Tech & Engineering Essay Examples and Topics. Page 5

4,333 samples

The Technology Behind Bing Maps

Bing Maps was developed by Microsoft in response to the business threat posed by Google who also offers Google Earth Pro, for the visualization and mapping of much of the world using satellite imaging from [...]
  • Subjects: Data
  • Pages: 2
  • Words: 681

Building a PC, Computer Structure

The choices available are Western Digital 320GB and Seagate 320GB and my advice would be to go for Western Digital as it is a good performer all along.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 910

Control Philosophy. Variable Speed Drives

The second one is the management and provision of adequate and stable pressure connected to all the identified stakeholders in the project.
  • Subjects: Engineering
  • Pages: 1
  • Words: 396

Researching Capacitive Touch Sensor

The closeness of electrodes in a single-touch electrode in the two layers determines the coordinate system. The operation of a capacitive touch sensor is based on a capacitor's response to change in capacitance.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1504

Technology and Progress Interconnection

The roots of the idea of the power of science and technology lie in the philosophy of the Enlightenment in the era of the First Industrial Revolution.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1763

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

Factors that Affect Control Valve Pressure Drop

Moreover, the pressure drop in a fluid that goes through a control valve is subject to numerous factors, relating to the design of aperture, type of fluid, piping system of fluid, temperature, and pressure.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1174

Cellphones as an Education Tool

Mobility and connectivity of mobile phones has the potential of being integrated into the curriculum, and depending on the region and type of education, the device has significant flexibility on its place in the classroom [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1388

Qualitative Data Analysis Recommendations

All a researcher should do is to open the file in the software itself, underline the piece to be coded and haul the code from the code administrator.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 923

Advantages of Using Computers at Work

I have learned what I hoped to learn in that I have become more aware of the advantages of using computers and why I should not take them for granted.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 582

The Use of Technology in Classroom

The articles which I found mention the idea of increasing the use of technology in the classroom to fix this problem.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 603

Computer Addiction: Side Effects and Possible Solutions

Since that time humanity started to speak of different signs of "computer addiction" the term stands to emphasize the seriousness of the problem and implies the possibility of drastic consequences that computer mania might have.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1534

Information Technology: Ethical Issues in Computing

Codes of ethics and strict laws are aimed to prevent attacks and introduce social responsibility issues in the computing field. Competition is said to encourage innovation and the development of new technologies.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1167

Oxford English Dictionary and the Wordnet Analysis

A number of other boxes are also provided and these boxes help to refine the search. So it is possible to set the search for a sequence such as first Operation A and then operation [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2147

Cause and Effect of Change in Technology

The cause of change in technology is, perhaps, rightly due to the evolution of humankind. A rosy picture is generally painted by the proponents of modern and contemporary technology in the business world.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 618

Aviation and Aerospace Future Technology

Aerospace refers to the earth's atmosphere and the space beyond it. Technology in both aviation and aerospace has proved to be of great advantage to mankind over the years.
  • Subjects: Aviation
  • Pages: 2
  • Words: 716

Use and Benefit of Computer Analysis

The introduction of computers, therefore, has improved the level of service delivery and thus enhances convenience and comfort. Another benefit accruing from the introduction of computers is the ability of the world to manage networks [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 550

Bill Gates’ Contributions to Computer Technology

Upon examination of articles written about Gates and quotations from Gates recounting his early childhood, several events stand out in significance as key to depicting the future potential of Gates to transform the world with [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1306

Information Technology and Security

However, it needs to be said that current system is in need of improvement because data is not as secure as it should be, and it is evident that numerous issues are present.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 553

Safety in Elevators and Escalator Maintenance Contracts

The controller also regulates the opening and closing of the doors, indicating to the passengers the position of the elevator in the hoist-way and indicating the direction towards which the elevator is moving.
  • Subjects: Accidents & Protection
  • Pages: 15
  • Words: 4192

Workers’ Safety in Petrochemical Industry

It is noted that both the employer and the employee have a role to play in improving the health and safety of workers in the work place.
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 2017

Concept of the Denial-of-Service Attacks

Therefore, it is important to understand the concept and classifications of DoS attacks. Notwithstanding the reason, the inability of individuals to access services they are qualified for is called a DoS attack.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1104

