Tech & Engineering Essay Examples and Topics. Page 5

5,366 samples

How Does Technology Affect the Economy?

The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
  • 5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 887

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 575

Construction of the Empire State Building

The size of the building demanded for the erection of 64 elevators that could be used to convey people and materials up and down the construction.
  • Subjects: Project Management
  • Pages: 15
  • Words: 4149

Using Technology in Classrooms

Baylor and Ritchie found that for technology to work well in the classroom, it must be complemented by a series of other activities.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1440

Academic Writing Under Impact of Technology

A study of the impact of technology on academic writing will determine the potential future development of different types of academic writing.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1264

Using Technologies in Kindergarten Classrooms

Integrating modern technologies into the educational process in kindergartens helps educators transmit knowledge to the children and influence their emotions and perception of the materials.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1671

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

Data Buses: Definition and Key Features

The significance of the address bus is to assist the CPU in locating specific information in the memory, while the control bus regulates data processing.
  • Subjects: Data
  • Pages: 1
  • Words: 286

Sony’s Response to North Korea’s Cyberattack

Therefore, while the terrorists used cyberattacks to steal the company's information and destroy their equipment, Sony switched the release to on-demand platforms and streaming services, allowing a speedy and widespread release of the film.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 574

Characteristics of Robotics

What concerns the elaboration of an obstacle course in a "real-world" simulation, it is essential to ensure the presence of several procedure testing steps that will determine the functionality of a robot. What concerns the [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 917

EMR Implementation Project Plan at LPC

The project is in line with its short-term and long-term strategy to minimize carbon footprint and promote the ongoing green initiative.
  • Subjects: Project Management
  • Pages: 10
  • Words: 2878

The Usage of VR Technologies in Football

In sports, VR is on its way to becoming one of the essential tools for a sports organization that aims to acquire a competitive advantage.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 562

The Delta Airlines Flight 191 Crash

When the pilot successfully flies through to the other end of the microburst, the direction of the wind changes and becomes a tailwind because it is now behind the plane.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2849

Multimedia Use in Teaching

The main reason for easier conceptualization of the facts is the interaction and identification of images presented in videos and the ability of video to arouse imagination in the watchers.
  • 5
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 1856

Analysis of The Veteran Affairs Data Breach

The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 589

Process Description of a Rescue Robot

Roboticists in the physical design of rescue robots ensure that the robots can traverse places that are physically unreachable to human rescuers and additionally equip them with a variety of distributed technology that enable them [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 967

Condenser Operation and Maintenance

The design of the surface condenser is such that steam is made to get its way into the condenser system through an opening at the top section of the condenser system after which distribution takes [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2202

Wi-Fi Technology and Applications

This paper discusses the Wi-Fi application and the technology behind its operation and functionality. This is a set standard within the wireless domain and is based on IEEE802.
  • Subjects: Internet
  • Pages: 4
  • Words: 1343

Global Climate and Computer Science

In an attempt to discover the role technology can play in the research of climate change, several approaches have been recommended by the UN's Intergovernmental Panel on Climate Change.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 611

The Aviation Industry in France

The amalgamation of five private airlines in the year 1933 led to the formation of Air France, the national airline. In the early nineties, the airline was in the brinks of collapse due to heavy [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1908

Security of E-Mails

As stated in the paper being analyzed, this is the latest version of S/MIME and has a number of Enhanced Security Services such as secure mailing lists that allow just one digital certificate to be [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1155

Building a PC, Computer Structure

The choices available are Western Digital 320GB and Seagate 320GB and my advice would be to go for Western Digital as it is a good performer all along.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 910

Spanish Fork Wind Park in Spanish Fork

The southern easterly nightly canyon wind resource that is to be the most reliable wind in the US is harvested by the farm.
  • Subjects: Project Management
  • Pages: 2
  • Words: 613

Mobile App Development Career Speech

On the other hand, mobile app development might be a tedious task, which requires superior analytical skills and mastery of programming languages. In conclusion, mobile app development is a fascinating and rewarding career.
  • Subjects: Applications
  • Pages: 2
  • Words: 772

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Why Internet Filters Should Be Used?

