Tech & Engineering Essay Examples and Topics. Page 6

4,428 samples

Tenerife Plane Crash

The whole chain of events contributed into this disaster; they ranged from bad weather, human errors, fatigue, and impatience to the lack of communication between the captain and the crewmembers in the case with KLM [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 638

Viruses and Worms in Computers

To prevent the spread of viruses and worms, there are certain precautionary measures that can be taken. With the correct measures and prevention, the spread of online viruses and worms can be controlled to a [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 521

Low-Cost Carriers and Secondary Airports

LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
  • Subjects: Aviation
  • Pages: 2
  • Words: 929

Windows Vista vs. Windows XP

The new Windows Vista is highly recommended and it is mainly useful for a medium-sized information-service company and it rates higher than the current Windows XP for a number of reasons.
  • Subjects: Internet
  • Pages: 3
  • Words: 837

Telecommunications Design Project: From 1G to 3G

The initial activity for this communication system is the installation of a suitable number of base stations to be put up into operation to form a network The report covers the different aspects in location [...]
  • Subjects: Other Technology
  • Pages: 27
  • Words: 7185

The Rise & Fall of the Concorde

An investigation into the cause of the 2000 Concorde crash was crucial not only to the aviation industry but also to the assurance of the safety of future users of the aircraft.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1157

Introduction to Information System

In order for ordinary people to keep up with the times and for various companies to stay competitive, it is of vital importance to know why and how to use electronic devices, as well as [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 664

Very-Low-Frequency Testing of Cables

The current paper aims to review the key elements of the VLF cable testing and outline the potential areas of development that could be addressed by the experts in the field to improve the quality [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1815

Data Visualization Software: The Case of Nike

This is why data visualization is a crucial business asset that may be used to realize the organization's full potential with the help of experts in the field and all the insights gained from the [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2301

Technological Advancements in Cybercrime and Fraud

To investigate the connection between rapid technological development and high rates of cybercrime and fraud in the UK. To conduct a substantial literature review on the topic of cybercrime and fraud rates in the UK.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2070

PUBG: Positive Aspect of Negative Video Games

This increasing popularity of the multigenre computer world is reflected in the concerns of the world community about the potential harm to gamers.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 943

Singapore Airlines Mission, Image, and Purposes

To sum up, SIA's activities in the implementation of new technologies, customer service innovation and excellence policies, and human resources development secure the company in the highly competitive industry.
  • Subjects: Aviation
  • Pages: 3
  • Words: 875

Maintenance Services in Industry

There is the management that involves the supply of equipment, machinery and other auto parts while the other maintenance is for the supply of materials that are solely used in the industry for the customers.
  • Subjects: Engineering
  • Pages: 2
  • Words: 303

Mobile Texting and Chatting Negative Effects

Linguists and communication experts often argue that close to ninety percent of one's conversation is not what is said it is actually how one says it and the body language that the person uses.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1313

Resource Description and Access (RDA) in Library

It is printed together by the Canadian Library, The American Library Association, Association as well as the Information Professionals along with the Chartered Institute of Library within the UK.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2396

Computer Security: Bell-Lapadula & Biba Models

Cybersecurity policies require the formulation and implementation of security access control models like the Bell-LaPadula and the Biba, to successfully ensure availability, integrity, and confidentiality of information flows via network access.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 882

Introduction to Biotechnology and Its Elements

The impacts of biotechnology on life are tremendous and now this industry is becoming the essential one in our daily life. The biotechnology industry is regulated by the US Food and Drug Administration, the Environmental [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1095

Computer Virus User Awareness

It is actually similar to a biological virus wherein both the computer and biological virus share the same characteristic of "infecting" their hosts and have the ability to be passed on from one computer to [...]
  • Subjects: Computer Security
  • Pages: 1
  • Words: 685

Mobile Phone Base Stations: Overview of Technology

Most current mobile phones connect to a cellar network of base stations, which is in turn interconnected to the public switched telephone network Mobile payment: This is the processing of goods or services with a [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2111

