Tech & Engineering Essay Examples and Topics. Page 5

4,399 samples

Common Security Models

In the Clark-Wilson model, users do not access the object directly, as an intermediary serves to ensure the integrity of the data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 614

Data Visualization: Aims and Effectiveness

The aim is to make the information clear and effective to the readers and viewers. According to Alnjar, data visualization improves the narrative form of information and data.
  • Subjects: Data
  • Pages: 2
  • Words: 576

Smartphones Affect and Change Modern Life

Now, it is time to manage technological addiction and enhance the benefits of using smartphones for new creative designs and high-quality data exchange.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 574

Cryptographic Algorithms: The Use in Cyber Security

Cryptographic protection of a system depends on two factors, 1) the strength of the keys and effectiveness of associated protocols, and 2) protection of said keys via key management.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 638

Big Data and Distributed Databases

Big data refers to a type of set of information that requires memory beyond the capacity of the conventional relational databases.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Data Mining and Its Major Advantages

Thus, it is possible to conclude that data mining is a convenient and effective way of processing information, which has many advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 290

Artificial Intelligence Impact on Work and Society

One of the biggest aspects that significantly affected my understanding of the issue of utilizing artificial intelligence for a variety of tasks is the increasingly important role of human interventions.
  • Subjects: AI
  • Pages: 4
  • Words: 1203

Effect of Sea Water and Corrosion on Concrete

On the other hand, substantial tautness, for instance due to meandering will shatter the tiny firm pattern, ending up in fracturing and disjointing of the concrete.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4001

Establishing a SOCC: The Best Practices to Follow

The role of the Security Operation Center is to prevent, detect, and respond to cybersecurity threats. The first practice that should be implemented at Sifers-Grayson is the establishment of a system for data extraction and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

How Transportation Will Look in the Next 50 Years?

The companies developing this technology have stated that such vehicles will be necessary to reduce traffic jams, which are common in urban centers and major cities. Nonetheless, these issues will be addressed and will not [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 849

Multimedia Use in Teaching

The main reason for easier conceptualization of the facts is the interaction and identification of images presented in videos and the ability of video to arouse imagination in the watchers.
  • 5
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 1856

Boston Dynamics’ Spot Robot Dog

Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
  • Subjects: Robotics
  • Pages: 4
  • Words: 357

The Moment of Inertia of a Connecting Rod

The equation for the moment of inertia of the connecting rod about its centre of mass as a function of the period of oscillations measured is also determined from the data that is collected from [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 901

What Is an Algorithm and How Does It Works

Bayesian network is a network structure of a directed acyclic graph of a set of variables and it represents a probability distribution of the variables in a given set of data.
  • Subjects: Programming
  • Pages: 2
  • Words: 718

Al Taweelah Desalination Plant

The three firms on the site were the Al Taweelah Power Company that ran the B and B2 plants, the Gulf Total Tractebel Power Company that ran A1's phase 1 and phase 2 plants and [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 627

Drawbacks and Disadvantages of Distributed Computing

However, in any distributed system, there is a need to either have a coordination mechanism that will ensure that all the computers in the system are synchronized or work towards the reduction of processing time [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 869

Preliminaries: Context and Project Background

The total budget of the implementation of this project will affect the communication plan since the communication plan will greatly depend upon the budget drawn so as to communicate to the stakeholders and the client [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1092

The Aviation Industry in France

The amalgamation of five private airlines in the year 1933 led to the formation of Air France, the national airline. In the early nineties, the airline was in the brinks of collapse due to heavy [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1908

Diesel Generator, Its History and Future

In a diesel engine fuel and gas are mixed in the cylinder before ignition while in a spark engine fuel is mixed external to the cylinder before ignition. The coupling of diesel engine and Maxwell's [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 706

Dependability of Computer Systems

In the dependability on computer systems, reliability architects rely a great deal on statistics, probability and the theory of reliability. The purpose of reliability in computer dependability is to come up with a reliability requirement [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3384

