Tech & Engineering Essay Examples and Topics. Page 6

4,436 samples

LaGuardia Airport: The Cyber Risk Identification

The rising tensions between the North Atlantic Treaty Organization and the Russian Federation have heightened the risk of cyber-attacks. As in Figure 1, the consequences are severe in the event of a successful assault since [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1491

Machine Learning in Medical Imaging

Therefore, the clarification of the basic processes of the different topics of medical imaging, including X-rays, MRIs, and CT scans, will provide context for our investigation of machine learning in the next section.
  • Subjects: AI
  • Pages: 5
  • Words: 1250

Researching of Ubuntu Operating System (OS)

The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2048

Queuing Theory at Heathrow Airport

The arrival time, service and departure processes, the waiting regulation, the lineup size, and the customers being serviced are the six components that make up a line as it is studied employing queuing theory.
  • Subjects: Aviation
  • Pages: 3
  • Words: 946

Data Visualization Review and Analysis

The use of color coding makes the data easier to interpret, while the interactivity allows the user to explore different aspects of the data and draw conclusions.
  • Subjects: Data
  • Pages: 2
  • Words: 642

Case Study on Ethical Issues: Cyberbullying

The child may be in a state of shock and upset because of the psychological pressure associated with experiencing cyberbullying and reporting it to the teacher.
  • Subjects: Cyber Security
  • Pages: 9
  • Words: 2587

Developing Design Solutions for Smart Home

The researchers offer insights into how parents' perceptions of the hazards smart home technologies bring to children's physical and digital safety developed and altered over the course of three phases. User needs in smart homes: [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1394

The Utilization of Artificial Intelligence

In addition, the introduction of artificial intelligence has a negative effect on reducing the level of work ethic and enthusiasm. In conclusion, the most significant limitations of artificial intelligence are rising unemployment and increasing laziness.
  • Subjects: AI
  • Pages: 2
  • Words: 562

Human Performance and Technology in Education

In the article "Application of Performance Technology in Educational Technology," Yingying Sun asserts the attention and concern channeled towards the performance technology in the educational technology framework.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1214

How to Choose an Encryption Algorithm Cipher

Modern encryption algorithms are sufficiently secure to be infeasible to defeat without access to the key; while theoretically possible, it would require more than a human's lifetime to do with the most advanced hardware.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 589

Virtual and Augmented Reality in Education

The novelty of this technology can be used by unscrupulous employees as an excuse to avoid preparing for lessons and working with students.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1153

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

Information Security Awareness

One of the significant human factors that influence ISA is the individuals' perception of security. Hence, individuals' perceptions of information leakage and security awareness play a significant role in the success of ISA programs.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 958

The Effects of Cyberbullying on Health

Even though education facilities frequently organize the assessment of cyberbullying prevalence, in the case of an adolescent patient's visit, a questionnaire with additional questions related to his family, peers, and self-esteem should be provided.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 636

Wearable Exoskeletons for Industry Use

Even though most of the work in the field of exoskeletons is still experimental, there are significant challenges hindering the implementation of exoskeletons in the industry including safety and discomfort.
  • Subjects: Other Technology
  • Pages: 27
  • Words: 7411

Government Funding of Airports

Therefore, this paper discusses the federal and local funding of airports and the AIP and its applications in the aviation sector.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1203

Single and Double Buffering Analysis

The concepts of single buffering and double buffering are essential to understanding how animation is being displayed. Hence, single buffering and double buffering are particularly useful in animation and address the issue of display and [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 283

Defining Data, Information, and Knowledge

Thus, information can be defined as data that develops in one's cognitive system with the help of context and human intention. Knowledge is the process of understanding and explaining the information that happens in the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 852

Waterfall Programming Methodology

The main principles of the Waterfall model are the importance of observing the stages of work and precise documentation. Due to the requirement of the complete order in the documentation, work on the project can [...]
  • Subjects: Programming
  • Pages: 1
  • Words: 376

Importance of Data Modelling in Programming

The second step is to understand the importance of details the more important they are, the more reasons to use the logical data model there are.
  • Subjects: Programming
  • Pages: 1
  • Words: 318

Modern Communication Impacted by Technology

The purpose of this writing is to examine how communications have evolved as a result of technological advancement. The glorious thing about all of these choices is that people may select the one that best [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 317

