Tech & Engineering Essay Examples and Topics. Page 5

5,866 samples

Routing Protocols for Wireless Sensor Networks

This has motivated serious research in recent years addressing the possibility of cooperation among sensors in processing data and the management of the sensing events and flow of information to the sink.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4283

Agile Auditing: Benefits and Drawbacks

5
Furthermore, it helps increase the speed of audit cycles, improve the scope of the audit, and create efficiency in the audit process.
  • Subjects: Project Management
  • Pages: 8
  • Words: 2336

Qantas Airways: Cross Culture and Safety Management

The latest development in the field is relevant to cross-cultural issues and their impact on safety which still requires further study and appropriate application in the airline industry as merger and acquisition of airlines is [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3740

Effective Project Management

Leadership and effective management help the project manager to direct and guide human resources and establish a positive culture and morale inside the organization The core of effective project management is effective control of all [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 868

AutoCAD in Different Fields of Design Technology Study

In the engineering technology, CAD is overwhelmingly used from the conceptual layout and design, through a comprehensive engineering and analysis of constituents, to the definition of the various manufacturing methods used.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3092

Why Is Samsung Considered a Design Inspiration?

The reimagined camera is one of the key features of the Samsung smartphone that reflects the inspirational design. Samsung employs the horizontal integration strategy in the production of its smartphones and other products.
  • Subjects: Phones
  • Pages: 5
  • Words: 1444

Laptop Models and Their Specifications

The best feature of this laptop is that it has genuine Windows 7 which is suitable for a RAM of 2GB and hard drive of 320 GB.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 681

Electrical and Electronics Engineering Career

The main aim of the report is to enable the career consultants who will be acting as career advisors to be able to understand my career field and in the process, they will be able [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 621

Badrul Khan’s Web-Based Framework

Providing the opportunity of learning in any convenient manner, time, and pace as well as benefiting the instructor in terms of the idea of distributed instructions and assessment, the course focuses on both learners' and [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1110

The Boeing Dreamliner Project Management

This paper seeks to conduct the following: make a brief overview of the Boeing Dreamliner project, identify the problems that were encountered during project implementation and relate them to theory, and give a recommendation on [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1179

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 919

Workflow Management Systems: Contemporary Application

In general, a workflow management system helps to improve the management of projects. Administrative workflow management systems are designed to help with the management of clerical processes in an organization.
  • Subjects: Project Management
  • Pages: 7
  • Words: 1953

Music Industry & Technology: Benefits and Threats

One of the advantages that technology introduced to the music industry is that it has enabled the distribution of music all over the world, thus increasing sales.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2259

Relationship with Cell Phones

Cell phones are people's new relationship because people use them to execute many of their daily activities. They have encouraged multitasking and solitude because people spend a lot of time interacting with information and communication [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 598

Technology Use among Children: Ethical Issues

The use of technology has triggered innovations and enhanced the skills of children and adults. Some of the contents in the internet are very dangerous to the children.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1378

How Does Technology Affect the Economy?

5
The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 887

Technologies Effects on Society

Proponents of the technology argue that it improves communication and enhances learning. However, sustained use of technology leads to the development of addictions that affect the productivity, work, and health of victims.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 932

Google Docs Challenges and Opportunities

In this paper, I will discuss the Google Docs as a one of the prominent tools for collaboration, and try to present the challenges that are faced in its implementation, and how they are overcome.
  • Subjects: Applications
  • Pages: 2
  • Words: 1483

Archives Unique Collections

The difference between the archival materials and the library materials is that in the archives,the materials are arranged in groups on the basis of their information content.
  • Subjects: Data
  • Pages: 10
  • Words: 2750

Monopolistic Competition of Smart Phones

4
In the flurry of the responses that followed, there was concern whether the smart phone market was becoming monopolistic. This was a clear indication that the competition in the smart phone market was becoming monopolistic.
  • Subjects: Phones
  • Pages: 3
  • Words: 863

Multimedia Hardware Key Devices

Differentiation multimedia devices and product evaluation The multi-communication tools are instruments that support the transfer of data from one standpoint to another. That is the devices influence image display, production of pictures, drawings, storage of [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1692

Wireless charging

1
The application and constant development of mobile phone technology in the modern era is experiencing a boom, as innovators in the technology sector look forward to a future of introducing wireless charging technology for the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1194

The Internet’s Good and Bad Sides

On the other hand, the internet is the root of some of the bad evils that have befallen many people, true and the internet is the beginning of what Gibson described as a place to [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1632