Hardware and Software Development Analysis

The 90-s was a real breakthrough in software development and it was mainly connected with the development of the Internet. The dominant software policy of IBM for a long period was standardized and open mainly [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Python: Programming Language and Concepts

To understand a High-Level Language, it may be noted that High-Level Language are closer to human languages and they are easier to be read, written, and maintained.
  • Subjects: Programming
  • Pages: 3
  • Words: 754

Cybercrime and Its Legal and Practical Management

With the development of various programmes that significantly simplify the daily activities of the organisations and individuals, the issues of privacy and security became more spread.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2042

Beech King Air 200 Crash and Human Factors

For instance, throughout the approach of the localizer runway, the aircraft was actually five miles ahead of what the first officer and captain believed they were.
  • Subjects: Aviation
  • Pages: 2
  • Words: 594

The General Civil Aviation Authority’s Challenges

The first security and safety challenges targeted by the GCAA is the presence of consumer drones around airports. The purpose of this application is to allow officials across the nation to track the speed, location, [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1151

Types of Acoustical Materials

These diffusers are used in order to supply a uniform broadband scattering of the sound and lower the high-Q reflections of sound waves.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 931

Digital X-Rays: Recent Development in Radiography

The developments in digital x-ray technology have mostly taken place in digital detection technology, where images are created, scanned, archived, or stored in digital archives to allow for the easy retrieval of the images.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1456

Safety Pyramid Theory: Myth or Reality

Most of the readings that I found were written within the last few years so the information was rather new and relevant to the modern Safety Culture.
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2253

Technology in Education and Medicine

Also today, courtesy of technology, students with learning disabilities can participate fully in the learning process using assistive learning techniques and programs.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Char Davies’ Osmose as Virtual Reality Environment

On the following position, the installment suggests the invitees a chance to trail the discrete interactor's voyage of imageries from end to end of this counterpart of natural surroundings.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 628

Pressure Drop and Full Models in Filtration Technology

Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2599

Computer Hardware Components and Functions

Hardware is the physical components of a computer, while the software is a collection of programs and related data to perform the computers desired function.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 251

Physical Security Approaches in Aviation

However, the multi-layered security system the dominant approach to airport security is nowadays being criticised as consuming an excessive amount of money and resources; an alternative has been proposed in the form of a risk-based, [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3861

Fire Department Strategic Plan and Analysis

Become the best fire organization by providing advanced services and training personnel to ensure they deliver quality and timely services by use of the available resources.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1144

The Modern Aviation Industry and Its Threats

However, the creation of a new digitalized environment can result in the appearance of new vulnerabilities due to the nature of the software and technologies used in airports to organize their functioning and guarantee appropriate [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 3205

The Technology of Drones

Drones are an emerging sector of the aviation industry that has been received differently by the public primarily due to the possibility of misuse, infringement of privacy, and military use in combat.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Electronics Use and Impact on Children’s Health

This should not only be taken as a good and positive sign in the growth and development of the child but as a future influence in the learning and development of the child.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1194

Attilio Ievoli Accident and Human Errors

The aim of this report is to present actual finding on the probable cause of the accident in which the 4,450 chemical tanker to run aground just some few moments after the change of guard [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2220

Closed-Circuit Television Surveillance and Security

This aspect has led to the emergence of new forms of physical security systems to counter the changing security threats by improvising mechanisms of security threats perceptions and surveillance.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4207

Disney Resort Crisis Communication Plan

When dealing with an emergency, the head of crisis communication has to carefully follow a crisis communication plan. He or she will compile a list of key publics that have to be notified of the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1987

Engineering Ethics and Legal Standards

Patenting an improved version of a program that belongs to a company an engineer is working for is unethical. This is because the original version of the program was registered in the name of the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 986

Centralia Mine Disaster and Public Administration Failure

Scanlan, who was the district inspector at the time, identified the hazards surrounding the coal mines and reported his findings about a possible explosion to other relevant professionals. Scanlan should not have taken heed to [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1120

Testing Approaches and Change Management Process

There are several integration testing levels: Component Integration Testing checks the interaction between the system components after their testing. System Integration Testing checks the interaction between different systems after the system testing.
  • Subjects: Programming
  • Pages: 3
  • Words: 845

