Tech & Engineering Essay Examples and Topics. Page 5

4,315 samples

Sony Pictures: The Cyber Attack

The incident also highlighted the vulnerability of large companies to cyberattacks and the need for better security measures."Guardians of Peace" was the hacker organization that breached the computer networks of Sony Pictures Entertainment, a prominent [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 858

Coarse- and Fine-Grained Parallelism

Fine-grained parallelism uses smaller parts of the program for parallel processing and requires a large number of threads to perform tasks.
  • Subjects: Programming
  • Pages: 3
  • Words: 914

Artificial Intelligence and Gamification in Hiring

It is evident that the connection between the current scientific controversy and the work by Mary Shelley is expressed in a conflict between science and morality in the context of the desire to penetrate the [...]
  • Subjects: AI
  • Pages: 2
  • Words: 659

Powerful Impacts of the Use of Gadgets and the Internet

Overall, researchers highlight both the advantages and disadvantages of smartphones and the Internet, but most tend to focus on the bright side of the situation, and I support their view.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 836

Smartphones: Benefits and Side-Effects

The findings have led to a greater understanding of smartphones' influence on young people of school age, which lays the framework for minimizing the harmful effects of smartphone usage in children and adolescents.
  • Subjects: Phones
  • Pages: 5
  • Words: 1472

The Harry Potter Phenomenon Analysis

Since these groups sowed the seeds of the Potter phenomenon, the connectors and, later, the mavens were crucial to the publication of the first novel, Harry Potter and the Philosopher's Stone.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1770

Incident Detection Precursors and Indicators

As for incident detection indicators, the challenge is that security software may produce hundreds of security alerts a day, most of which are false.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 311

Operating Systems iOS vs. Android: Pros and Cons

Android and IOS are the biggest phone operating systems in the world and household names around the world. The user is able to change their settings, the visual presentation of the screens, or adjust the [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 602

Combining Programming Languages C++ and Python

C++ and Python are not the only languages that can be combined in this way. By combining this functionality with Python's data-processing functionality, one can adjust the grocery-tracking program to work with a graphical interface, [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 281

Using Technologies in Kindergarten Classrooms

Integrating modern technologies into the educational process in kindergartens helps educators transmit knowledge to the children and influence their emotions and perception of the materials.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1671

Analyzing the iPhone as an Artifact

At the time of the release of the first iPhone, it was a challenge for thinking and action for the whole world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1140

Ethical Issues of the Information Age

Accuracy refers to the accountability for errors in information and the subsequent choice of the person to blame. Property deals with the question of ownership of information and the means of its transmission.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 298

Application Software Integration: Pros and Cons

The breakthroughs within the field of information technologies revolutionized the environment of software development. The integration often leads to the improvement of the reporting process.
  • Subjects: Applications
  • Pages: 1
  • Words: 294

Artificial Intelligence Impact on Work and Society

One of the biggest aspects that significantly affected my understanding of the issue of utilizing artificial intelligence for a variety of tasks is the increasingly important role of human interventions.
  • Subjects: AI
  • Pages: 4
  • Words: 1203

Management Information Systems (MIS)

The advances in the evolution of devices and the achievement of a new stage of development critically impacts MIS and creates the basis for the emergence of multiple changes towards the achievement of better outcomes [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 573

LAN Network Diagram Overview

The twisted-pair cable is used in the given diagram, which is considered the most common type of cabling for LAN. In the given Network Diagram, the unshielded twisted-pair cable is used.
  • Subjects: Internet
  • Pages: 1
  • Words: 158

Office Kitchen Hazards Identification and Control

Since kitchen hazard is the issue at hand, it is crucial to know what are the common accidents. Kitchen hazards are not just food – appliances and hygiene are highly important.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 1326

AirAsia: Crisis Management Case Study

The crash was the first to be recorded in the eighteen years of operation of AirAsia. It was described as the third worst plane crash in the year 2014.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 1098

Boston Dynamics’ Spot Robot Dog

Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
  • Subjects: Robotics
  • Pages: 4
  • Words: 357

Malé International Airport: The Landside

The Male International Airport is the main international airport of the Republic of Maldives. This island can be found in the North Male Atoll, not far from the isle of Male, the city on which [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1165

