Tech & Engineering Essay Examples and Topics. Page 6

5,366 samples

Microsoft Power BI Software’s Features

Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Trends in Embedded Systems

The area of embedded systems has received massive development because of emerging platforms dependent on computers and embedded systems for controlling and monitoring all matters autonomously. The evolution of IoT has occurred due to the [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1680

Reviewing Meaning and Benefits of Routers and Switches

In this paper offers a simple definitive view of routers and switches, their advantages, and the classifications of a switch. Overall, a router and a switch exhibits fundamental functional differences; while the former suits a [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 594

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Avionics and the Future of Aircraft Systems

Avionics are the set of electronic types of equipment and systems designed to use in aviation. The first such device to be used on aircraft was the communication and navigation systems based on analog and [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 586

Device Addiction: Consequences and Solutions

One of the essential traits of smartphone addiction is tolerance which is defined as "a gradual increase in the mobile phone use to obtain the same level of satisfaction".
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1204

Internet Technology and Impact on Human Behavior

It was the Internet that allowed the phenomenon of cyberbullying to emerge, the essence of which is the harassment of someone on the Internet by large groups of users.
  • Subjects: Internet
  • Pages: 1
  • Words: 312

Is the Internet Affecting People Negatively?

Opponents of the Internet tend to view and criticize it one-dimensionally as a source of mindless entertainment, whereas in reality, it is rich with potential uses that have their unique properties.
  • Subjects: Internet
  • Pages: 5
  • Words: 1306

How Smartphones Changed Society and the World

Introduction of the smartphone to mass public Driven by iPhone created by Apple and Steve Jobs in 2007 Revolutionized the world of communications and information exchange Smartphone went from being a tool to the [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 560

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Aspects of Smart Technologies

It is also possible to promote the collaboration of citizens, organizations, and the government via smart technologies. Another method to improve the environmental situation in the city is the implementation of eco-friendly public transport.
  • Subjects: AI
  • Pages: 6
  • Words: 1736

Artificial Intelligence Investments in the UAE

One of the components of the strategy is to support the heritage of the country's founding fathers, which means the UAE has to remain among the most advanced nations.
  • Subjects: AI
  • Pages: 7
  • Words: 1962

Impact of Technology on Human Beings

However, despite the numerous benefits of such technology, there are concerns of the effects it has on humans. In that regard, media and communication technologies are suggested to affect the mental capacity of people while [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 302

Sifers-Grayson Company: The Cybersecurity Breach

Finally, the recommendations, as per the improvement of the incident response capability, are introduced to ensure the elimination of the identified drawbacks and the compliance of the engineering company with the security requirements presented by [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1380

Effectiveness of Integrating ICT in Schools

Most of the learning activities were undertaken in a classroom in front of the students, and assessment processes were conducted in class with paper and pen assessments.
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2908

Cutting-Edge Technologies: Blockchain and AI

The users can sign in their accounts and transact to another user and the blockchain records the transaction which is viewed by other users. It is difficult to collect taxes and trace malicious activities in [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1397

Artificial Intelligence for the Future of Policing

To conclude, the implementation of artificial intelligence along with surveillance technologies will help policing maintain control over a big population. Artificial Intelligence allows policing to effectively prevent potential criminal events via the prediction of a [...]
  • Subjects: AI
  • Pages: 1
  • Words: 294

Airports Security Systems’ and Passengers’ Satisfaction

All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
  • Subjects: Aviation
  • Pages: 19
  • Words: 4975

Aviation Crisis Management Toolkit

The impacts on these organisations vary considerably depending on the type of crisis, the severity of the crisis and the way in which the organisation has planned for, and responded to the crisis.
  • Subjects: Aviation
  • Pages: 9
  • Words: 3593

Personal Views on Nanoengineering

Nanoengineering is considered to be the practical application of nanoscience and involves the application of its theoretical principles to develop structures and materials that are small, powerful, and efficient.
  • Subjects: Engineering
  • Pages: 1
  • Words: 285

Description and Countering to Phishing

This paper investigates the various technical procedures used in the execution of the phishing scams; highlight the trends of these technical capabilities and the strategies that can be deployed to help in the prevention of [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2327