Unemployment Rate Due to Impact of Technology

By understanding the role of technology on unemployment, the public can develop innovative mechanisms to overcome the issue. The impact of technology on the labor market is relevant to my present and future life.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1109

The Autopilot Systems: Examples of Devices

The Pixhawk 4 and MP21283X autopilots with different characteristics to redundancy are analyzed, as well as the NASA Swift UAV using off-the-shelf autopilot solutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 702

The Dipole and Dish Antenna Experiments

The transmitter and receiver's wavelength are in proportion to the antenna height. It indicates that the shorter the antenna, the greater the frequencies, and the larger the transmitter, the lesser the intensity.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 967

The Excel Spreadsheets Formatting

The default option is left alignment but one can choose for it to be center or right to improve the readability of a spreadsheet's content.
  • Subjects: Applications
  • Pages: 1
  • Words: 332

The Triumph of the Nerds Video Analysis

It highlights the different factors that led to the fallout between IBM and Microsoft and how different working cultures influenced the success of the two companies.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 894

The Best Website for Creating a Portfolio

That is why it is important to use the right and reliable portfolio sites that help people organize their CVs in the right and pleasant way.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 609

Cybersecurity: The Matter of National Security

However, if the security of cyberspace is critically evaluated and all the risks eliminated, cyberspace can be an asset that will continue to transform the world.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 332

Artificial Intelligence in Marketing

Artificial intelligence in marketing is a method of using customer data and AI concepts, including machine learning, to predict the next step of the consumer and meet his needs, even those that the consumer has [...]
  • Subjects: AI
  • Pages: 2
  • Words: 621

Microsoft Power BI Software’s Features

Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Recursion Explained With the Mirror Analogy

Binary search through the integers or dictionary is conducted through the recursive binary search function that includes the array and the target information. Base case in recursion is a special case where the solution is [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 559

Technological Challenges in Business

There is a challenge for the organization's management to implement procedures and policies for effectively managing the private data of the organization.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 320

Discussion of Cybercrimes in Modern World

The relevance of cybercrime research is dictated by the fact that it is challenging to ensure the complete safety of data on the Internet.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1447

White Hat and Black Hat Hacking

On the other hand, White Hats work with companies and help them identify weaknesses in their systems and fix relevant vulnerabilities to ensure that attackers cannot illegally gain access to data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 608

Application Software Integration: Pros and Cons

The breakthroughs within the field of information technologies revolutionized the environment of software development. The integration often leads to the improvement of the reporting process.
  • Subjects: Applications
  • Pages: 1
  • Words: 294

Artificial Intelligence in Cybersecurity

The use of AI is regulated by a large amount of documentation, which should take into account the current legislation in the country of use and ethical issues related to AI, many of which have [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 585

Advantages and Disadvantages of MS Project

Microsoft provides support to their users, and MS Project team members of the project will be able to receive assistance with the software when necessary.
  • Subjects: Applications
  • Pages: 1
  • Words: 377

History and Technology Relationship Analysis

Technology is essential for the development of humanity, and it is difficult even to imagine what the next technological revolution will entail.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1132

Importance of Army Cybersecurity

This includes bringing awareness to the cybersecurity issue, involving more people to combat the problem of cyberattacks, and organizing the information based on specialty and tasks that must be completed.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1114

Tracking: More Advantages Than Disadvantages?

In this case, tracking helps the authorities to identify the exact location of criminals and apprehend them. This is because criminals might track the location and behavior of a person they intend to harm.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 293

Big Data and Distributed Databases

Big data refers to a type of set of information that requires memory beyond the capacity of the conventional relational databases.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Airport Planning and Management

This paper discusses the issues of airport capacity and delay and the related causes. Lack of capacity is a term commonly used to refer to the cause of the airport delay.
  • Subjects: Aviation
  • Pages: 3
  • Words: 920

Artificial Intelligence Investments in the UAE

One of the components of the strategy is to support the heritage of the country's founding fathers, which means the UAE has to remain among the most advanced nations.
  • Subjects: AI
  • Pages: 7
  • Words: 1962

Logic and Design: Flowcharts and Pseudocode

The basic understanding of logic and design is that processes should be presented in a way that demonstrates certain algorithms, i.e.the description of a process should be precise and should contain detailed instructions on what [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 590

How Do Vacuum Cleaners Work?