The Solar Powered Flashlight and Its Advantages

Once fully charged, the solar powered flashlight will play an important role of ensuring one is able to navigate all the challenges that might arise at night.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 556

Cap Ordering in Data Flow Diagrams

Diagraming a data flow is useful due to the fact that it brings structure and organization to a complex set of processes, such as ordering a cap for graduation.
  • Subjects: Data
  • Pages: 1
  • Words: 281

The Excel Spreadsheets Formatting

The default option is left alignment but one can choose for it to be center or right to improve the readability of a spreadsheet's content.
  • Subjects: Applications
  • Pages: 1
  • Words: 332

A Food Truck Business: Project Summary

Steps to be followed in starting the business will be researching local food trucks and laws, developing the business name and concept, registering, raising funds, and seeking permits and licenses. The next steps will be [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 615

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Tools for Installation Stage of Cyber Kill Chain

A hack tool is also used to create malware by adding an unauthorized user to the list of those permitted and then deletes the logs to prevent tracking of the attacker in the system.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 578

Electronic News Gathering

The Characteristics involve the Utilization of electrical video to gather information, the Incorporation of Audio technologies in gathering news, and the Utilization of portable equipment in the newsgathering process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1366

Application of Pneumatics and Hydraulics

The use of these systems results in much less complicated systems as parts like gears and cams are eliminated and fluids used in the transmission of power instead of solid parts.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1673

Building a PC, Computer Structure

The choices available are Western Digital 320GB and Seagate 320GB and my advice would be to go for Western Digital as it is a good performer all along.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 910

The Tractor Hydraulic System: Components

The valves also block fluid flow via the center when the hydraulic is in the aforementioned state. Valves also allow the flow of fluid through the center and into the reservoir during this particular.
  • Subjects: Engineering
  • Pages: 3
  • Words: 964

Managing the Cyber Intelligence Mission

To manage the risk in the future, equities should be reconciled, and resources should be allocated as per the collective decision of the personnel.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 580

Privacy Challenges in the Modern Age

Although proponents of these devices argue that their usage helps to acquire the necessary information regarding the customer use of their products and consequently enable them to improve on them, the use of RFIDS just [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 829

Communication Technologies: From Telegraph to the Internet

From the time the telegraph was invented up to the current time, the world population has continued to increase, triggering improvements in communication technology and leading to the invention of the current-day internet.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1101

Nintendo Gameboy: Technological Advancement

Nintendo has made lots of variation in the original game boy this includes the Game boy pocket which is 30% smaller than the original game boy with equal size screen, the Game boy color it [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1243

Computers in Education: More a Boon Than a Bane

Thus, one of the greatest advantages of the computer as a tool in education is the fact that it builds the child's capacity to learn things independently.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1571

Mobile Phones and True Communication

This problem led to the invention of mobile phones which foster true communication in the following aspects. The radio enhances communication because one is capable to get world news despite the compactness of the phone.
  • Subjects: Phones
  • Pages: 2
  • Words: 560

Software Architecture and Its Styles in Examples

The purpose of software architecture is to solve issues and design problems beyond the basic algorithms and data structures used in software instead of focusing on structural phenomena.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1244

Types of Acoustical Materials

These diffusers are used in order to supply a uniform broadband scattering of the sound and lower the high-Q reflections of sound waves.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 931

Science and Innovation in Different Societies

Firstly, it is critical to study the importance of science and innovation because the fields high influence the life of people by making it more convenient such as the usage of elevators.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 274

Safety Pyramid Theory: Myth or Reality

Most of the readings that I found were written within the last few years so the information was rather new and relevant to the modern Safety Culture.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 2253

Science and Technology Impact on Globalization

Globalization has by now laid down the phase for this epoch through making the world interrelated further and the tools of empowerment available to all."To start with, Globalization refers to the trend toward countries joining [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 826

Etihad Airways’ Forecasting and Ticket Ordering

In the aircraft industry, productivity is not hard to measure due to the transparency of annual reports and a rather visible impact of the core variables on the success of the company.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1427

Cyber Attack: “Guardians of Peace”

In the next month, GOP threatened the company and urged it to cancel the release of the film "The Interview". Sony accepted the demand and did not let the film run on the cinema screens [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 911

Information Technology Department Security Measures

For the majority of modern companies, the process of data destruction is one of the essential procedures allowing the organization to run smoothly and manage their data efficiently while staying protected.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 596