Wi-Fi Technology and Applications

This paper discusses the Wi-Fi application and the technology behind its operation and functionality. This is a set standard within the wireless domain and is based on IEEE802.
  • Subjects: Internet
  • Pages: 4
  • Words: 1343

Can Manufacturing Material and Process

However, the period of technological advancements that started after the Second World War saw a breakthrough in the extraction of aluminum and easy smelting of aluminum.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2015

Computer Problems

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1056

Cyberbullying and the First Amendment

Under the geographical approach, the defendant can argue that since the event in question occurs online and outside of school property, it is covered by the First Amendment and the school has "no authority to [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 593

The Hacker Subculture Nature and Allure

The Internet connected people all around the globe and changed the face of the society forever. However, with the development of the computer networks, the meaning of the term started to change.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1697

Animation: Social, Economic and Technological Aspects

It was following the advent of motion picture films, that the field of animation was generated as films became popular. George Melies was one of the pioneers in the field of animation.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 842

The Telephone and Industrialization

The problem with the telegraph was that it needed operators to carry out the interpretation of the messages that were coded and passed over a wire.
  • Subjects: Phones
  • Pages: 4
  • Words: 1095

The Effectiveness of the Computer

The modern computer is the product of close to a century of sequential inventions. We are in the information age, and the computer has become a central determinant of our performance.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1225

Emerging Trends in Technology

Future advancements in mobile or wireless technology promise to be a hot subject for the future of the globe, especially about lifestyle and conduct of business.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 691

Batch Processing and Real-Time Processing

To begin with, one should mention that the time lag is one of the essential characteristics used to distinguish between real-time and batch systems.
  • Subjects: Data
  • Pages: 2
  • Words: 557

Airline Planning of a New Domestic Route

When adding a new route to the network of a domestic airline, it is necessary to evaluate a range of factors to ensure this route will be profitable.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1086

Modern Technology: Advantages and Disadvantages

The disadvantages of modern technology involve numerous risks related to people's cognitive intelligence and children's healthy development. The problem related to the exposure to age-inappropriate materials with the help of new technology can be solved [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 904

Hazard Mitigation Planning and Training

The training will focus on the collection and review of relevant data to aid in risk assessment. Training public officials on capability assessment will be critical to promoting the ability of the participating county to [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1403

Air Traffic Controllers and Their Job Hazards

Given the tight schedule of these participants, and the limited time that the researcher had to conduct the study, a small sample of 20 participants was selected. The researcher explained to them the relevance of [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2326

Transformers and Their Service Life Cycle

Therefore, the proper functioning of the transformers is an essential part to maintain the performance of the power distribution system. Corrective maintenance is done when the transformer breaks down, preventive maintenance is the process of [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1702

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 919

The Carnival Triumph Cruise Ship’s Crisis Management

This paper is a critical analysis of the crisis communication surrounding the marooning of the Carnival Triumph Cruise ship. The contribution of the Carnival's PR in addressing the Triumph crisis is subject to analysis to [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2838

Cell Phones Use in Public: Naturalistic Observation

Using the naturalistic observation, this study aims to provide the discussion of how Americans use cell phones in public places and react to the other people's use of technologies.
  • Subjects: Phones
  • Pages: 5
  • Words: 1315

Airline Industry Growth & Development

This paper will, therefore, attempt to look at the reasons of the growth of the airline industry that has been evident lately, as well as consider competition and the influence of the Internet on the [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 660

The Best Material for Making Toolbox

The shop believes that the short-termed life of the kits is attributed to the materials used in making the toolboxes. Similarly, it was noted that the cost of acquiring aluminum alloy was cheaper than the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 834

Technology Use among Children: Ethical Issues

The use of technology has triggered innovations and enhanced the skills of children and adults. Some of the contents in the internet are very dangerous to the children.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1378

How Does Technology Affect the Economy?

The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
  • 5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 887

Fire Hazards Related to Fireworks

In the period of the Song Dynasty that lasted from 960 to 1279, a majority of the ordinary persons could buy a variety of forms of fireworks from market sellers, and splendid exhibits of fireworks [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2798

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 575

Will Robots Ever Replace Humans?