Educational Policy Changes: Technology in Education

The goal of the policy change is to ensure that schools can adequately apply innovative technology, including devices and applications to engage students in the learning process and provide them with skills necessary to use [...]
  • Subjects: Technology in Education
  • Pages: 19
  • Words: 5123

CCD Camera vs Tube Camera Comparison

In reality, the camera did not change positions in the scene; this effect is the result of the editing done so that a viewer could comprehend the film.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1324

3D Printing: Pros and Cons

The authors compare the quick advancement and loss in the price of 3D printers with the rise of the personal computers.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 928

Attilio Ievoli Accident and Human Errors

The aim of this report is to present actual finding on the probable cause of the accident in which the 4,450 chemical tanker to run aground just some few moments after the change of guard [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2220

Prescriptive Airport Security, Its Pros and Cons

It is also important to point out the fact that the current security procedures and protocols are based on a set of assumptions, one of which is that compliance with rules and regulations will allow [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3856

Future Trends in Educational Technology

Also, it is important to note that specific changes in the area are associated with the distribution of time for online activities in the teaching-learning process and with determining the nature of proposed assignments.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 556

Overview of the Texas City Disaster, 1947

The severity of the disaster was primarily attributed to the captain, who ordered the crew to close hatches in order to preserve the ammonium nitrate.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2534

Colgan Flight 3407: Human Factors of the Accident

The cause of the accident was attributed to the failure of the flight crew to monitor airspeed according to the rising position of the low-speed cue, the flight crew's failure to stick to the cockpit [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1845

The Ballpoint Pen: Materials, Process and Issues

This essay explores the geological information of the raw materials, the processing steps and the environmental issues. With the raw materials ready, brass is obtained from a mixture of the two, with copper dominating the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 645

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 575

Is the Robotics Development Helpful or Harmful?

Robots remain the best option, as they will connect the children with the happenings in the school. They will dress the robot with their favorite clothes, communicate with the teacher using the robot, and swivel [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1172

Cell Phone as an Indispensable Companion

It has brought a variety of innovative things for the user and to a substantial extent affected the way people relate in the globe.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 847

Apple Versus Samsung Smartphones

With the introduction of the Samsung Galaxy S series smartphones, Samsung competes with Apple's iPhone. The screen, look and feel of Samsung smartphones is strikingly similar to that of the iPhone.
  • 4.5
  • Subjects: Other Technology
  • Pages: 3
  • Words: 859

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

How Computers Work: Components and Power

The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1077

From Common Things to the Best Ideas

This was the beginning of the discovery of the concept behind gravitational pull. This is how Newton got the idea that there was something that makes things fall and this thing was a kind of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1013

Solar Furnace (Font Romeu – Odeillo, France)

The furnace stands as a demonstration of the potential of solar energy to the world and it remains amongst the world's greatest projects especially in the line of solar energy exploitation.
  • Subjects: Engineering
  • Pages: 12
  • Words: 3329

Impact of New Forms of Technology on Our Understanding of Pornography

This paper therefore shows that technology has completely changed concepts of the production of pornographic material, the distribution of pornographic material, access to pornographic material and our understanding of the concepts of privacy and identity.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2276

Safety Engineering

The importance of safety culture and management To achieve safety goals, any organization is to be familiar with safety culture. Safety engineering is really the important science as it gives the students the opportunity to [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1665

Smartphone as a Communication Sector Revolution

The Smartphone has done much to pull the world towards the core of digital database. The youth has exploited this utility to download music and movies from the world over and store it for their [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 560

GPS Technology Pros and Cons

GPS Navigation technology Navigation technology uses a GPS receiver and internal road database, which provides the user with a clear view of the surrounding in real time.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 632

Internal Combustion Engine

It is responsible for the transfer of power produced by the exploding gases in the combustion chamber, to the crankshaft through a connecting rod that is usually attached to it.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1868

Civil Engineering as a Professional Career

The reason why civil engineering is dominant over other engineering disciplines is that it is broad and deals with many things such as design, building, and refurbishment of corporeal and ordinary built environment.
  • 4
  • Subjects: Engineering
  • Pages: 4
  • Words: 1254

Preparation of Correspondences by Typewriters and Computers

On the other hand, the computer relies on software program to generate the words encoded by the computer user. The typewriter user has to press the keys of the typewriter with more force compared to [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 891

What Are the Benefits of the Internet?