Regardless of the type, the mechanics of the vacuum cleaners is that while the engine is running, traction is created in the device, by which garbage, dust and dirt particles are sucked through a long [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 654

Microsoft Excel 2019 Experience

The program offers modern tools for creating simple and pivot tables, importing information, performing calculations using complex mathematical formulas, analyzing statistics, and visualizing it in graphs and charts.
  • Subjects: Applications
  • Pages: 1
  • Words: 279

Reproductive Technologies: Ways of Regulation

For instance, through the use of in-vitro fertilisation IVF, assistance has now been given to those who have problems in conception; also the use of PDGs prevents conception of severely abnormal children.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1572

Establishing a SOCC: The Best Practices to Follow

The role of the Security Operation Center is to prevent, detect, and respond to cybersecurity threats. The first practice that should be implemented at Sifers-Grayson is the establishment of a system for data extraction and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

Airport Operations and Cargo Transportation

Considering the significant number of employees in an airport, and the importance of areas restricted for security reasons, staff identification is a crucial part of an airport's landside security.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Discussion of Coding of Qualitative Data

Coding will address questions of leadership in nursing, tendencies for the experienced professionals to continue education, and the need for a DNP degree in clinical practice.
  • Subjects: Data
  • Pages: 2
  • Words: 559

Effectiveness of Integrating ICT in Schools

Most of the learning activities were undertaken in a classroom in front of the students, and assessment processes were conducted in class with paper and pen assessments.
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2908

Artificial Intelligence for the Future of Policing

To conclude, the implementation of artificial intelligence along with surveillance technologies will help policing maintain control over a big population. Artificial Intelligence allows policing to effectively prevent potential criminal events via the prediction of a [...]
  • Subjects: AI
  • Pages: 1
  • Words: 294

How Animation Can Teach Children History

The development of interest in the subject will be greatly enhanced if there is a close partnership between the animators and teachers in designing the desired syllabus with the acquaintance of the tools of animation.
  • Subjects: Technology in Education
  • Pages: 23
  • Words: 6441

The Importance of Database Design

It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
  • Subjects: Data
  • Pages: 3
  • Words: 548

Cloud Computing in Business

Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
  • Subjects: Cloud Computing
  • Pages: 13
  • Words: 880

Health and Environment: The Impact of Technology

This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
  • Subjects: Technology Effect
  • Pages: 20
  • Words: 5816

AI and Job Security Aspects

The biggest fear in the economy's digitalization is the loss of jobs, but this will only be in the short term and only if there is the uncontrolled use of artificial intelligence.
  • Subjects: AI
  • Pages: 4
  • Words: 1132

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791

Role of Information Technology in the Business Sector

In this way, the author concludes that IT is powerful enough to affect the successfulness of business and its competitiveness. It is also vital to ensure that IT is aligned with the overall business goals [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 598

The Flashlight Technology Description

The plastic casing of the husky flashlight consists of a 5 inch cylindrical plastic container with a very thin spring or a strip piece of metal that is used to make the electrical connections between [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 649

Digital Control Systems: Digital Signal Processing

The second use of the digital filters is the "signal restoration" which is needed when there is distortion of a signal due to any reason like poor equipment quality or mishandling of devices etc.in this [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1459

Cybercrime and Its Impact in the GCC Region

The introduction of the information and communication technologies nowadays offers a great range of advantages for the society, especially for the financial sector.
  • Subjects: Cyber Security
  • Pages: 20
  • Words: 5268

Computer Components in the Future

It must be noted though that liquid cooling systems utilize more electricity compared to traditional fan cooling systems due to the use of both a pump and a radiator in order to dissipate the heat [...]
  • Subjects: Computer Science
  • Pages: 24
  • Words: 6517

Types of Crime in Cyberspace

While there are numerous advantages that accrue from progress of the ICT like improving the speed at which information, news and ideas are transferred from one part of the globe to another and efficiency in [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2220

How to Build a Desktop Personal Computer

The processor will determine the speed of the system but the choice between the two major types-Intel and AMD- remains a matter of taste.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1259

Doping Characteristics of Gallium Nitride (GaN)

The design of the device is done in a form that provides for diffusion in the emitter, is a quassi-neutral base with the doping densities in the emitter and the base.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 597

Virtual Environment “Second Life”

