Tech & Engineering Essay Examples and Topics. Page 5

4,379 samples

Protection: Housekeeper Safety and Injury Prevention

This paper has established that the duty to reduce injuries and increase safety in housekeeping is a shared responsibility between individual housekeepers and their employers.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2750

Technologies: History of Telephone

First, it is necessary to note that the telephone is a device used to communicate. When a speaker picks up the handset, switch hook is closed, and a direct current is sent to the line [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 571

How Computers Work: Components and Power

The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1077

Technology Evolution in The Modern Society

Service perspective - which holds that e-commerce constitute a tool that fulfills the needs and desires of companies, customers and management with aim of reducing the transaction costs while at the same time being able [...]
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4289

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Subjects: Computer Science
  • Pages: 35
  • Words: 2834

Attribute-Based Encryption Overview and Benefits

The features of the public-key encryption include cryptography, public, and private key. As a result, the user can secure and authenticate data integrity using the private key.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 831

Bioinformatics and Biotechnology

The purpose of this study is to provide an overview of bioinformatics and to illustrate how bioinformatics can be utilised in the design of drugs and the enhancement of agricultural products.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2598

The Impact of Technology in Education

This essay addresses the issue of technology in education by summarizing a scholarly article on the subject and synthesizing the impact of technology in education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 582

Aircraft Maintenance Process

Effective aircraft evaluation results in the determination of its existing state and the probability of the failure of its body and engine parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 588

Assistive Technology Outcomes and Benefits

In addition, the improvement in technology has resulted in devices and equipments that can assist the disabled to access facilities and services that other people can access.
  • Subjects: Applications
  • Pages: 8
  • Words: 2336

Ethical Industrial Engineering Ethics

Failure to embrace this by past engineers led to the establishment of code of ethics that guide all engineers in their day to day execution of services.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1872

The Formation of the TSA and the Effect on Air Travel

The famous terrorist attack on the Twin Towers on September 11 of the year 2001 in the US was a key event that heighted the security awareness concerning the susceptibility of the transport modes especially [...]
  • Subjects: Aviation
  • Pages: 15
  • Words: 4164

Ethical Responsibilities in Engineering

Typically, the engineer needs lifelong learning ethical responsibilities to protect the public health, improve the safety and welfare of others, and the ability to address emerging problems and challenges in engineering.
  • Subjects: Engineering
  • Pages: 2
  • Words: 544

Aircraft Conceptual Design

It involves the approximations of the size dimensions, weights and the selection of aerodynamic properties suitable for the satisfaction of the requirements as described in the proposal of the aircraft design.
  • Subjects: Aviation
  • Pages: 15
  • Words: 3706

Globalization and Digitalization

The tools that are necessary in the technological exodus from the traditional mode to higher fashions have posed a challenge in the labor force in relation to the level of expertise.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Facing Ethical Issues as a Software Engineer

Applying the Kantian theory of ethics the software engineer will have to inform the stakeholders including the investors of the company and the clients that there will be a delay in the launching of the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 998

Music Industry and Technology

The paper further describes some of the technological innovations and analyses how the innovations have contributed to the positive growth of the music industry.
  • Subjects: Other Technology
  • Pages: 14
  • Words: 3878

Technology Impact on Human Civilization

Despite the large amount of information that the internet provides to people, research shows that the internet may have a negative effect on the intellectual ability of an individual. The use of technological devices may [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 816

The Rationale of the Cryonics

The Egyptians hence tried to make sure that they preserved a person very close to immortality and this is the reason why they when to greater extent of building the pyramids and doing the mummification.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 2017

Smartphone Technology: Impact on the Camera Industry

The camera industry has been disrupted due to smartphone technology because of the improved camera experience and the cloud's capabilities, thus, companies are recommended to adopt measures such as software implementation to avoid being eclipsed.
  • Subjects: Phones
  • Pages: 4
  • Words: 988

Artificial Intelligence: History, Challenges, and Future

In the editorial "A Brief History of Artificial Intelligence: On the Past, Present, and Future of Artificial Intelligence" by Michael Haenlein and Andreas Kaplan, the authors explore the history of artificial intelligence, the current challenges [...]
  • Subjects: AI
  • Pages: 2
  • Words: 606