It is quite peculiar that Bolonkin uses negation in order to stir the audience's delight; more impressively, the specified approach works the pathos is concealed not in the description of the possibilities, but the compliment [...]
  • 5
  • Subjects: Robotics
  • Pages: 8
  • Words: 2066

Computer’s Memory Management

Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.
  • Subjects: Computer Science
  • Pages: 20
  • Words: 5417

Technologies: History of Telephone

First, it is necessary to note that the telephone is a device used to communicate. When a speaker picks up the handset, switch hook is closed, and a direct current is sent to the line [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 571

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Subjects: Computer Science
  • Pages: 35
  • Words: 2834

Mobile Security

Security of mobile devices encompasses security of all information and data saved and stored in the tablets, smart phones, laptops, and PDAs.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1682

The Evolution of the Car Engine

France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2226

Aircraft Conceptual Design

It involves the approximations of the size dimensions, weights and the selection of aerodynamic properties suitable for the satisfaction of the requirements as described in the proposal of the aircraft design.
  • Subjects: Aviation
  • Pages: 15
  • Words: 3706

Privacy and Safety on the Internet

The user should have knowledge of how his or her information is being collected, the purpose of collection and how the party is going to use the information. The final security measure to ensure safety [...]
  • 3
  • Subjects: Internet
  • Pages: 4
  • Words: 1126

IT Implementation Plan for Cloud Computing

Assessment of market requirements: Here, the service provider, the broker, and the organization must study the features of cloud computing to instill trust among them and on the new product.
  • Subjects: Cloud Computing
  • Pages: 6
  • Words: 1565

Evolution of Fire Fighting Gear

The traditional shape of the helmet was created with a short brim on the front and a long brim on the back to keep embers and hot water from going down the back of the [...]
  • Subjects: Accidents & Protection
  • Pages: 12
  • Words: 3236

The Internet’s Good and Bad Sides

On the other hand, the internet is the root of some of the bad evils that have befallen many people, true and the internet is the beginning of what Gibson described as a place to [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1632

The iPhone’s Main Features and Productivity

The sophistication of the iPhone is reiterated by Jacko who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 728

Industrial Engineering

This is to facilitate development of appropriate construction designs, allocation of resources, and crafting of superior strategic plan to enhance effectiveness.
  • 4
  • Subjects: Engineering
  • Pages: 4
  • Words: 1094

Evaluation of Internet Sources

In the era of digitalization, much information is available online, and attention is paid to evaluating the appropriateness of the source and the quality of the offered material.
  • Subjects: Internet
  • Pages: 1
  • Words: 300

Smartphone Technology: Impact on the Camera Industry

The camera industry has been disrupted due to smartphone technology because of the improved camera experience and the cloud's capabilities, thus, companies are recommended to adopt measures such as software implementation to avoid being eclipsed.
  • Subjects: Phones
  • Pages: 4
  • Words: 988

Researching of Ubuntu Operating System (OS)

The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2048

Artificial Intelligence as Technological Advancement

Automation and digitization of healthcare services, marketing, and financial systems through AI are beneficial. While AI is significant for social and economic growth, its application in education should be limited.
  • Subjects: AI
  • Pages: 1
  • Words: 292

Information System and Its Various Dimensions

Therefore, the information system is a collection of data, facts, or knowledge integrated in an intentional manner for the purpose of collecting, processing, and storing.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 612

The Utilization of Artificial Intelligence

In addition, the introduction of artificial intelligence has a negative effect on reducing the level of work ethic and enthusiasm. In conclusion, the most significant limitations of artificial intelligence are rising unemployment and increasing laziness.
  • Subjects: AI
  • Pages: 2
  • Words: 562

Experiences of Beginner in Python Programming

Difficulty in working with Python for me is understanding what and how to include in the code. Thus, Python is in high demand in IT and, at the same time, is known as a programming [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 570

The Age of Artificial Intelligence (AI)

The film "In the Age of AI" exhibits the importance of AI in transforming society. According to the documentary, AI integration in the transport sector has made it easier and safer for people to move [...]
  • Subjects: AI
  • Pages: 3
  • Words: 875

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 342

The Boeing Failure Case Analysis

Several crucial factors contributed to Boeing's issues and consequent crashes of the 737 Max in Indonesia and Ethiopia, disrupting the company's reputation and finances.
  • Subjects: Aviation
  • Pages: 1
  • Words: 455

Technology in Nursing Education

Such students have the right to receive the same learning opportunities, which is why textbooks, in-person assistance, and in-print information provision are some of the measures that can be applied.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