Internet: Wimax vs. Fiber Optics

The research will also seek to identify the level of awareness regarding the viability of both WiMAX and fiber optics technology in the deployment of access networks.
  • 5
  • Subjects: Internet
  • Pages: 10
  • Words: 2790

The Technology Behind Bing Maps

Bing Maps was developed by Microsoft in response to the business threat posed by Google who also offers Google Earth Pro, for the visualization and mapping of much of the world using satellite imaging from [...]
  • Subjects: Data
  • Pages: 2
  • Words: 681

Reverse Engineering for Software Maintenance

To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences.
  • Subjects: Computer Science
  • Pages: 16
  • Words: 4361

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

Windows Vista vs. Windows XP

The new Windows Vista is highly recommended and it is mainly useful for a medium-sized information-service company and it rates higher than the current Windows XP for a number of reasons.
  • Subjects: Internet
  • Pages: 3
  • Words: 837

Engineering: Engineering Disaster Analysis

The collapse of Schoharie Creek Bridge in 1987 was as a result of error in the engineering design, and one of the major causes of the collapse of the Schoharie Creek Bridge was the excessive [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2454

The Rise & Fall of the Concorde

An investigation into the cause of the 2000 Concorde crash was crucial not only to the aviation industry but also to the assurance of the safety of future users of the aircraft.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1157

Automation and the Future of Jobs

The suggested paper offers the analysis of two different opinions on the issue presented by Autor and Rotman in their articles, discussion of their arguments, and reflection on the future of people in the age [...]
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2776

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

IPhone Product Life Cycle Analysis

The product life cycle is one of the most crucial methods describing the processes of development, introduction, growth, maturity, and decline of a product.
  • Subjects: Phones
  • Pages: 2
  • Words: 557

The Role of Digital Technologies in Education

The interactive Mother's Day card and the story of a 13-year-old boy convey the idea of the importance of technology for an individual's development.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 937

Qualitative research: Data Analysis and Reporting Plan

Consequently, the analysis will involve the interpretation of the respondents' responses provided on the questionnaires. In addition, a final analysis will be conducted to focus on the issues which arise after data collection.
  • Subjects: Data
  • Pages: 2
  • Words: 611

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Computer Laboratory Staff and Their Work

This will depend on the discretion of the staff to look into it that the rules that have been set in the system are followed dully. This is the work of the staff in this [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1531

Basic Principles and Functions of Electrical Machines

The difference in the mode of operation between these two machines is that in the induction machine, alternating current is relayed to the stator and induced in the rotor by the action of the transformer [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1713

Fluid Mechanics. Vortex Amplifier

In this way a flow of air is maintained in through the System under control, through the VXA, and out through the vent system.
  • Subjects: Engineering
  • Pages: 4
  • Words: 417

AutoCAD in Different Fields of Design Technology Study

In the engineering technology, CAD is overwhelmingly used from the conceptual layout and design, through a comprehensive engineering and analysis of constituents, to the definition of the various manufacturing methods used.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3092

Relevance of Technology in Schools

But this rapid advancement in technology has created problems in understanding and adjusting for the laypersons in the society. The point that should be focused on is to use this available technology effectively so that [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 852

Internet Usage: Major Theoretical Theories

The world has become a global village, thanks to the development and rapid growth of the internet. Such social systems are used by the dominant group in society to promote their own interests and guard [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1409

Do Video Games Cause Violence?