The Home Internet and Network Security

In addition, system security should be considered as well in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 400

Artificial Intelligence and Gamification in Hiring

It is evident that the connection between the current scientific controversy and the work by Mary Shelley is expressed in a conflict between science and morality in the context of the desire to penetrate the [...]
  • Subjects: AI
  • Pages: 2
  • Words: 659

The Automotive Technology Evolution

This marked the beginning of the car industry, which ultimately led to the development of modern automobiles and opened the way for their production. The reliability and safety of automobiles have increased due to technological [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1921

Aspects of the Fire Prevention and Safety

According to the 2019 International Building Code, materials and features in buildings need to be structurally fire-resistant to safeguard against the spread of fire and smoke.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 613

Pipeline Hazards in Computer Architecture

Therefore, branch instructions are the primary reasons for these types of pipeline hazards to emerge. In conclusion, it is important to be able to distinguish between different pipeline types and their hazards in order to [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 306

The Smart Parking Space App and Its Functions

The median occupancy rate for the two days of the week, Monday and Friday, is exactly the same. There is a breakdown of the occupancy rates for each lot, broken down by day and hour.
  • Subjects: Applications
  • Pages: 5
  • Words: 908

Technology in Education and Business

The best forms of inspiration incorporate the thoughts and feelings of the whole team and encourage them to try something new.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 913

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

CRISPR: The Emerging Biotechnology

The understanding of CRISPR can negatively impact the manufacture and deployment of bioweapons through the application of technology to improve the lethality of bacteria or potential viruses.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 635

Artificial Intelligence Transforming the World

The possible effects of any program on the community can then be planned for and measured by managers. To conclude, even though most people are unfamiliar with AI, the world is on the verge of [...]
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 557

Robotics and Related Social & Political Problems

The combination of engineering and computer science has aided people in developing the field of robotics. The social impact of robotics lies in the problems that robots are designed to solve.
  • Subjects: Robotics
  • Pages: 2
  • Words: 581

Combining Programming Languages C++ and Python

C++ and Python are not the only languages that can be combined in this way. By combining this functionality with Python's data-processing functionality, one can adjust the grocery-tracking program to work with a graphical interface, [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 281

The Age of Artificial Intelligence (AI)

The film "In the Age of AI" exhibits the importance of AI in transforming society. According to the documentary, AI integration in the transport sector has made it easier and safer for people to move [...]
  • Subjects: AI
  • Pages: 3
  • Words: 875

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 342

Timetable Scheduling Using Generic Algorithms

The results of the article state that the main advantages of using algorithms as the main technology is that it enables the programmers to eliminate early convergence and variation problems are the main challenges linked [...]
  • Subjects: Programming
  • Pages: 9
  • Words: 2667

The Internet of Things (IoT) Security

The security of iOS devices is ensured primarily by maintaining the integrity of the code, verifying the authenticity of users and devices, and assigning ownership rights to users.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 307

Technology in Nursing Education

Such students have the right to receive the same learning opportunities, which is why textbooks, in-person assistance, and in-print information provision are some of the measures that can be applied.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

The Role of Databases in Organizations

In the contemporary technology-driven world of business, the use of information technologies is essential for the efficient and competitive implementation of business practices.
  • Subjects: Data
  • Pages: 1
  • Words: 291

Mounting Drives: Advantages and Disadvantages

Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 594

Classification of Mobile Applications

Utility apps are the kind of applications that people need daily. The user session time is one of the longest in entertainment and social media apps.
  • Subjects: Applications
  • Pages: 2
  • Words: 576

Principles of Semiconductors and Emitters Testing

The test is based on the notion that a bipolar transistor may be thought of as two back-to-back diodes, and by checking the diode between the base and the collector of transistors.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4525

Using Technologies in Kindergarten Classrooms

Integrating modern technologies into the educational process in kindergartens helps educators transmit knowledge to the children and influence their emotions and perception of the materials.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1671

The Role of Big Data in Marketing

The accumulation of Big Data is the result of the new marketing environment, which was created by the digital world we now live in for marketing firms.
  • Subjects: Data
  • Pages: 2
  • Words: 560