Advanced Technology and Data Protection

For the purpose of clarity, advanced technology refers to a type of technology that is still immature but with the potential to deliver significant value.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1428

The Excel Spreadsheets Formatting

The default option is left alignment but one can choose for it to be center or right to improve the readability of a spreadsheet's content.
  • Subjects: Applications
  • Pages: 1
  • Words: 332

Advantages and Disadvantages of Remote Work

With the transition of employees of different companies to the remote principle of work, there was an optimization and increase in the efficiency of electronic communications.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 300

Remote Working: Impact of Technological Development

Remote working is a form of arrangement where the employee does not have to commute to the workplace. The number of telecommuters increased to 2,000 in 1983, and the figure continued to grow in the [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 919

How to Make APA Format Tables and Figures Using Microsoft Word

Both for figures and tables, there are two basic options for their placement they may be mentioned and subsequently embedded in the text or placed after references on a separate page. The creation and placement [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 328

Characteristics of Robotics

What concerns the elaboration of an obstacle course in a "real-world" simulation, it is essential to ensure the presence of several procedure testing steps that will determine the functionality of a robot. What concerns the [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 917

The Benefits and Growth of IPv6

The current type is the most recent and most advanced internet protocol that can determine the location of the computer systems across a given network and routing.
  • Subjects: Internet
  • Pages: 1
  • Words: 303

Hackers: The Good, the Bad and the Gray

They are the most familiar with the latest methods of Black Hat hacking, thus making it possible to prevent attempts and reinforce security.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1146

Importance of Data Analysis

In order to determine the methods of mathematical and statistical processing, first of all, it is important to assess the nature of the distribution for all the parameters used.
  • Subjects: Data
  • Pages: 4
  • Words: 1118

Identity Governance & Administration Solution

This classification determines the value of information and its need for protection from confidential and secret, which require the most significant protection, to the public data in the public domain.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 632

Survey Monkey: The Online Assessment Tool

We also give the reader the findings of a survey conducted with this tool and an assessment of its usefulness and potential for use in future usability studies. Survey Monkey is a web-based tool and [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 955

Advantages and Disadvantages of MS Project

Microsoft provides support to their users, and MS Project team members of the project will be able to receive assistance with the software when necessary.
  • Subjects: Applications
  • Pages: 1
  • Words: 377

Effect of Technology in Networking

The adoption of technology in this particular domain extends boosts the standards of the transmission and circulation of data. Second, the learning and application of technology in networking will bridge the gap between the physically [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 362

Aspects of Smart Technologies

It is also possible to promote the collaboration of citizens, organizations, and the government via smart technologies. Another method to improve the environmental situation in the city is the implementation of eco-friendly public transport.
  • Subjects: AI
  • Pages: 6
  • Words: 1736

Drone Technology and Its Role in Logistics

Currently, the logistics industry is profitable and attractive to many companies globally due to the use of drone technology in improving service delivery to customers.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2219

Protecting Digital Assets Overseas for U.S. Companies

The question of how U.S.companies can protect their digital assets can be answered by examining available protection frameworks and how to take advantage of them The U.S.government offers cybersecurity for its companies both domestically and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 573

The Cloud Storage: Advantages and Disadvantages

They can encrypt it on a computer with the help of a software program before uploading information to the Cloud. In conclusion, it can be noted that Cloud storage is an effective device used by [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 852

Impact of Technology on Human Beings

However, despite the numerous benefits of such technology, there are concerns of the effects it has on humans. In that regard, media and communication technologies are suggested to affect the mental capacity of people while [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 302

The Usage of VR Technologies in Football

In sports, VR is on its way to becoming one of the essential tools for a sports organization that aims to acquire a competitive advantage.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 562

Automated Catering Management System

It is a key part of future improvement as this information can be stored in the system and processed to promote positive change.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1104

Digital Self-Harm: Causes and Interventions

Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2258

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Subjects: Internet
  • Pages: 4
  • Words: 1285

Robotics and Artificial Intelligence in Organizations

Otherwise, cognitively complex tasks and those demanding emotional intelligence will be performed by humans, with the support of robotics and AI. Therefore, this study speaks of the importance of employee trust in AI and organization.
  • Subjects: AI
  • Pages: 7
  • Words: 2005

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791