
- Subjects: Computer Science, Tech & Engineering
- Pages: 3
- Words: 820
In this case, it has to be mentioned that Sony's PlayStation was paying substantial attention to the quality of the image, sound, and speed of the processor to build a perception of one of the [...]
- Subjects: Other Technology, Tech & Engineering
- Pages: 4
- Words: 1175
Therefore, it is imperative to invest in this area to protect the safety of our technology and ensure that we have a viable product.
- Subjects: Other Technology, Tech & Engineering
- Pages: 4
- Words: 1138
Referees need to experience the practical nature of the profession during the training process, and the VR technology will eliminate the underlying challenges to the development of experience in the profession.
- Subjects: Cyber Security, Tech & Engineering
- Pages: 14
- Words: 3910
These emerging cyber security approaches and technologies are unique and new, and they look promising for securing critical infrastructures in the cyberspace.
- Subjects: Tech & Engineering, Technology Effect
- Pages: 12
- Words: 3341
In this connection, the paper is devoted to the proposal of the digital citizenship necessity and its safe implementation including such integral aspects as digital literacy, etiquette, tolerance to other digital citizens, appropriate referencing, and [...]
- Subjects: Computer Security, Tech & Engineering
- Pages: 4
- Words: 1114
Indeed, designing the strategy that would allow introducing people quickly and efficiently to the essentials of security in the workplace, as well as in their private use of the Internet and the related resources is [...]
- Subjects: Cyber Security, Tech & Engineering
- Pages: 3
- Words: 911
In the next month, GOP threatened the company and urged it to cancel the release of the film "The Interview". Sony accepted the demand and did not let the film run on the cinema screens [...]
- Subjects: Cyber Security, Tech & Engineering
- Pages: 3
- Words: 926
The first initiative of the national cyber-security program is to integrate the functions of the Federal Enterprise into one unit using Trusted Internet Connections.
- Subjects: Cyber Security, Tech & Engineering
- Pages: 2
- Words: 748
Another instance is the violation of the company's rules related to the spread of the information in the social media, and it might be regarded as a primary cause of the dismissal of the employee.
- Subjects: Cyber Security, Tech & Engineering
- Pages: 2
- Words: 550
In regards to the receipt of threats related to cyber, policies and procedures should be created by the President according to the proposals of the House.
- Subjects: Computer Science, Tech & Engineering
- Pages: 8
- Words: 2193
A graphic card, usually, referred to as a video card or a graphic accelerator card is an electronic circuit installed on the motherboard inside the central power unit, mostly on Laptops and desktop computers.
- Subjects: Applications, Tech & Engineering
- Pages: 2
- Words: 587
The company's E-Spoon mobile app will be designed for the United States market and will allow its users to search for food venues and make reservations based on a wide variety of parameters that include, [...]
- Subjects: Computer Science, Tech & Engineering
- Pages: 3
- Words: 823
The sorting process starts from the rightmost digit based on the key or the positions of the numbers being sorted. LSD radix sorts the integers from the least to the most significant digit.
- Subjects: Computer Security, Tech & Engineering
- Pages: 11
- Words: 2280
The proximity of SQL infusion weakness enables an assailant to issue command prompts specifically for a web application's database and to subvert the planned use of the application.
- Subjects: Tech & Engineering, Technology in Education
- Pages: 24
- Words: 6075
The current concept of m-tools as the household strategy for implementing the teaching and learning process is flawed to a significant extent due to the lack of guidance and support from the tutor that it [...]
- Subjects: Engineering, Tech & Engineering
- Pages: 3
- Words: 891
It is at the front part of the guitar, and it is the most critical part of the instrument, because the back part and the sides of the guitar reflects the sound back to the [...]
- Subjects: Tech & Engineering, Technology in Education
- Pages: 8
- Words: 2003
The emergence of tablets is one of the recent inventions in the field of education and it is clear that it is soon replacing textbooks. What are the benefits of using tablets in learning institutions?
- Subjects: Data, Tech & Engineering
- Pages: 6
- Words: 1743
It can be used in any field that requires operations with the big data sets, including the fact that there is a possibility of utilizing the Big Data techniques for the purposes of resolving various [...]
- Subjects: AI, Tech & Engineering
- Pages: 12
- Words: 3653
The importance of mobility in the current business context has motivated the use of embedded technology to design systems. It is used in the management of energy systems such as production, distribution, and optimization.
- Subjects: Engineering, Tech & Engineering
- Pages: 2
- Words: 278
The key benefit of passive solar heating systems is that they reduce the number of greenhouse gasses and hardly pollute the air if we compare them to conventional heating systems.
- Subjects: Engineering, Tech & Engineering
- Pages: 3
- Words: 848
In other words, the sensors are not only able to measure the heat content of the two airstreams, these sensors are also able to compute the difference between the outside air and the air inside [...]