Internet filters give parents a sense of control over their children in the only area of their lives where parents cannot get in, that is the internet.
  • Subjects: Internet
  • Pages: 2
  • Words: 723

Effects of AI on the Accounting Profession

They aimed to find out how AI affects the performance of accounting professionals, investigate whether there have there been changes in employee attitudes toward AI, explore factors that could influence changes in the attitudes of [...]
  • Subjects: AI
  • Pages: 35
  • Words: 17991

Data Mining Techniques and Applications

The use of data mining to detect disturbances in the ecosystem can help to avert problems that are destructive to the environment and to society.
  • Subjects: Data
  • Pages: 2
  • Words: 758

The “Smart City” Concept

Such end users are the Dubuque authorities that receive valuable data as the decision makers and the responsible citizens of the city as the evaluators of the impact the project has on their life in [...]
  • Subjects: Technology Effect
  • Pages: 12
  • Words: 1940

Technology in Education and Medicine

Also today, courtesy of technology, students with learning disabilities can participate fully in the learning process using assistive learning techniques and programs.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Educational Policy Changes: Technology in Education

The goal of the policy change is to ensure that schools can adequately apply innovative technology, including devices and applications to engage students in the learning process and provide them with skills necessary to use [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 5123

Interactive Whiteboards in Saudi Arabian Schools

A comprehensive understanding of the benefits of adopting technology and the barriers to its maximal integration and implementation in learning institutions will create a better platform from which to review the existing literature and explore [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 4862

Human Factor and Motivation in Aviation Security

For this reason, the human factor in aviation security becomes a crucial issue that should be investigated in order to improve this aspect and minimize the probability of error.
  • Subjects: Aviation
  • Pages: 14
  • Words: 3907

The Impact of Technological Change on Business

While it is obvious that effective and diverse means of communication have been at the disposal of entrepreneurs for more than a century now, it is undeniable that the development of the informational technology, especially [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1735

Vibration Control in Rotating Equipment

Vibration in rotating machines occurs because the centre of rotation of a machine does not coincide with center of mass. Machine imbalance is the most common cause of vibration in rotating machines.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2170

Supervisory Control and Data Acquisition System

Sensors and control relays transmit data to RTUs and PLCs deployed in specific locations of the managed system, and this is where data acquisition occurs. RTUs and PLCs send the acquired data to the master [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1137

Thermistor and Its Applications

This paper examines the working mechanism and applications of Thermistors Thermistors are special kind of variable resistors whose resistance changes with changing temperature i.e.a change in thermal temperature results in changes in its resistance value.
  • Subjects: Engineering
  • Pages: 2
  • Words: 668

Multitouch Devices Usefulness in Society

The purpose of the study was to outline the various problems multitouch technology encounters, its features, and usefulness in society today.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 869

The Parking Garage Project Risks

Risks are classified as construction risks, financial and economic risks, performance risks, security, contractual and legal risks, physical risks, political and societal risks, technical risks, external risks, and project management risks among others.
  • Subjects: Project Management
  • Pages: 3
  • Words: 842

Reflection of Consultancy Project

In the fifth level, the learner judges the adequacy of the explanations and values found in the fourth level. In solving the challenge, we had to put ourselves in the shoes of the consumer and [...]
  • Subjects: Project Management
  • Pages: 17
  • Words: 4841

Physical Disabilities and Assistive Technology

For example, learners with visual impairments can use text-to-speech programs. Learners with physical disabilities can be gathered for with the help of assistive technology devices such as adaptive keyboard and screen reading software for learners [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 663