Those in favor of violent video games contend that fantasy and violence are integral parts of our life, which we tend to manifest in the form of storytelling.
  • 5
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 652

Infrared Wireless Local Area Networks

In general, a client must be configured with the appropriate SSID to gain access to the wireless LAN. In OSA, the wireless device does not have a specific cryptographic key to allow for authentication with [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 739

Mobile Telephones and Social Life

The main purpose of the project is exploring the positive and negative aspects of mobile phone use in society since the technology is at the forefront of most interactions between modern people.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Software Architecture and Its Styles in Examples

The purpose of software architecture is to solve issues and design problems beyond the basic algorithms and data structures used in software instead of focusing on structural phenomena.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1244

Driverless Cars and Safety Concerns

However, in the future, the application of machine learning might as well make driverless cars safer and their systems "smarter" in a way that they would mimic human reactions to unpredicted events.
  • Subjects: AI
  • Pages: 1
  • Words: 441

The History of Welding

Welding, which is "the fusion of material by the use of heat," dates back to the Middle Ages. Nevertheless, arc welding developed only after the invention of the electric generator in the middle of the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 590

The Boston Molasses Disaster of 1919

Moreover, the steel used to build the walls of the tank was too thin and brittle to hold the required weight.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 294

Food Recommender Systems and Their Types

In the article "Knowledge-based recommender system," it is stated that the cognitive element is expected to be sufficient to dwell upon the similarity of the constituents.
  • Subjects: Applications
  • Pages: 3
  • Words: 942

Information Technology and Security

However, it needs to be said that current system is in need of improvement because data is not as secure as it should be, and it is evident that numerous issues are present.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 553

Emerging Transportation Technology in the UAE

The purpose of this paper is to assess the most frequent purposes of interurban traveling of the UAE residents and their attitudes to Hyperloop, and to estimate the potential benefits of implementation of this technology.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4309

Presentation Mistakes “You Suck at Powerpoint”

Further, the speaker should spend enough time for designing and preparing for the presentation, which is half a success. However, the mechanism of analyzing and tracing is a bit different.
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Laptop Models and Their Specifications

The best feature of this laptop is that it has genuine Windows 7 which is suitable for a RAM of 2GB and hard drive of 320 GB.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 681

Badrul Khan’s Web-Based Framework

Providing the opportunity of learning in any convenient manner, time, and pace as well as benefiting the instructor in terms of the idea of distributed instructions and assessment, the course focuses on both learners' and [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1110

Internet as a Basis for “Knowledge Monopoly”

As a result of the internet being incorporated in day to day lives, this study will try to investigate whether "Internet creates favorable conditions for monopolization of knowledge, the role of the Internet, as a [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 2256

“What’s Your Best Innovation Bet?” by Schilling

Therefore, the article holds that the understanding of the evolutionary process of technology and the dynamic needs of customers is critical in designing innovations that would become relevant for a considerable time.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1144

Information Visualization: Task by Data Type Taxonomy

In the Department of Tourism and Commerce Marketing, the way the TTT may be implemented at the individual, group, and organizational levels can be substantially defined by both the types of data used at those [...]
  • Subjects: Data
  • Pages: 10
  • Words: 2734

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1445

Air Traffic Controllers and Their Job Hazards

Given the tight schedule of these participants, and the limited time that the researcher had to conduct the study, a small sample of 20 participants was selected. The researcher explained to them the relevance of [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2326

Web-Based School Management Mobile Application

The implementation process was scheduled to commence with the infrastructural development of the web-based system and upload all school data into the system.
  • Subjects: Technology in Education
  • Pages: 35
  • Words: 9824

Introduction to Human-Computer Interaction

It is a scope of study that explores how individuals view and ponder about computer related technologies, and also investigates both the human restrictions and the features that advance usability of computer structures.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1148

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1111

Saudi Aramco Company’s Engineering Innovation and Ethics

The organization has been operating in the environment of the global market since 1933 and has gained a reputation of the company that promotes technological innovation as the foundational tool for attaining high-quality rates.
  • Subjects: Engineering
  • Pages: 14
  • Words: 3920

Biometrics and Body Scanner in Aviation Security

In particular, regulation number 300/2008, issued and approved by the European Parliament and Council, outlines a set of common standards and rules affecting the procedures involved in aviation security matters; to be more precise, the [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3852

Sliderocket Use in Education: Step-by-Step Guide

For instance, to add a picture, click on the 'Picture' icon and select the location of the picture. Select what to import, whether PDF or PowerPoint and click on the 'Next' button as shown below.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1638