The Internet has been one of the biggest inventions that have made a great difference in the lives of many people in the world.
  • Subjects: Internet
  • Pages: 4
  • Words: 1026

Physical Fitness in Aviation

Aviation is an aspect that highly depends on the judgment of the people on the crew and the pilot for any outcome therefore, necessitating the importance of one to be careful with the health state [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2304

Inventions That the World Would Do Without

For instance, the invention of communication technology has been of great help to the entire world because of the convenience and reliability it has come with.
  • 5
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 568

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Subjects: Internet
  • Pages: 3
  • Words: 832

Insider Threats and Aviation Security: A Study Proposal

Employees in any industry pose security threats due to easy accessibility to the inside operations of the workplace. Like other industries, the aviation business is not exceptional as employees may have the motivation to harm [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 2467

Low-Code No-Code Platforms’ Cybersecurity Risks

In conclusion, the cyber security risks of using low-code no-code platforms can be significant. While users find it easy to design software without much skill in programming languages, they should understand the security implications of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

LaGuardia Airport: The Cyber Risk Identification

The rising tensions between the North Atlantic Treaty Organization and the Russian Federation have heightened the risk of cyber-attacks. As in Figure 1, the consequences are severe in the event of a successful assault since [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1491

The British Library: Big Data Management

The British Library needs the use of big data to keep track of user searches. Thus, the company uses big data to manage resources and meet searchers' needs.
  • Subjects: Data
  • Pages: 1
  • Words: 307

New Technology’s Influence on the Future

This paper will focus on the analysis of this problem and what innovations in the current world are important and able to change the market industry in the future.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1719

Aviation Security Threats in Australia

The reliability of the airline is one of the priorities that influence the choice of citizens, and the implementation of relevant safety standards is a necessary measure.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1534

Artificial Intelligence in Soil Health Monitoring

Therefore, the new value provided by AI technology is that it allows automation and algorithm-based predictions for more solid decision-making. AI in soil health monitoring is an unconventional application of the technology, albeit capable of [...]
  • Subjects: AI
  • Pages: 1
  • Words: 376

How to Build a Gaming Computer

The first step to creating a custom build for a PC is making a list of all the necessary components. This explanation of how to build a custom gaming computer demonstrates that the process is [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 604

Drawing a Performance-Evaluation Data Flow Diagram

Mukunda approved the data flow diagram for workplace applications, given that it covers the entire scope of a performance evaluation process, including employee self-reflection and collaborative coordination between top managers and their subordinates.
  • Subjects: Applications
  • Pages: 1
  • Words: 293

CRISPR: The Emerging Biotechnology

The understanding of CRISPR can negatively impact the manufacture and deployment of bioweapons through the application of technology to improve the lethality of bacteria or potential viruses.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 635

Risks and Opportunities of “Platformization”

The growth of the sharing economy, which has been witnessed through the success of multinational companies, such as Airbnb and Uber, has also elevated the importance of "platformization" in the global economy.
  • Subjects: Programming
  • Pages: 9
  • Words: 2558

The Age of Artificial Intelligence (AI)

The film "In the Age of AI" exhibits the importance of AI in transforming society. According to the documentary, AI integration in the transport sector has made it easier and safer for people to move [...]
  • Subjects: AI
  • Pages: 3
  • Words: 875

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 342

The Boeing Failure Case Analysis

Several crucial factors contributed to Boeing's issues and consequent crashes of the 737 Max in Indonesia and Ethiopia, disrupting the company's reputation and finances.
  • Subjects: Aviation
  • Pages: 1
  • Words: 455

Technical Evolution of Automobiles

In 1888, the practically of Benz's car would come to test when his wife, Bertha, and their two sons embarked on a journey using a better version of the car.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2235

Data Mining Tools and Data Mining Myths

The first problem is correlated with keeping the identity of the person evolved in data mining secret. One of the major myths regarding data mining is that it can replace domain knowledge.
  • Subjects: Data
  • Pages: 1
  • Words: 327

Phones and Teenagers’ Mental Health Connection

This essay aims to discuss the connection between phones and teenagers' mental health and explain why the use of smartphones is merely a reflection of problems that children would face either way.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 587

Cybersecurity Weaknesses: The Case of LinkedIn

The Internet has become the largest storage of personal and corporate information in the history of the world. The data relating to hundreds of millions of users was leaked online in the Dark Web segment [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 652