Cognitive Development: Information Processing Theory

Using the computer analogy, the proponents of this theory assert that the human mind is a hardware comprising of the brain and nerves as peripherals and that the mental processes are software.
  • Subjects: Data
  • Pages: 10
  • Words: 3948

Wireless charging

The application and constant development of mobile phone technology in the modern era is experiencing a boom, as innovators in the technology sector look forward to a future of introducing wireless charging technology for the [...]
  • 1
  • Subjects: Engineering
  • Pages: 4
  • Words: 1194

Concepts of HP Laptops

The quality of HP laptops is not a selfish guarantee of aggressiveness in the market, but rather market protectionism and increased sales.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 665

Push Versus Pull Technology

Therefore, the number of business applications as well as the tools and protocols that guide the operations of the internet will keep on increasing.
  • Subjects: Internet
  • Pages: 6
  • Words: 1617

Role of Engineer in Global Challenges

Additionally, concessions should be made by stakeholders in terms of funding and availing the necessary conditions for engineers to come up with innovative ways aimed at dealing with these challenges.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1372

Aircraft Conceptual Design

It involves the approximations of the size dimensions, weights and the selection of aerodynamic properties suitable for the satisfaction of the requirements as described in the proposal of the aircraft design.
  • Subjects: Aviation
  • Pages: 15
  • Words: 3706

Organization Behavior and Management: Space Shuttle Challenger

This paper will look at the SHUTTLE 51-L MISSION, the organization that was involved in the Challenger project, the mechanical failure of the Space Shuttle Challenger, the organizational behavior and management shortcomings that contributed to [...]
  • Subjects: Accidents & Protection
  • Pages: 11
  • Words: 3029

IT Implementation Plan for Cloud Computing

Assessment of market requirements: Here, the service provider, the broker, and the organization must study the features of cloud computing to instill trust among them and on the new product.
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1565

Ethics in Computer Technology: Cybercrimes

The first one is the category of crimes that are executed using a computer as a weapon. The second type of crime is the one that uses a computer as an accessory to the crime.
  • 5
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1334

Creating a Strong Password

Users should create a password that contains secure relations to certain applications or tasks so that it will be easy to remember.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 605

Improvement of the Hp Touchpad and WebOS

Due to the poor performance of the Hp touchpad, many people started speculating the reasons for the poor sales performance of the gadget with some experts observing that the lack of Apps and the failure [...]
  • 5
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2148

Hacking: Positive and Negative Perception

The possible advantage of cooperating with hackers for security systems mangers of international organizations and governmental organizations is the probability to recruit them and use their knowledge to empower different organizations to improve their security [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 538

Is Technology Neutral?

Rather than attribute the loss of jobs to adoption of technology, it is more appropriate to blame the loss of jobs on the decision to adopt technology.
  • 3.5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 975

Industrial Engineering

This is to facilitate development of appropriate construction designs, allocation of resources, and crafting of superior strategic plan to enhance effectiveness.
  • 4
  • Subjects: Engineering
  • Pages: 4
  • Words: 1094

Memorial Health System CPOE Implementation

The management of the organization plays a vital role in project planning and implementation and in effecting the organizational change to enhance the use of the new technologies.
  • Subjects: Project Management
  • Pages: 2
  • Words: 892

History of the Networking Technology

The development of computer networks is the answer to the urgent need of the modern day workplace to have the ability to receive and send information quickly and efficiently.
  • Subjects: Internet
  • Pages: 10
  • Words: 2699

Smartphones: Benefits and Side-Effects

The findings have led to a greater understanding of smartphones' influence on young people of school age, which lays the framework for minimizing the harmful effects of smartphone usage in children and adolescents.
  • Subjects: Phones
  • Pages: 5
  • Words: 1472

Artificial Intelligence’s Impact on Communication

Therefore, it is worth concluding that although artificial intelligence is now at a high level of development, the communication of technologies among themselves needs to be improved. The bots will be trained by artificial intelligence [...]
  • Subjects: AI
  • Pages: 1
  • Words: 367

