Tech & Engineering Essay Examples and Topics. Page 5

4,312 samples

Researching of Ubuntu Operating System (OS)

The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2048

The Air Florida Flight 90 Crash Analysis

This paper will analyze the performance of the crew and other relevant teams concerning the principles of aircrew training and Crew Resource Management and the principles of 6th Generation CRM/Threat and Error Management.
  • Subjects: Aviation
  • Pages: 3
  • Words: 912

Powerful Impacts of the Use of Gadgets and the Internet

Overall, researchers highlight both the advantages and disadvantages of smartphones and the Internet, but most tend to focus on the bright side of the situation, and I support their view.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 836

Smartphones: Benefits and Side-Effects

The findings have led to a greater understanding of smartphones' influence on young people of school age, which lays the framework for minimizing the harmful effects of smartphone usage in children and adolescents.
  • Subjects: Phones
  • Pages: 5
  • Words: 1472

America Burning: The Importance of Fire Safety

America Burning has acted as a road map for the fire service and the federal fire programs for the past 15 years, directing them toward enhancing fire safety in the United States."America Burning Revisited" served [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 563

Human Performance and Technology in Education

In the article "Application of Performance Technology in Educational Technology," Yingying Sun asserts the attention and concern channeled towards the performance technology in the educational technology framework.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1214

The Ron Engineering vs. Construction Ltd. Lawsuit

The lawsuit between Ron Engineering and Construction Ltd.and the Government of Ontario can be considered one of the most consequential and prominent quarrels in Canada.
  • Subjects: Engineering
  • Pages: 2
  • Words: 604

Hyper Evolution: The Rise of the Robots

From the video, the robots look like real human beings, and they have been capacitated to act in a human way in what is known as machine learning technology powered by artificial intelligence. Hyper evolution [...]
  • Subjects: AI
  • Pages: 3
  • Words: 882

Smart Bed Technology in Healthcare

An example of such a technology is a smart bed, which is a type of bed with sensors that collect information on the occupant. Nurses could use smart beds to track a patient's response to [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 292

The Benefits and Growth of IPv6

The current type is the most recent and most advanced internet protocol that can determine the location of the computer systems across a given network and routing.
  • Subjects: Internet
  • Pages: 1
  • Words: 303

Importance of Data Analysis

In order to determine the methods of mathematical and statistical processing, first of all, it is important to assess the nature of the distribution for all the parameters used.
  • Subjects: Data
  • Pages: 4
  • Words: 1118

Protecting Digital Assets Overseas for U.S. Companies

The question of how U.S.companies can protect their digital assets can be answered by examining available protection frameworks and how to take advantage of them The U.S.government offers cybersecurity for its companies both domestically and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 573

Interlocking Bricks: Production Technology

The use of interlocking bricks has tremendously reduced the cost of building. It is cheap to buy or manufacture these bricks as compared to buying stones for construction.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 447

Digital Self-Harm: Causes and Interventions

Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2258

Boston Dynamics’ Spot Robot Dog

Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
  • Subjects: Robotics
  • Pages: 4
  • Words: 357

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791

Fire Tube Boiler and How It Works

For example, thermal conduction is the process through which the heat of the gases is absorbed by the water in the tank.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1111

The Trebuchet Project Analysis

It is important to note that the number of parts to be replaced is limited to one in the period of the completion and part that are replaced should have the same technical specifications as [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1154

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

The Role of the Internet for Modern Society

Five years later, the internet was plagued by worms which deterred the development and use of the internet altogether. Parents should therefore restrict access to internet websites through the use of internet tools.
  • Subjects: Internet
  • Pages: 3
  • Words: 904

Fluid Mechanics. Vortex Amplifier

In this way a flow of air is maintained in through the System under control, through the VXA, and out through the vent system.
  • Subjects: Engineering
  • Pages: 4
  • Words: 417

Introduction to Database Management System

Among all the Address Spaces it has, the first address space is called Database Service Address Space that provides the database capability to manipulate the DB2 data structures.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1755