Aviation: Security Risk Management

Moreover, the rise of terrorism and its spread throughout the globe has also contributed to the great importance of security measures that must be explored to guarantee the security and safety of passengers and personnel [...]
  • Subjects: Aviation
  • Pages: 11
  • Words: 3098

The Carnival Triumph Cruise Ship’s Crisis Management

This paper is a critical analysis of the crisis communication surrounding the marooning of the Carnival Triumph Cruise ship. The contribution of the Carnival's PR in addressing the Triumph crisis is subject to analysis to [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2838

Power Amplifiers: Aims, Classes and Theory

The main aim of power amplifiers is to transform a signal of a weak strength to a signal of strong strength and direct it into a load at significantly higher power.
  • Subjects: Engineering
  • Pages: 2
  • Words: 685

How Technology Has Destroyed Jobs in Our World Today?

As pointed out by Rotman, the same technology that is apparently making work easier and helping to increase the level of productivity in business enterprises is responsible for killing jobs and getting rid of humans [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 850

Software Bugs Types, Causes and Consequences

A software bug is a term that is used to denote a fault, error, or failure in a piece of computer software, which yields an undesirable result such as a software crash, incorrect behavior of [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 681

ISURVEY, Dub Interviewer, Voxco Online Software

The present paper undertakes a comparative analysis of three such data collection software namely iSURVEY, Dub Interviewer, and Voxco Online.iSURVEY is the versatile and reliable data collection software that supports unlimited devices and can be [...]
  • Subjects: Data
  • Pages: 3
  • Words: 895

The Ballpoint Pen: Materials, Process and Issues

This essay explores the geological information of the raw materials, the processing steps and the environmental issues. With the raw materials ready, brass is obtained from a mixture of the two, with copper dominating the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 645

Apple Pay: The Use of Technology in the Marketplace

While it is obviously too early to speak about eliminating regular paper and metal money, it is possible that the implementation of NFC payment can be a major step in this respect.
  • Subjects: Applications
  • Pages: 8
  • Words: 2257

Making a PowerPoint Presentation

Tim Washer, attempts to highlight some of the issues that affect the effectiveness of a PowerPoint presentation and how one can solve these issues. In addition, Washer suggests that developing a story relevant to the [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 572

Accidents and Ramp Damage – Aviation

In order to prevent substantial expenses described afore, it is undoubtedly worthwhile for airlines and aviation companies to invest in ground operations safety and train all the staff working in the ramp and gate areas.
  • Subjects: Aviation
  • Pages: 2
  • Words: 560

Cell Phone as an Indispensable Companion

It has brought a variety of innovative things for the user and to a substantial extent affected the way people relate in the globe.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 847

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

Singapore Airline

The main objective of the analysis is to have firsthand experience of the problems facing the company and gain knowledge concerning probable developments and potentials.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1596

Information Management Systems

It also discusses the importance of such systems in the context of the need to handle big data. For transaction processing system, the appropriateness of the dealings is overly dependent on the accurateness of the [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2290

Effects of Technology on Culture

To identify the main players, such as people and devices, that led to the attainment of this condition in the family unit.
  • 5
  • Subjects: Technology Effect
  • Pages: 11
  • Words: 3238

Ephone v900 Mobile Telephone Advert

In the advert, the artist uses the element of space to illustrate the background thus indicating to the viewer the probable setting of the image.
  • Subjects: Phones
  • Pages: 2
  • Words: 570

Legal and Ethical Issues in IT

The fact that technology keeps changing adds to the complexity of the ethical and legal issues surrounding information technology. One of the most significant ethical issues in information technology is that of appropriate use.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

Linux, the Operating System of Choice

A recent trend in the field of software is the open source genre, and it can rightly be said that the Linux operating system has become the embodiment of this genre.
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3421

Technology and Its Future Development

It is clear that technology is starting to become smaller but it is to the benefit of people and with careful control will not evolve into a great evil.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 559