The Age of Artificial Intelligence (AI)

The film "In the Age of AI" exhibits the importance of AI in transforming society. According to the documentary, AI integration in the transport sector has made it easier and safer for people to move [...]
  • Subjects: AI
  • Pages: 3
  • Words: 875

The Java and C++ Languages Comparison

On the other hand, C++ is more advanced programming that evolved from the C programming language to improve the designs available and allow for a high degree of memory in computer resources.
  • Subjects: Programming
  • Pages: 3
  • Words: 886

Software Piracy and Its Impact on Society

Two, the absence of warranties with the pirated software means they are exposed to increased security risks with the software containing viruses and associated malware that affect computers.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 283

Failure of Airbus A380 Production

This paper looks at the review of the problems facing the airline industry as a whole, the methodology used in the research, findings on the failure of A380 production and the analysis.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2846

White Hat and Black Hat Hacking

On the other hand, White Hats work with companies and help them identify weaknesses in their systems and fix relevant vulnerabilities to ensure that attackers cannot illegally gain access to data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 608

Should the Internet Be Regulated?

The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
  • Subjects: Internet
  • Pages: 2
  • Words: 661

Agile Auditing: Benefits and Drawbacks

Furthermore, it helps increase the speed of audit cycles, improve the scope of the audit, and create efficiency in the audit process.
  • 5
  • Subjects: Project Management
  • Pages: 8
  • Words: 2336

Excel Spreadsheet Tools and Their Applications

Therefore, this paper provides a description of the Excel spreadsheet tool and the relevant applications of spreadsheets in finance, marketing, and accounting activities.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2006

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

History of Radio and Guglielmo Marconi

Marconi demonstrated the usability of the radio for military and naval purposes and launched the company to develop and distribute radio communication services and equipment.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 336

The Influence of Robots and AI on Work Relationships

In the early 20th century, Taylor's work focused on production management and labor efficiency, which led to the attention of managers to the problems of selection, the motivation of employees, and their training.
  • Subjects: AI
  • Pages: 3
  • Words: 903

Child Under 10 Years of Age With a Mobile Phone

The resulting impact of mobile phones on the rate of cancers and neurological diseases is still to be researched, and the risk for children should not currently be considered acceptable.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 512

Mobile Phones and True Communication

This problem led to the invention of mobile phones which foster true communication in the following aspects. The radio enhances communication because one is capable to get world news despite the compactness of the phone.
  • Subjects: Phones
  • Pages: 2
  • Words: 560

Cause and Effect of Change in Technology

The cause of change in technology is, perhaps, rightly due to the evolution of humankind. A rosy picture is generally painted by the proponents of modern and contemporary technology in the business world.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 618

Bill Gates’ Contributions to Computer Technology

Upon examination of articles written about Gates and quotations from Gates recounting his early childhood, several events stand out in significance as key to depicting the future potential of Gates to transform the world with [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1306

Disruptive Technology and Its Implications

As a result, their extensive use of smartphones denies them the opportunity of understanding the way they relate with these groups of people.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 580

Project Management: Building ICT Center

The project director will be in charge of the reporting and the running of the project's expenses throughout the specified timeframe.
  • 5
  • Subjects: Project Management
  • Pages: 21
  • Words: 5414

Electronic Reading Devices, Their Pros and Cons

Such devices may be expensive and unaffordable for some people. Overall, reading on electronic devices offers vast opportunities both for the publisher and for readers of all ages.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 281

Multimedia Technology for Teaching and Learning

Studies have shown that the use of multimedia is a technological phenomenon because its applications involve the use of technology. The implication is that multimedia has a theoretical basis for both teaching and learning.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 567

Technology and Human Development

This paper discusses video games as learning tools to highlight the kind of knowledge that they present to learners and their effectiveness in enabling people to acquire the knowledge.
  • Subjects: Technology in Education
  • Pages: 9
  • Words: 2508