How the Internet Has Affected Amazon.com

Looking at its location, and with a wide range of products it deals with, coupled with a high demand for its products in the world market, we have to appreciate the role played by the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 514

Infrared Wireless Local Area Networks

In general, a client must be configured with the appropriate SSID to gain access to the wireless LAN. In OSA, the wireless device does not have a specific cryptographic key to allow for authentication with [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 739

Full Surface Fuel Fire at an Oil Refinery

It is important to establish the drainage of water from the fire and the removal of toxic substances to ensure the safety of the firefighting crew.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 941

Mechanical Engineering Profession

Keeping in consideration the fact that not all the people are well educated to understand the nuances of mechanical engineering, the text of this paragraph has been kept as moderate as possible.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1097

Safety in Elevators and Escalator Maintenance Contracts

The controller also regulates the opening and closing of the doors, indicating to the passengers the position of the elevator in the hoist-way and indicating the direction towards which the elevator is moving.
  • Subjects: Accidents & Protection
  • Pages: 15
  • Words: 4192

Badrul Khan’s Web-Based Framework

Providing the opportunity of learning in any convenient manner, time, and pace as well as benefiting the instructor in terms of the idea of distributed instructions and assessment, the course focuses on both learners' and [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1110

Audio-Visual Media and World Wide Web in Education

Due to manifold effects of technological innovations, education has undergone positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide Web, one [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 785

Space Shuttle Challenger’s Explosion Factors

A fault tree analysis can be used to identify and examine the major factors that led to the failure of the O-rings in the Solid Rocket Boosters. The failure of the O-rings led to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 836

Texting’s Importance for the Society

Debate on whether texting is good or bad continues to prevail across the world, especially with the extensive growth in the use of mobile telephony in the 21st century.
  • Subjects: Phones
  • Pages: 6
  • Words: 1719

The NBA 2K Game as the Element of Popular Culture

Despite the original aim of producing the series of popular video games NBA 2K is a popularization of basketball among the representatives of the modern situation, the release of the series also focuses on advertising [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 555

American Airlines 1420: Accident Overview

Because of the thunderstorm and heavy rain on the way, the pilot did not manage to land the plane safely, and it crashed after the overrunning the end of the runway.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1385

How Does Technology Affect the Economy?

The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
  • 5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 887

Aircraft Instrumentation and Systems

The report will explore the instrumentation used in aircraft and flight instruments. Through these discussions, hopefully, we will be able to understand the significance of the instruments and systems in the aircraft and the entire [...]
  • 4.5
  • Subjects: Aviation
  • Pages: 12
  • Words: 3310

Foundation Engineering in Difficult Soils

The challenge with planning building foundations on moderate to highly expansive clay soils are the probable damaging effects of differential movements of the foundation structural elements owing to volumetric changes of the underlying and adjoining [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1737

How Computers Work: Components and Power

The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1077

Autonomous Robots

Since they are self sufficient, the autonomous robots have the capacity to work in the absence of human beings. In the future, humanoid robots might have the intelligence and emotions similar to those of human [...]
  • Subjects: Robotics
  • Pages: 7
  • Words: 1963

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Subjects: Computer Science
  • Pages: 35
  • Words: 2834

You Cannot Live Without Mobile Phones

Certainly, total refusal to use mobile phone in daily life is impossible, particularly for the representatives of Generation Y and Generation Z.
  • Subjects: Phones
  • Pages: 4
  • Words: 857

Advantages & Disadvantages of Using Technology in Education

One of the significant advantages of using technology is that it enables teachers to design and implement interactive course materials that could be used to enhance learning experiences that are more pleasurable and meaningful to [...]
  • 2.5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 571

Effects of Technology in Education

The invention of computers and the Internet technology have brought a major revolution in the education field. This is quite a big development in the field of education and it can all be attributed to [...]
  • 1
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 873