Use of Seatbelt While Driving

The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1038

Computer Components in the Future

It must be noted though that liquid cooling systems utilize more electricity compared to traditional fan cooling systems due to the use of both a pump and a radiator in order to dissipate the heat [...]
  • Subjects: Computer Science
  • Pages: 22
  • Words: 6517

Modern Navigation Systems and Safety

It is also capable of determining the ground speed and the time in relation to ground station when in "line of sight" of transmission. LORAN is capable of providing highly accurate bearing, distance, time to [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 3430

Drawbacks and Disadvantages of Distributed Computing

However, in any distributed system, there is a need to either have a coordination mechanism that will ensure that all the computers in the system are synchronized or work towards the reduction of processing time [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 869

Computer Sciences Technology: Smart Clothes

In this paper we find that the smart clothes are dated back to the early 20th century and they can be attributed to the works of artists and scientists.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2648

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2967

Honeypots and Honeynets in Network Security

Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of the internet.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1968

Low-Cost Carriers and Secondary Airports

LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
  • Subjects: Aviation
  • Pages: 2
  • Words: 929

Qantas Airways: Cross Culture and Safety Management

The latest development in the field is relevant to cross-cultural issues and their impact on safety which still requires further study and appropriate application in the airline industry as merger and acquisition of airlines is [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3740

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

Microsoft Power Point: Program Review

The latest version of the Microsoft Office system program is a 32-bit application and can run on a Windows 64-bit platform.
  • Subjects: Programming
  • Pages: 2
  • Words: 749

Information Technologies and Disaster Management

In this article, Sakurai and Murayama present examples of the application of information technology in various stages of disaster management, including preparedness, recovery, response, and risk reduction.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 434

Layout Planning: Operations Management

The cellular layout is the type of facility planning where the equipment is grouped according to the performed function for a set of similar products.
  • Subjects: Project Management
  • Pages: 1
  • Words: 289

Dubai Metro Project Stakeholders

The first group of stakeholders that should be considered for the Dubai Metro Project is the city community, who will be the ones using the system.
  • Subjects: Project Management
  • Pages: 2
  • Words: 589

Machine Translation Accuracy: Google Translate

According to Sreelekha, Bhattacharyya, and Malathi, the market for the technology will grow in the future, and translation speed, cost, and quality are all significant factors in the success of an application.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 971

Digital Education: The New Bibliophobes

The second chapter of the book is just a wonderful revelation of the contemporary literacy situation in the society among youth.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 842

Nintendo Gameboy: Technological Advancement

Nintendo has made lots of variation in the original game boy this includes the Game boy pocket which is 30% smaller than the original game boy with equal size screen, the Game boy color it [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1243

How Computers Have Changed the Way People Communicate

Based upon its level of use in current society as it grows and expands in response to both consumer and corporate directives, it is safe to say that the internet will become even more integrated [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2463

Multiplayer Online Battle Arena Video Games and Technologies

Online games are consistently evolving and taking advantage of modern technologies to improve the competitive aspects, viewer entertainment, market share, and social benefits in the modern digital age as evident in the example of League [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 2906

Technological Revolutions and Social Challenges

With the invention of new ways of production, communication, transportation, and medicine, society had to adapt in order to respond not only to the benefits but also to various challenges posed by the invention of [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2019

Evie.ai Company in Artificial Intelligence Market

The application of artificial intelligence to manufacturing and agriculture is gradually expanding from the commercial and service industries. The global demand for AI is high, and it is expected to grow exponentially.
  • Subjects: AI
  • Pages: 6
  • Words: 2455

Artificial Intelligence Managing Human Life

Although the above examples explain how humans can use AI to perform a wide range of tasks, it is necessary for stakeholders to control and manage the replication of human intelligence.
  • Subjects: AI
  • Pages: 3
  • Words: 835

Online Learning Design Specifications

The rapid rise of technologies and the evolution of communication means resulted in the appearance of new approaches to the learning process.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 585

Work-Breakdown Structure in Project Management

Mostly, a WBS should be presented in a diagrammatic representation as this is the simplest way to outline the various sets of work required for the completion of the project.
  • Subjects: Project Management
  • Pages: 2
  • Words: 341