Electronics Use and Impact on Children’s Health

This should not only be taken as a good and positive sign in the growth and development of the child but as a future influence in the learning and development of the child.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1194

The Dark Web, Its Structure and Functionality

The objective of this paper is to provide the description of the Dark Web, its structure and functionality, review the content and services offered through this network, and evaluate the impact of illegal activities performed [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 1979

PlayStation Product: Innovation Analysis

A specific technological innovation is the console used in PlayStation in the video games industry. The inclusion of the software in the PlayStation led to improved visual quality of the consoles.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1714

Egypt Air Hijack and Its Impact on Aviation

This incident led to the sudden closure of the airport. Several negotiators were involved throughout the event to secure the lives of the 56 passengers in the hijacked aircraft.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1408

Aviation Logistics Internship in the UAE

As a trainee in the department of aviation logistics, I was supposed to supervise the procurement and shipment of varied military resources.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3177

Google Chrome SWOT Analysis

Chrome is well poised to remain the number one choice for web users because it is available in both desktop and mobile platforms.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 948

Jet Engine in the Air Transport Industry

The purpose of this essay is to evaluate the impacts of the jet engine development on the air transport industry. The following is a discussion of some of the implications that the jet engine brought [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1978

PC Network Troubleshooting

For instance, simple restart of the program, sending the signal to the system in order to reload the initialization file restores the problem.
  • Subjects: Internet
  • Pages: 10
  • Words: 2780

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 4954

Analysis of Dubai’s Aviation Model

This paper not only sheds light on the factors contributing to the success of the sector but also analyzes the contributions of the aviation sector to Dubai's economy. The success of the partnership is attributed [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1574

Information Retrieval Methods

4
The search mechanism is the system that allows for the searching of the database for the retrieval of the information stored in it.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2493

The Issue of Privacy

In the magazine article named 'Privacy and the Limits of Law', the author Ruth Gavison has pointed out that perfect privacy is impossible to be achieved most of the times with the emerging technologies in [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2208

Machinery and Modern Industry

The main thrust of the essay though was not to point out how effective machines are in increasing the means of production, rather, it was the intention of Marx to reveal how the use of [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1737

Drawing a Performance-Evaluation Data Flow Diagram

Mukunda approved the data flow diagram for workplace applications, given that it covers the entire scope of a performance evaluation process, including employee self-reflection and collaborative coordination between top managers and their subordinates.
  • Subjects: Applications
  • Pages: 1
  • Words: 372

Noise Management in the Aviation Industry

In particular, it causes noise pollution, which is the most significant problem that elicits adverse reactions in the communities, thus constraining the growth of airports and, consequently, the aviation industry.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2028

Buffer Overflows and Data Execution Prevention

Since buffer overflow is about memory, the user can protect it by not writing beyond the specified space, which can be covered by the Data Execution Prevention method by preventing the application from being executed [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 858

Future Innovations and Their Role in People’s Life

For instance, laptops and smartphones that allow people to make video calls to their friends and family on a different continents altered the conventional realization of space and time.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 806

Government Restriction on the Internet

The restriction by the government has been enforced to promote the limitation of the content display that is only necessary for the user.
  • Subjects: Internet
  • Pages: 6
  • Words: 1737

Cybersecurity Workforce in Emergent Nations

The lack of help from developed countries in the training and education of a cybersecurity workforce for developing nations can negatively affect the former. Public and private organizations also contribute to the development of cybersecurity [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 831

Layering and Encapsulation Security Design

The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures. Thus, it is an example of a wrong solution to the world.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 720

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

Effectiveness of Integrating ICT in Schools

Most of the learning activities were undertaken in a classroom in front of the students, and assessment processes were conducted in class with paper and pen assessments.
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2908

Relational Database: The University Database

A tutor also qualifies as a module coordinator and hence the primary key of any of the tutors is the ModCoord. The association between the module coordinator and the student table is a one-to-many type.
  • Subjects: Data
  • Pages: 7
  • Words: 2325

The Principle in Net-Centric Computing

The invention of the computer and the subsequent creation of computer networks are arguably the biggest achievements of the 21st century.
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 887

The Implementation Process and Design

The major purpose of this research paper is to determine the stages to be considered during software implementation. The paper will conclude with a consideration of recommendations after reviewing the stages to be involved during [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 912

Computer Sciences Technology: Smart Clothes

In this paper we find that the smart clothes are dated back to the early 20th century and they can be attributed to the works of artists and scientists.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2648