- Subjects: Aviation, Tech & Engineering
- Pages: 5
- Words: 1387
As a result of the automation of ATC, more control will be given to pilots and crews, including in conflict management.
- Subjects: Programming, Tech & Engineering
- Pages: 6
- Words: 1776
This paper examines the modes of software piracy, the reasons behind it, who are the offenders, the cost of such actions, and how and who to control them.
- Subjects: Engineering, Tech & Engineering
- Pages: 8
- Words: 2204
The planetary gear system borrows its name from the behavior of the sun and the planets in the solar system, as the gears in the system behave in a similar manner to the planets.
- Subjects: Accidents & Protection, Tech & Engineering
- Pages: 7
- Words: 1903
The current paper will consider the basic features and the structure of the three incident command models or systems: the National Incident Management System, the Joint Decision Making Model, and The National Command Centre.
- Subjects: Computer Science, Tech & Engineering
- Pages: 2
- Words: 590
One of the major contributions of the computer technology in the world has been the enhancement of the quality of communication.
- Subjects: Engineering, Tech & Engineering
- Pages: 6
- Words: 1687
It has been established that the thickness of the dead zone is in the range of tens of micrometres, which calls for a judicious estimation of the correct parameters to be used as conceptualised in [...]
- Subjects: Cyber Security, Tech & Engineering
- Pages: 2
- Words: 359
The value of the assets determines the amount of time and resources that can be invested to protect a particular system.
- Subjects: Computer Security, Tech & Engineering
- Pages: 3
- Words: 850
Bring your device refers to the organizational policy of allowing employees to bring their technological devices to the workplace and use them to carry out organizational duties.
- Subjects: Computer Security, Tech & Engineering
- Pages: 2
- Words: 596
For the majority of modern companies, the process of data destruction is one of the essential procedures allowing the organization to run smoothly and manage their data efficiently while staying protected.
- Subjects: Internet, Tech & Engineering
- Pages: 6
- Words: 1643
The internet has and will continue to change the way people in the United States live because it provides necessary interruptions that have a profound effect on the way people think.
- Subjects: Computer Science, Tech & Engineering
- Pages: 4
- Words: 1111
Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
- Subjects: Project Management, Tech & Engineering
- Pages: 2
- Words: 562
The project is designed to be an attraction to the upcoming Mall of the Emirates. He is paid by the owner and plays the role of the troubleshooter on the team.
- Subjects: Accidents & Protection, Tech & Engineering
- Pages: 2
- Words: 296
To prove the importance of high rates of insurance for young male drivers, it is necessary to think about its benefits.
- Subjects: AI, Tech & Engineering
- Pages: 2
- Words: 496
It is assumed that one of the major factors that currently affect and will be affecting sales in the future is the artificial intelligence.
- Subjects: Project Management, Tech & Engineering
- Pages: 6
- Words: 1718
Therefore, the application of the delay schedule analysis methods in the industry and research aspects is crucial for the improvement of project efficiency.
- Subjects: Engineering, Tech & Engineering
- Pages: 18
- Words: 5010
The uninterruptible power supply system is a power supply backup technology, which provides emergency energy to a system load when the main power supply system fails.
- Subjects: Engineering, Tech & Engineering
- Pages: 2
- Words: 612
A Fresnel lens possesses a large aperture and a short focal length, which allows it to capture and focus more from a light source than a conventional lens, and project it over vast distances while [...]
- Subjects: Project Management, Tech & Engineering
- Pages: 4
- Words: 1117
Thus, the nature of the construction project presupposes several tasks that should be added to the existing project plan to guarantee the efficient monitoring of quality and overall success.
- Subjects: Project Management, Tech & Engineering
- Pages: 7
- Words: 2008
The list of the identified risks is provided in the following table where each risk factor is rated on a five-point scale according to the likelihood of its occurrence and potential impact on the project [...]
- Subjects: Tech & Engineering, Technology in Education
- Pages: 4
- Words: 1135
In order for the students to feel like they are operating on living patients instead of waving instruments in the air, it is necessary to provide the environment that would compensate for the shortcomings of [...]
- Subjects: AI, Tech & Engineering
- Pages: 2
- Words: 658
Some strategies to address these challenges exist; however, the strict maintenance of key areas under human control is the only valid solution to ensure people's safety.
- Subjects: Data, Tech & Engineering
- Pages: 2
- Words: 570
The creation of the World Wide Web was the premise for the emergence of big data. The development of the Internet enabled people to store data online.
- Subjects: Tech & Engineering, Technology Effect
- Pages: 6
- Words: 1735
While it is obvious that effective and diverse means of communication have been at the disposal of entrepreneurs for more than a century now, it is undeniable that the development of the informational technology, especially [...]