Airline Scheduling and Planning Factors

The schedule planners seek to provide the best service to the public while maintaining a stable financial position for the airline.
  • Subjects: Aviation
  • Pages: 2
  • Words: 670

Telegram Role in Communication

The telegram was the easiest and the fastest means of communication in the nineteenth century. I was very excited and any other scheduled activity came to a standstill as I focused my attention on the [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 866

Manufacturing Industry Accidents: Causes and Protection

The first direct cause of the accident was the inexperience of the crane operator and the injured worker. The second direct cause of the accident was irresponsibility by the employees involved in the accident.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 617

Mobile Culture: Texting Effects on Teenagers

Given the abilities of smartphones to access the Internet and social media platforms, teenagers have turned their smart devices to tools of socialisation and communication in which texting is the most preferred mode of communication.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 1984

The Crash of Colgan Air Flight 3407 and Its Aftermaths

According to the results of the investigation carried out after the crash, the causes of the accident were the crew's "failure to monitor airspeed", "failure to adhere to sterile cockpit procedures", "the captain's failure to [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 853

“The Most Human Human” by Brian Christian

In the introduction, the author outlines the genesis of his choice of the book's title by discussing the origin of the term, 'the most human.' Therefore, the introductory chapter gives the reader a strong base [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 843

Globalization Influence on the Computer Technologies

In spite of the fact that globalization may be defined as a serious problem in different spheres of life, it is wrong to believe that the future of IT may undergo negative effects; it seems [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1119

Will Robots Ever Replace Humans?

It is quite peculiar that Bolonkin uses negation in order to stir the audience's delight; more impressively, the specified approach works the pathos is concealed not in the description of the possibilities, but the compliment [...]
  • 5
  • Subjects: Robotics
  • Pages: 8
  • Words: 2066

Technology in Modern World

Human cloning will lead to singularity in the sense that there will be no difference between the natural process of production and artificial production.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 604

Data Warehouse

In a bid to get to that end, the data has to pass through data acquisition, which refers to retrieval of information from the data sources; that is, "a set of processes and programs that [...]
  • Subjects: Data
  • Pages: 15
  • Words: 4161

Mobile Security

Security of mobile devices encompasses security of all information and data saved and stored in the tablets, smart phones, laptops, and PDAs.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1682

Cloud Computing and Virtualization Technologies

Through cloud computing, the organization is in a position to access complex applications and enormous computing sources through the internet. Through cloud computing and virtualization technologies, the organization is likely to benefit from economies of [...]
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1109

Cloud Computing Pros and Cons

In a computer system using cloud computing, the workload of running applications is shifted from the local computer to the cloud, which consists of network computers.
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2752

Monopolistic Competition of Smart Phones

In the flurry of the responses that followed, there was concern whether the smart phone market was becoming monopolistic. This was a clear indication that the competition in the smart phone market was becoming monopolistic.
  • 4
  • Subjects: Phones
  • Pages: 3
  • Words: 863

The Infrastructure of Cloud Computing as a Service

Typically, the entire system of cloud computing drawing from its definition provides the infrastructure for organizations to offer clients services dynamically responding to their needs based on the pay-as-use basis, and the economic benefits which [...]
  • 5
  • Subjects: Cloud Computing
  • Pages: 15
  • Words: 4383

Video Game Effects: Good or Bad?

Given the fact that there is indeed a logically sound rationale to such a suggestion, throughout the course of conducting my study, I remained thoroughly observant of the article's classification-related suggestions, in regards to the [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1290

Influence of Information Systems

The smooth flow of information in a business enterprise is essential for the survival of the business. Due to the limited scope of the traditional information systems, there was little functionality in the management of [...]
  • Subjects: Data
  • Pages: 7
  • Words: 2056

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 4954

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

Assistive Technology Outcomes and Benefits

In addition, the improvement in technology has resulted in devices and equipments that can assist the disabled to access facilities and services that other people can access.
  • Subjects: Applications
  • Pages: 8
  • Words: 2336