Aviation and Aerospace Future Technology

Aerospace refers to the earth's atmosphere and the space beyond it. Technology in both aviation and aerospace has proved to be of great advantage to mankind over the years.
  • Subjects: Aviation
  • Pages: 2
  • Words: 716

Airbags’ History, Working Principles, Usefulness

Road traveling and road transportation are some of the oldest methods of road uses since the birth of technological era and the commencement of human civilization.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1889

Cyber Attack on Sony Company

The main goal of this paper is to analyze the case of cyberattacks on Sony, discussing the existing evidence and alternative decisions that could have alleviated the negative impact of the incident on customers.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 871

Virtual Reality’s Main Benefits

The rapid development and the growing popularity of virtual reality raise a logical interest concerning the advantages and disadvantages that are related to the application of this new technology in various spheres of knowledge and [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 909

Artificial Intelligence and Humans Co-Existence

Some strategies to address these challenges exist; however, the strict maintenance of key areas under human control is the only valid solution to ensure people's safety.
  • Subjects: AI
  • Pages: 2
  • Words: 658

Cutting Tools, Their Failure, Use and Materials

Experts strive to develop materials that can work under high temperatures and forces while minimizing the proneness to wear of a cutting tool during machining operations.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1409

Testing Approaches and Change Management Process

There are several integration testing levels: Component Integration Testing checks the interaction between the system components after their testing. System Integration Testing checks the interaction between different systems after the system testing.
  • Subjects: Programming
  • Pages: 3
  • Words: 845

Airport Security and Air Travel Safety

The study was based on an evaluation of the evolution of airport security with respect to the general safety of this mode of transport.
  • Subjects: Aviation
  • Pages: 12
  • Words: 3316

Recording Studio Equipment: Hardware and Software

The purpose of this report is to present the information on the necessary equipment to purchase; the justification of the equipment choices; the discussion of the equipment connectivity and the diagram; and the budget table [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1500

Sony Corporation Hacking and Security System

The organization had to stop the hackers and ensure information did not flow freely but it was unfortunate, as the company sought the services of the California court because it had no capacity to deal [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 848

Hershey Corporation Project Management

Hershey outsourced the services of three firms to aid in the implementation of the ERP software. An effective criterion to determine the success of the project is necessary in order to evaluate major milestones in [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2746

Project Management: Sydney Water Company

Besides, from the start of the project, there were unclear procedures on how the project was to be reported to the board of directors.
  • Subjects: Project Management
  • Pages: 6
  • Words: 2058

Technology Evolution in The Modern Society

Service perspective - which holds that e-commerce constitute a tool that fulfills the needs and desires of companies, customers and management with aim of reducing the transaction costs while at the same time being able [...]
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4289

Internet Filtering Positives and Negatives

The issue of keeping of information by governments does not hold because as the government leaves the internet open to no filtering, it only protects the rights of a few individuals.
  • Subjects: Internet
  • Pages: 4
  • Words: 1042

Human Computer Interface: Evolution and Changes

The conferences will not require members to be there in person as the events can be transmitted to people in their homes and they can make suggestions too.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 568

Wireless Sensor Networks

The set up of this topology is very organised in such a way that, every single node in the system has a unique number of nodes, which are interlinked to it, at the lower point [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1618

Impact of the Digital Society

Electronic commerce has the following drives with respect to impact of digital society: Internet penetration Many individuals and organizations are capable of accessing internet services to check emerging and market trends Internet charge services have [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1589

Internet Files Sharing

The tutor and the student are now able to communicate and exchange file over the internet in form of lessons, instructions, and assignments online.
  • Subjects: Internet
  • Pages: 4
  • Words: 1079

Technology and Music Industry

The impact of file sharing technology in the music industry has been a major obstacle to its advancement. In a clearer way, the future purchase and sale of music is anticipated to be easier.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1720

Importance of Data Analysis

In order to determine the methods of mathematical and statistical processing, first of all, it is important to assess the nature of the distribution for all the parameters used.
  • Subjects: Data
  • Pages: 4
  • Words: 1118

Technology and Wind Energy

Efforts by the elite members of the society enlightened the global countries about the benefits of renewable energy sources in conserving the environment prompting the need to consider wind energy.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 295

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Subjects: Internet
  • Pages: 4
  • Words: 1285

The Influence of Memes on Our Lives

After the third grade, I went to my grandparents on vacation in the village, and I planned to have fun with my friends and spend time in the fresh air in the countryside.
  • Subjects: Internet
  • Pages: 6
  • Words: 1683