It is as a result of these developments that Second Life was created in which the user is centered compared to the other applications.
  • Subjects: Applications
  • Pages: 2
  • Words: 597

The Principle in Net-Centric Computing

The invention of the computer and the subsequent creation of computer networks are arguably the biggest achievements of the 21st century.
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 887

Engineering for Community Development

These are some of the indications of poverty which is to an extent linked to means and ways of energy production and usage adopted within respective regions.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1722

Network Design for Business

The physical and the logical layout structure of the network have to match the design and the business needs in that particular context.
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1077

Various File Systems Used by The Different Versions Of Windows

File systems used by various versions of windows fall into two broad categories, namely, File Allocation Table file systems and New Technology File Systems. FAT and NTFS file systems also contrast in terms of their [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 864

Introduction to the Web Mining

Today World Wide Web has become an increasingly popular platform for storing, retrieving, and disseminating information as a result of the significant and rapid growth of Web data the knowledge available over the Internet.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1857

Human-Computer Interaction and Communication

As the person is interacting with the gadgets or the computers, he should be favored by the design in that the system should be in such a way that it supports human usability.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1372

The Importance of Web Portals

In some organizations the company portal is used by employees and clients to access important services that are available virtually. Tender's portals are used by bidders to bid for bidding tenders electronically which is much [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 645

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2967

Advantages and Disadvantages of Solid State Drives

In modern technology, the NAND-based flash memory is the standard for many solid-state drives. Solid-state drives are made up of DRAM volatile memory or the NAND flash non-volatile memory.
  • Subjects: Data
  • Pages: 2
  • Words: 715

Internet: Wimax vs. Fiber Optics

The research will also seek to identify the level of awareness regarding the viability of both WiMAX and fiber optics technology in the deployment of access networks.
  • 5
  • Subjects: Internet
  • Pages: 10
  • Words: 2790

The Technology Behind Bing Maps

Bing Maps was developed by Microsoft in response to the business threat posed by Google who also offers Google Earth Pro, for the visualization and mapping of much of the world using satellite imaging from [...]
  • Subjects: Data
  • Pages: 2
  • Words: 681

Viruses and Worms in Computers

To prevent the spread of viruses and worms, there are certain precautionary measures that can be taken. With the correct measures and prevention, the spread of online viruses and worms can be controlled to a [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 521

Low-Cost Carriers and Secondary Airports

LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
  • Subjects: Aviation
  • Pages: 2
  • Words: 929

The Development of the Internet

Licklider of MIT suggested a way of linking computers in 1962, and relocated to DARPRA later in the same year to champion the efforts of developing it.
  • Subjects: Internet
  • Pages: 4
  • Words: 554

Windows Vista vs. Windows XP

The new Windows Vista is highly recommended and it is mainly useful for a medium-sized information-service company and it rates higher than the current Windows XP for a number of reasons.
  • Subjects: Internet
  • Pages: 3
  • Words: 837

Automation of Accounting and Monitoring Procedures

Therefore, the integration of IT into auditing functions contributes to the promptness in transactions' ascertainment processes and the validation of the accounting and financial information prepared from relevant records.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 913

How Has Technology Affected Your Life?

In this essay, I will provide examples proving the positive and negative influence of technology. I believe that filtering content and controlling the time spent on social networks will maximize the positive influence of technology.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 398

The Community Impact of the Schiphol Airport

The Schiphol Airport in Amsterdam, which is one of the busiest in the world, is an excellent example of how to benefit the community while minimising the damage.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3000

Using IoT Low-Cost Sensors for Smallholder Farms

It is, therefore, essential for the users and IoT systems and devices developers to collectively ensure that the internet and the users of such components are not exposed.
  • Subjects: Internet
  • Pages: 8
  • Words: 2508

Introduction to Information System

In order for ordinary people to keep up with the times and for various companies to stay competitive, it is of vital importance to know why and how to use electronic devices, as well as [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 664

The Role of Digital Technologies in Education

The interactive Mother's Day card and the story of a 13-year-old boy convey the idea of the importance of technology for an individual's development.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 937

Geographical Information System and Machine Learning

Without the need for a more detailed discussion of the advantages and disadvantages of each method, it is essential to postulate that both DT and SVM have sufficient potential to improve flood modeling in hydrological [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2335

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657