Geotechnical Failure

The purpose of the preliminary study is to examine suitability of the study for the proposed construction, economize the design, assess ground conditions, and evaluate impact on the pre-existing neighbouring structures.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1964

Threat to Civil Aviation-Hijacking

The 9/11 attacks on the United States' civil aviation industry demonstrated the extent to which terrorism can cause damage to the economy of a country and mass murder of innocent individuals. On the other hand, [...]
  • 1
  • Subjects: Aviation
  • Pages: 8
  • Words: 2192

Technology and Its Future Development

It is clear that technology is starting to become smaller but it is to the benefit of people and with careful control will not evolve into a great evil.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 559

The Fall of IBM

Overall, the threat of new entrants is high in the software segment and moderate in the hardware segment of the industry.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2904

The Invention of Television

According to Street, Paul Nipkow developed the Nipkow disc in 1884, which was capable of transmitting pictures by use of a cable. In the earlier times, it was hard to send a message for its [...]
  • Subjects: Other Technology
  • Pages: 14
  • Words: 424

The Airbus Fly-By-Wire Control System

In fly-by-wire, the control of the aircraft is only achieved through the use of electrical signals. The fly-by-wire control systems have enabled automatic stability system to be included in the plane and act autonomously to [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1651

Computer System Electronic Components

The Random Access Memory commonly referred to as RAM is another fundamental component in a computer system that is responsible for storing files and information temporarily when the computer is running. The other storage component [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 526

Computer Safety: Types and Technologies

The OS of a computer is a set of instructions communicating directly to the hardware of the computer and this enable it to process information given to it.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2917

Telecom Services Providers Industry in UK

The competitiveness of the market and the influence of the macroeconomic environment on the performance of the industry will be illuminated.
  • Subjects: Internet
  • Pages: 6
  • Words: 1678

Technology in Hospitality Industry

Some customers would like to continue working while in the hotel or even to keep in touch with the progress of their businesses and information technology advancement has made this possible nowadays.
  • Subjects: Applications
  • Pages: 2
  • Words: 545

Airports Electronic Gate (E-Gate)

The invention and innovation of computer applications has resulted in the development of electronic gate used in airports; the innovative electronic passport control system is used to boost security and facilitate the flow of people [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1621

Smartphone as a Communication Sector Revolution

The Smartphone has done much to pull the world towards the core of digital database. The youth has exploited this utility to download music and movies from the world over and store it for their [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 560

Information Technology in People’s Lives

This has prompted many to be more vigilant and to prosecute with the full force of the law any British citizen found guilty of violating standards and statutes with regards to the use of the [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1632

Improper Internet Use at Work

However, every company has written or unwritten policy for the use of internet and the employees must ensure that they: Comply with the policy Use internet in an acceptable way Do not create unnecessary risk [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1418

The Evolution of the Personal Computer and the Internet

Due to the complexity of the subject matter it is necessary to digress once more and discuss briefly the history of the World-Wide-Web so that there is a clearer understanding of what it is all [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2435

The Technology’s Influence on Lives

In this essay, I will demonstrate the influence of technology in our lives first by looking at the current phenomenon of phone addiction and proceed to show its continued significance in the developing field of [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 810

Effects of Surveillance Technology on Privacy

The presence of surveillance devices and gadgets in public gathering places limits the use of the public places, as many people will tend to avoid such places in fear of exposing their privacy to their [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1660

Benefits of the Internet

One of the uniqueness of using internet to communicate is that, there are no barriers, as people can connect easily at any place and all the time.
  • Subjects: Internet
  • Pages: 4
  • Words: 1123

Information Technology and Low-Cost Airlines

This is made possible by many factors but it can be said that the most significant component is the use of information technology specifically the utilization of the Intranet and Extranet networking system.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1625

What Are the Benefits of the Internet?

The Internet has been one of the biggest inventions that have made a great difference in the lives of many people in the world.
  • Subjects: Internet
  • Pages: 4
  • Words: 1026

Ethical and Illegal Computer Hacking

For the ethical hackers, they pursue hacking in order to identify the unexploited areas or determine weaknesses in systems in order to fix them.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 557