The Invention of Television

According to Street, Paul Nipkow developed the Nipkow disc in 1884, which was capable of transmitting pictures by use of a cable. In the earlier times, it was hard to send a message for its [...]
  • Subjects: Other Technology
  • Pages: 14
  • Words: 424

Ethical Hacking: Bad in a Good Way

Introduction of personal computers led to the increase in the number of hackers as well as hacker targets were widened. Many hackers lack the skills to damage network systems in a major way.
  • 3
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1718

Apple MacBook Pro

The development of Apple MacBook Pro can be seen as a great milestone in computer technology and specifically for the MacBook family and MacBook Pro line.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 792

Technology and Negative Effects

The unfortunate part is that people do not pay attention to the growing concern and continue using the social networks. All of this is impossible to see and feel over the internet or texting.
  • 1.5
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1442

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 780

Preparation of Correspondences by Typewriters and Computers

On the other hand, the computer relies on software program to generate the words encoded by the computer user. The typewriter user has to press the keys of the typewriter with more force compared to [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 891

Electrical Multimeters: Overview and Application

It is a crucial tool for the electrical and electronics industries because it enables electricians and techs to identify electrical issues, analyze circuitry, and test electrical parts [1].
  • Subjects: Other Technology
  • Pages: 2
  • Words: 589

Satellite Imagery: Strengths and Weaknesses

It is unreliable for detecting low clouds at night because the temperature emitted by underlying clouds and fog is somewhat the same as in surrounding areas This technology is often applied to detect the presence [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Impacts on Human Beings in the 21st Century

Globalization, communication, and biotechnology are the phenomena that have had the largest impact on human beings in the 21st century because these factors have transformed traditional notions of distance between people, shaped new economic trends, [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 942

The Use of Technologies in the Classroom

However, the alternative assumption, in this case, would be that tutors decide to involve technology-related tasks or presentations because of the inability to teach the student due to the prior lack of preparation for the [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Incident Detection Precursors and Indicators

As for incident detection indicators, the challenge is that security software may produce hundreds of security alerts a day, most of which are false.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 311

The Place of Humanity in the Robotic Future

The developers are trying to implement the brain, the human mind, in a digital environment. Paying attention to mechanical machines, commonly called "robots", can be seen that they are created in the image and likeness [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 401

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 342

Mounting Drives: Advantages and Disadvantages

Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 594

Remote Working: Impact of Technological Development

Remote working is a form of arrangement where the employee does not have to commute to the workplace. The number of telecommuters increased to 2,000 in 1983, and the figure continued to grow in the [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 919

Using Technologies in Kindergarten Classrooms

Integrating modern technologies into the educational process in kindergartens helps educators transmit knowledge to the children and influence their emotions and perception of the materials.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1671

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

Technology in Education: Benefits and Challenges

To succeed in this learning environment, students need to develop organizational and clinical skills and strategies to achieve academic success; challenges may be associated with the quality of received information and consequences of using devices.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 634

Layering and Encapsulation Security Design

The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures. Thus, it is an example of a wrong solution to the world.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 720

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Subjects: Internet
  • Pages: 4
  • Words: 1285

Malé International Airport: The Landside

The Male International Airport is the main international airport of the Republic of Maldives. This island can be found in the North Male Atoll, not far from the isle of Male, the city on which [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1165

Process Virtualization Theory Overview

Therefore, the author found it appropriate to address the theoretical underpinning of IT in virtualization processes to account for the gap in the field.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1420

Aviation Industry: New Technologies

The reason behind this is due to the fact that the researcher believes that as a student attempting to attain a Bachelor of Science in Aeronautics with a Minor in Safety and Human Factors his [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1928

The Aviation Industry in France

The amalgamation of five private airlines in the year 1933 led to the formation of Air France, the national airline. In the early nineties, the airline was in the brinks of collapse due to heavy [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1908

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1686

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Cisco Packet Tracer: A Simulation Tool

The administration usage of the computers is represented by A. 255 as the address range of F Administration = 176.16.1.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 1326