Technology Influence on Problems of Modern Society

In the globalized and digitalized era, it is vital to preserving the balance and control physical activity, food habits, and relationship patterns to avoid suffering from the negative aspects of technologies and their dominance in [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Advantages and Disadvantages of MS Project

Microsoft provides support to their users, and MS Project team members of the project will be able to receive assistance with the software when necessary.
  • Subjects: Applications
  • Pages: 1
  • Words: 377

History and Technology Relationship Analysis

Technology is essential for the development of humanity, and it is difficult even to imagine what the next technological revolution will entail.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1132

Aspects of Smart Technologies

It is also possible to promote the collaboration of citizens, organizations, and the government via smart technologies. Another method to improve the environmental situation in the city is the implementation of eco-friendly public transport.
  • Subjects: AI
  • Pages: 6
  • Words: 1736

Risk Management and Aviation Safety

It is the responsibility of the accountable manager and the senior management team to promote positive behavior and the correct implementation of the safety culture.
  • Subjects: Aviation
  • Pages: 1
  • Words: 291

M-PESA: Critical Success Factors

Generally, consumers preferred mobile payments on paying for services and transfer of money wherein most of them enjoy the convenience of the technology and this was the initial value point considered by the consumers. The [...]
  • Subjects: Phones
  • Pages: 6
  • Words: 1058

Technology in Education: Benefits and Challenges

To succeed in this learning environment, students need to develop organizational and clinical skills and strategies to achieve academic success; challenges may be associated with the quality of received information and consequences of using devices.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 634

How Do Vacuum Cleaners Work?

Regardless of the type, the mechanics of the vacuum cleaners is that while the engine is running, traction is created in the device, by which garbage, dust and dirt particles are sucked through a long [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 654

Establishing a SOCC: The Best Practices to Follow

The role of the Security Operation Center is to prevent, detect, and respond to cybersecurity threats. The first practice that should be implemented at Sifers-Grayson is the establishment of a system for data extraction and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

Using Jing in Teaching

Jing is a free, screen casting and image capturing tool (TechSmith, 2013). It also grants marking up uses and wide sharing probabilities within a short time.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 210

Cutting-Edge Technologies: Blockchain and AI

The users can sign in their accounts and transact to another user and the blockchain records the transaction which is viewed by other users. It is difficult to collect taxes and trace malicious activities in [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1397

Firefighting Methods, Technology Availability in Qatar

The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
  • Subjects: Other Technology
  • Pages: 35
  • Words: 8540

Robotics and Artificial Intelligence in Organizations

Otherwise, cognitively complex tasks and those demanding emotional intelligence will be performed by humans, with the support of robotics and AI. Therefore, this study speaks of the importance of employee trust in AI and organization.
  • Subjects: AI
  • Pages: 7
  • Words: 2005

Relational Database: The University Database

A tutor also qualifies as a module coordinator and hence the primary key of any of the tutors is the ModCoord. The association between the module coordinator and the student table is a one-to-many type.
  • Subjects: Data
  • Pages: 10
  • Words: 1912

The Principle in Net-Centric Computing

The invention of the computer and the subsequent creation of computer networks are arguably the biggest achievements of the 21st century.
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 887

Speech and Voice Recognition

Voice recognition is the use of software and additional apparatus to capture voice-based commands from a user and transfer these to a computer.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 210

Growing Use of 3D Technology in Theatres and at Home

One of the major beneficiaries of technological advances that have been made by man over the cause of the last century has been the entertainment industry which as grown exponentially through the years.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4446

Qantas Airways: Cross Culture and Safety Management

The latest development in the field is relevant to cross-cultural issues and their impact on safety which still requires further study and appropriate application in the airline industry as merger and acquisition of airlines is [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3740

The Tractor Hydraulic System: Components

The valves also block fluid flow via the center when the hydraulic is in the aforementioned state. Valves also allow the flow of fluid through the center and into the reservoir during this particular.
  • Subjects: Engineering
  • Pages: 3
  • Words: 964

MTC: Strategic Use of Technology

Due to the necessity to introduce more rigid control tools for the target setting, it will be necessary to incorporate innovative tracking and monitoring tools as the means of supervising the production process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 611

Technological Advancements in Cybercrime and Fraud

To investigate the connection between rapid technological development and high rates of cybercrime and fraud in the UK. To conduct a substantial literature review on the topic of cybercrime and fraud rates in the UK.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2070