- Subjects: Other Technology, Tech & Engineering
- Pages: 3
- Words: 832
It is possible to note that the author provides sound arguments and helps understand the lack of awareness of technology and its development.
- Subjects: Computer Science, Tech & Engineering
- Pages: 2
- Words: 596
Therefore, it is important to use only the best tools when it comes to securing the network and giving access to the most sensitive areas of the system.
- Subjects: Computer Science, Tech & Engineering
- Pages: 5
- Words: 1413
The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
- Subjects: Applications, Tech & Engineering
- Pages: 2
- Words: 251
Additionally, he refers to her personal opinions not discussed in her actual announcements, such as her posts on Twitter and Facebook.
- Subjects: Applications, Tech & Engineering
- Pages: 2
- Words: 572
Snow has become popular because it is focused on the Asian market and, in fact, it introduced Asia-specific features earlier than Snapchat managed to develop them and offer local-language versions of the app.
- Subjects: Other Technology, Tech & Engineering
- Pages: 4
- Words: 1324
In reality, the camera did not change positions in the scene; this effect is the result of the editing done so that a viewer could comprehend the film.
- Subjects: Tech & Engineering, Technology Effect
- Pages: 3
- Words: 915
The primary purpose of the paper is to analyze two articles, namely Steve Jobs, Romantic Individualism and the Desire for Good Capitalism by Thomas Streeter and If Thoreau were to move to Walden today, Would [...]
- Subjects: Tech & Engineering, Technology in Education
- Pages: 2
- Words: 664
What is currently happening is that parents are now aware of the fact that their children might spend more than enough time in front of the TV or phone/tablet screen, and that scares most of [...]
- Subjects: AI, Tech & Engineering
- Pages: 2
- Words: 518
This development in Apple's software is a reflection of the social construction of technology theory based on how the needs of the user impact how technological development is oriented.
- Subjects: Project Management, Tech & Engineering
- Pages: 4
- Words: 1201
During this time, the company in charge of the project had not only built a bridge, the core part of which is 4100 meters long, but also contracted other businesses to prepare the surface, smooth [...]
- Subjects: Internet, Tech & Engineering
- Pages: 8
- Words: 2304
The vast extent of internet trolling is partially explained by the diversity of the topics in which trolls are engaged. Celebrities are among the most popular trolling victims because they have a lot of admirers [...]
- Subjects: Cyber Security, Tech & Engineering
- Pages: 5
- Words: 1391
Living in the era of the Internet and online technology increases the vulnerability of the information stored online and on electronic devices.
- Subjects: Other Technology, Tech & Engineering
- Pages: 2
- Words: 606
The guiding principles for E2E economy formulated by the authors include the ability of organizations to provide optimal customer experiences through the right partnerships, capacity to use contextual and predictive analytics to generate customer value, [...]
- Subjects: Tech & Engineering, Technology Effect
- Pages: 4
- Words: 1125
In a third paragraph, the author argues that such things are not regarded as technological innovations now, and the term "technology" is limited to the description of new electronic devices and digital services which have [...]
- Subjects: Tech & Engineering, Technology Effect
- Pages: 8
- Words: 1239
In the present-day world, the technological advances entailed a significant transformation in the mode of life, and it is possible to say that the new stage of social development is provoked by the growth of [...]
- Subjects: Data, Tech & Engineering
- Pages: 2
- Words: 498
The rise of social media and the improvements in data aggregation led to the collection of large quantities of user-generated data, and it was only a matter of time until businesses started using this data [...]
- Subjects: Tech & Engineering, Technology Effect
- Pages: 3
- Words: 828
Indeed, much to the credit of the authors and the participants of the conversation, there is a strong tendency for people to view technology as a thing in itself.
- Subjects: Internet, Tech & Engineering
- Pages: 2
- Words: 628
I argue that it is our understanding of privacy that provides the solution and that the Internet is the biggest factor that influences it.
- Subjects: Tech & Engineering, Technology in Education
- Pages: 2
- Words: 592
Since the topic of the lesson is "Domestic Animals," an e-book can provide meaningful and engaging opportunities for the young learners to develop their phonemic awareness and reading skills.
- Subjects: Project Management, Tech & Engineering
- Pages: 3
- Words: 845
This project has to be timely so as to ensure that its success has a great impact on the profitability of the company.
- Subjects: Other Technology, Tech & Engineering
- Pages: 3
- Words: 1105
Thus, this project intends to investigate the advantages of using conventional X-ray piping to inspect gas and oil plants over digital x-ray criteria.
- Subjects: Tech & Engineering, Technology Effect
- Pages: 4
- Words: 1224
The aim was to write an article for "The Guardian" while exploring the today's threat to people's privacy originating in mobile technologies, and to link it to Orwell's concept of "telescreens".