Qualitative Data Analysis Recommendations

All a researcher should do is to open the file in the software itself, underline the piece to be coded and haul the code from the code administrator.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 923

Coding and Data Analysis Process

The concept of pre-coding in qualitative data analysis has been highly focused in recent days. It is worth noting that pre-coding in qualitative data analysis enables the use of computers for tabulating and analyzing data.
  • Subjects: Programming
  • Pages: 3
  • Words: 690

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Computer Security: Bell-Lapadula & Biba Models

Cybersecurity policies require the formulation and implementation of security access control models like the Bell-LaPadula and the Biba, to successfully ensure availability, integrity, and confidentiality of information flows via network access.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 882

Contextual Factors in Engineering

In the area of Knowledge and Skill Base, it is important to determine for the analysis such competence as "Knowledge of contextual factors impacting the engineering discipline"; and in the area of Professional and Personal [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 502

Educational Technologies and Their Integration

The primary goals of technology include 1) orientation of the learners of the widespread of the educational technology; 2) information on how the educational technology can be used as the media opportunities of the teaching [...]
  • Subjects: Technology in Education
  • Pages: 13
  • Words: 3641

Pressure Drop and Full Models in Filtration Technology

Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2599

Multimedia Technology for Teaching and Learning

Studies have shown that the use of multimedia is a technological phenomenon because its applications involve the use of technology. The implication is that multimedia has a theoretical basis for both teaching and learning.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 567

Information and Communication Technology in Learning

According to the results of the experiment during which the students had to work with an interactive board, the incorporation of ICT into the academic process allows students to acquire the needed abilities faster and [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1188

Guitar Construction: Acoustical Features

It is at the front part of the guitar, and it is the most critical part of the instrument, because the back part and the sides of the guitar reflects the sound back to the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 891

The Impact of Technological Change on Business

While it is obvious that effective and diverse means of communication have been at the disposal of entrepreneurs for more than a century now, it is undeniable that the development of the informational technology, especially [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1735

3D Printing: Pros and Cons

The authors compare the quick advancement and loss in the price of 3D printers with the rise of the personal computers.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 928

Vibration Control in Rotating Equipment

Vibration in rotating machines occurs because the centre of rotation of a machine does not coincide with center of mass. Machine imbalance is the most common cause of vibration in rotating machines.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2170

Centralia Mine Disaster and Public Administration Failure

Scanlan, who was the district inspector at the time, identified the hazards surrounding the coal mines and reported his findings about a possible explosion to other relevant professionals. Scanlan should not have taken heed to [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1120

Thermistor and Its Applications

This paper examines the working mechanism and applications of Thermistors Thermistors are special kind of variable resistors whose resistance changes with changing temperature i.e.a change in thermal temperature results in changes in its resistance value.
  • Subjects: Engineering
  • Pages: 2
  • Words: 668

The Systems Development Life Cycle

The Systems Development Life Cycle is a conceptual model for IT specialists to institutionalize system development through the conventional phases of planning for defining system development resource requirements, analysis for determining end user requirements, and [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 483

Mobile Applications in Learning

Mobile applications take into consideration the capabilities of the target devices and the information is therefore presented in a manner that is appropriate for the diverse mobile devices.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1415

Technology Evolution in The Modern Society

Service perspective - which holds that e-commerce constitute a tool that fulfills the needs and desires of companies, customers and management with aim of reducing the transaction costs while at the same time being able [...]
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4289

In-room Technologies Used in the Hotel Rooms

It also looks into how the technological advances all over the globe affect the hotel industry and how the industry is prepared to adopt the in-room technologies which are used inside the hotel rooms specifically [...]
  • Subjects: Applications
  • Pages: 15
  • Words: 4111

Mobile Computing and Its Future Scope

Mobile communication, mobile hardware and software are the main concepts in mobile computing. The objective of mobile computing is to be able to work from anywhere.
  • 4
  • Subjects: Phones
  • Pages: 9
  • Words: 1347