Multithreading Models: Definition and Types

The programming system facilitates the running of various filaments in parallel, and all the possible threads reach the kernel at the same period.
  • Subjects: Programming
  • Pages: 2
  • Words: 672

Buffer Overflows and Data Execution Prevention

Since buffer overflow is about memory, the user can protect it by not writing beyond the specified space, which can be covered by the Data Execution Prevention method by preventing the application from being executed [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 858

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

Synthetic Fabrics as Technological Development

Fabrics such as polyester, nylon, neoprene, and spandex were invented in the 30-the 40s of the 20th century and are still actively used in the production of not only clothing but also other goods.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 562

The Concept and Underlying Science of Hyperloop

The representatives of the two firms argued that there was a great possibility of implementing the Hyperloop in the Middle East or Asia because of the increased need for fast and efficient transport and reduced [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2035

White Hat and Black Hat Hacking

On the other hand, White Hats work with companies and help them identify weaknesses in their systems and fix relevant vulnerabilities to ensure that attackers cannot illegally gain access to data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 608

Technology Influence on Problems of Modern Society

In the globalized and digitalized era, it is vital to preserving the balance and control physical activity, food habits, and relationship patterns to avoid suffering from the negative aspects of technologies and their dominance in [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Technological Development of Civilizations

The current stage in the development of human civilization is closely related to the use of technology. The fundamental thesis of his writings is that technology contributes to the development of human communities but that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1214

The Digital Workplace Transformation Issues

In this research, it is important to emphasize the significance of the digitalization of the present workspace and all the consequences, challenges, and obstacles that are associated with them.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1172

Discord Server as Online Public Space

Interestingly, both types of relationships are natural to Discord because it has many functions, and there is possible to create many channels with the same people, so different parts of a project can be separated [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 324

Electric Coffee Maker: The Use of Pseudocode

Program Name: Coffee Maker Functions Code for Coffee Maker Functions: Apply PresetTime to begin brewing while the coffee maker is OFF IF want to set CoffeeMakerTime Press ON x 2 Apply input HH:MM Press ON [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 327

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

Identity Management for Systems in a DMZ

Connecting internal corporate services to the internet is a challenge because exposing these servers to external environments poses a massive risk in terms of security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 306

Boolean Search and How to Use It

The use of the created Boolean string yields 1726 results, which is a relatively large number of articles for manual selection of the most relevant sources.
  • Subjects: Programming
  • Pages: 6
  • Words: 449

Using Jing in Teaching

Jing is a free, screen casting and image capturing tool (TechSmith, 2013). It also grants marking up uses and wide sharing probabilities within a short time.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 210

How Computer Works?

In order for a computer to function, stuff such as data or programs have to be put through the necessary hardware, where they would be processed to produce the required output.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 891

Hunting Netiquette Violations

This is a message attached to people's mails without their consent. An example of this violation is a word-for-word plagiarism.
  • Subjects: Internet
  • Pages: 2
  • Words: 430

The Importance of Trust in AI Adoption

Hengstler et al.suggest that the best approach to take in enhancing trust in the use of AI is viewing the relationship between the company and the technology from a human social interaction perspective.
  • Subjects: AI
  • Pages: 5
  • Words: 1456

Toyota Land Cruiser GXR: Model Description

The region and the use of the car will guide the owner on the required level of protection. The ballistic level of protection depends on the owner of the vehicle's requirements.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1118

Tabletop Centrifuge Manual

The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Robotics and Artificial Intelligence in Organizations

Otherwise, cognitively complex tasks and those demanding emotional intelligence will be performed by humans, with the support of robotics and AI. Therefore, this study speaks of the importance of employee trust in AI and organization.
  • Subjects: AI
  • Pages: 7
  • Words: 2005

Recovering from Computer System Crashes

In the event of a crash, the first step is to identify the type of crash and then determine the best way to recover from the crash.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1442

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

Comparison Between WiMax and LTE

The traditional mobile networks use the TDM and combination of the packet infrastructure that is partial, but with LTE and the WiMAX, they have simplified the network standards to the application of all- IP networks.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1957

Mobile Devices and Convenience

Mobile devices that fulfill such requirements provide the merit of functionality optimization, mobile network security with the consequence of the reduction in costs associated with downtimes while not negating the privilege of reduced general costs [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1618