Emergency Response Planning in the Airline Industry

The goal of this paper is to provide information about the concepts surrounding this issue and to look into the impact of emergency response on the reputation of an airline and legitimacy based on real-life [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 3558

Screwdriver – Mechanism Description

The fulcrum shank of a hex nut screwdriver is a metallic rod that is attached to the handle of the screwdriver and ends with a blade.
  • Subjects: Engineering
  • Pages: 2
  • Words: 579

Google Glass Innovation’s Strengths and Weaknesses

These are some of the main advantages that this device can offer. In particular, they should focus on the development of software that can maximize the benefits of this wearable computer.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Texting’s Importance for the Society

Debate on whether texting is good or bad continues to prevail across the world, especially with the extensive growth in the use of mobile telephony in the 21st century.
  • Subjects: Phones
  • Pages: 6
  • Words: 1719

Hospitality Information Systems and Users

Given the high demand for the aforementioned services as well as the increasing number of businesses offering the services, most organizations have opted for the application of information technology in the hospitality sector just like [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1117

Effects of Technology on Culture

To identify the main players, such as people and devices, that led to the attainment of this condition in the family unit.
  • 5
  • Subjects: Technology Effect
  • Pages: 11
  • Words: 3238

Influence of Information Systems

The smooth flow of information in a business enterprise is essential for the survival of the business. Due to the limited scope of the traditional information systems, there was little functionality in the management of [...]
  • Subjects: Data
  • Pages: 2
  • Words: 2056

Turbo Charged Engines

The working principle of the Turbo charged engine A turbo charger used by an automotive is made up of a turbine, a compressor and a couple of common shafts.
  • 3
  • Subjects: Engineering
  • Pages: 12
  • Words: 3226

Project Initiation Document

In essence, proper remuneration of the staff and availability of material and financial resources were necessary for the successful implementation of the project.
  • Subjects: Project Management
  • Pages: 5
  • Words: 1189

GPS Technology Pros and Cons

GPS Navigation technology Navigation technology uses a GPS receiver and internal road database, which provides the user with a clear view of the surrounding in real time.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 632

The Home Internet and Network Security

In addition, system security should be considered as well in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 400

Satellite Imagery: Strengths and Weaknesses

It is unreliable for detecting low clouds at night because the temperature emitted by underlying clouds and fog is somewhat the same as in surrounding areas This technology is often applied to detect the presence [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Recovery of Airbus A380 From Failure

The demise of the A380 can be linked to various issues, including a change in the market as well as reduced demand for the craft, that is regarded among the largest airplanes.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2316

Kinds of Big Data: Foundations of Business Intelligence

IBM and the British Library collaborated to build a big data system. The Library collects large volumes of unorganized Web data to make them extracted, annotated, and graphically analyzed with the aid of IBM BigSheets.
  • Subjects: Data
  • Pages: 1
  • Words: 396

Engineering: Technological Discipline

With software engineering, students are taught about computers and technology and how they can code programs and design applications, software and websites. The most popular and growing professions are electrical engineering.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Health-Focused Wearable Technology

For the medical system, such technologies are vital to transfer information in real time and deliver it directly to doctors or nurses.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 390

Artificial Intelligence: Past, Present, and Future

Quantum-based artificial intelligence and its use in the military, including intelligence gathering and interpretation, present an interesting field of research. This paper addresses the use of artificial intelligence systems based on quantum technologies in the [...]
  • Subjects: AI
  • Pages: 3
  • Words: 955

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 342

Advanced Technology and Data Protection

For the purpose of clarity, advanced technology refers to a type of technology that is still immature but with the potential to deliver significant value.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1428

Cybersecurity Dangers and Their Analysis

The officer clicks the file, and the malware attacks the system stealing the data and bypassing some security measures. The cyber security framework under the NIST is helping organizations to understand and manage cybersecurity.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2960