The Aviation Industry in France

The amalgamation of five private airlines in the year 1933 led to the formation of Air France, the national airline. In the early nineties, the airline was in the brinks of collapse due to heavy [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1908

Aircraft Crash and Emergency Management: Flight UA232

There was no indication of any type of problem that could have warned the pilots of the impending disaster that would force them to crash-land the DC-10 that carried 285 passengers and eleven crew members.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2038

Lighting Techniques in 3D Animation

In distinction with 2D animation where every frame should be painstakingly painted and filled in with the required tints, lights, and shadows, lighting in 3D animation is performed by pointing the source of light, while [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1122

The Mechanics of Hydro Power Plant

Hydroelectricity is the type of electricity which is basically generated by the use of water. Therefore, the more the volume of the water, the higher the amount of electricity can be harnessed from the water.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2464

Application of Pneumatics and Hydraulics

The use of these systems results in much less complicated systems as parts like gears and cams are eliminated and fluids used in the transmission of power instead of solid parts.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1673

The Influence of Memes on Our Lives

After the third grade, I went to my grandparents on vacation in the village, and I planned to have fun with my friends and spend time in the fresh air in the countryside.
  • Subjects: Internet
  • Pages: 6
  • Words: 1683

The Concept of Artificial Neural Networks

The concept of artificial neural networks as a method of imitating the functioning of the human brain is currently defined as "a tool for predicting and modeling the phenomena that is inspired by the human [...]
  • Subjects: AI
  • Pages: 1
  • Words: 292

Cellphones as an Education Tool

Mobility and connectivity of mobile phones has the potential of being integrated into the curriculum, and depending on the region and type of education, the device has significant flexibility on its place in the classroom [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1388

Cisco Packet Tracer: A Simulation Tool

The administration usage of the computers is represented by A. 255 as the address range of F Administration = 176.16.1.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 1326

Cyberbullying as a Serious Issue

However, it is easy to postpone the completion of the course work and take a longer time to complete a course.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Why Internet Filters Should Be Used?

Internet filters give parents a sense of control over their children in the only area of their lives where parents cannot get in, that is the internet.
  • Subjects: Internet
  • Pages: 2
  • Words: 723

“The Real Transformers” by Robin Marantz Henig

The addition of "Real" in the title clearly indicates the theme of the article, in which the gap between the progress in the fields of robots and science fiction predictions casts doubt on whether we [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 572

Nintendo Gameboy: Technological Advancement

Nintendo has made lots of variation in the original game boy this includes the Game boy pocket which is 30% smaller than the original game boy with equal size screen, the Game boy color it [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1243

How Computers Have Changed the Way People Communicate

Based upon its level of use in current society as it grows and expands in response to both consumer and corporate directives, it is safe to say that the internet will become even more integrated [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2463

YouTube as an Educational Tool

The source provides every visitor with the information necessary to be well acquainted with the opportunities that the site presents and teaches how to use the site YouTube with the highest degree of efficiency.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1988

Internet Usage: Major Theoretical Theories

The world has become a global village, thanks to the development and rapid growth of the internet. Such social systems are used by the dominant group in society to promote their own interests and guard [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1409

Computer Virus User Awareness

It is actually similar to a biological virus wherein both the computer and biological virus share the same characteristic of "infecting" their hosts and have the ability to be passed on from one computer to [...]
  • Subjects: Computer Security
  • Pages: 1
  • Words: 685

American Connection Flight 5966

The NTSB found out that the cause of the incident was rooted in the pilots' inability to follow well-grounded procedures and thoroughly conduct and direct a non-precision approach at night in the instrument meteorological condition.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1591

Nanotechnology: Dream or Reality Future?

Research and technology development at the atomic, molecular, or macromolecular levels, in the length scale of approximately 1-100 nanometer range, to provide a fundamental understanding of phenomena and materials at the nanoscale and to create [...]
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1802

Bill Gates’ Contributions to Computer Technology

Upon examination of articles written about Gates and quotations from Gates recounting his early childhood, several events stand out in significance as key to depicting the future potential of Gates to transform the world with [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1306