Selection Procedure of Best Camera

The variety of cameras available to the modern buyers is so large that often it can be frustrating for both the experts and the enthusiasts since choosing the most suitable product they have to take [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1371

Avianca Flight 52 Accident and Its Reasons

However, at the same time, the pilots managed to reach their destination point and were ready to land, though dispatchers of the airport did not allow them to do it, not understanding or ignoring the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 839

Software Engineering Career Information

Software Engineering is a field in engineering that requires the practitioner to apply the principles of engineering in the design and development of software products.
  • Subjects: Engineering
  • Pages: 2
  • Words: 549

Pressure Drop and Full Models in Filtration Technology

Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2599

The Security Systems at the UAE Airports

Therefore, airport security in the UAE must manage the latest challenges and threats to passengers, airport infrastructure and assets, and cargo.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3243

Badrul Khan’s Web-Based Framework

Providing the opportunity of learning in any convenient manner, time, and pace as well as benefiting the instructor in terms of the idea of distributed instructions and assessment, the course focuses on both learners' and [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1110

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1445

Agile and Waterfall Models in Project Management

Agile is a system of ideas and principles of flexible project management, and Waterfall is a project management technique that involves a steady transition from one stage to the next without overlaps and returns to [...]
  • Subjects: Project Management
  • Pages: 13
  • Words: 3687

Technology in Society, Healthcare and Education

However, the research on this topic is extensive and shows the impact of technology to be a positive one. Further research on this and other topics should be considered due to the widespread presence of [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1061

The Technology of Drones

Drones are an emerging sector of the aviation industry that has been received differently by the public primarily due to the possibility of misuse, infringement of privacy, and military use in combat.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Information Technology Department Security Measures

For the majority of modern companies, the process of data destruction is one of the essential procedures allowing the organization to run smoothly and manage their data efficiently while staying protected.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 596

Space Shuttle Challenger’s Explosion Factors

A fault tree analysis can be used to identify and examine the major factors that led to the failure of the O-rings in the Solid Rocket Boosters. The failure of the O-rings led to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 836

1996 Mount Everest Disaster and Teamwork Factor

The Everest case study illustrates some key problems that need to be addressed to avert the recurrence of errors or omissions that may have occasioned the deaths of the climbers.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1437

Legal Issues of the Multimedia Usage in Classrooms

To avoid any legal issues, the organization should make sure that all employees are aware of major regulations and laws associated with the use of intellectual property. Of course, it is important to remember that [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

Centralia Mine Disaster and Public Administration Failure

Scanlan, who was the district inspector at the time, identified the hazards surrounding the coal mines and reported his findings about a possible explosion to other relevant professionals. Scanlan should not have taken heed to [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1120

Testing Approaches and Change Management Process

There are several integration testing levels: Component Integration Testing checks the interaction between the system components after their testing. System Integration Testing checks the interaction between different systems after the system testing.
  • Subjects: Programming
  • Pages: 3
  • Words: 845

The Importance of Media in the Classroom

The theory is developed from the perspective of a teacher and aims at the analysis of the classroom media employment as well as the accommodation of the reviewed sources to the school conditions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 405

“Teaching Machines” by B. F. Skinner

The main purpose of the article is to show readers the process of development of teaching machines and the main principles of their work.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 859

Cell Phones Use in Public: Naturalistic Observation

Using the naturalistic observation, this study aims to provide the discussion of how Americans use cell phones in public places and react to the other people's use of technologies.
  • Subjects: Phones
  • Pages: 5
  • Words: 1315

Hershey Corporation Project Management

Hershey outsourced the services of three firms to aid in the implementation of the ERP software. An effective criterion to determine the success of the project is necessary in order to evaluate major milestones in [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2746

Globalization Influence on the Computer Technologies

In spite of the fact that globalization may be defined as a serious problem in different spheres of life, it is wrong to believe that the future of IT may undergo negative effects; it seems [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1119

Computer-Based Technologies That Assist People With Disabilities

The visually impaired To assist the visually impaired to use computers, there are Braille computer keyboards and Braille display to enable them to enter information and read it. Most of these devices are very expensive [...]
  • Subjects: Computer Security
  • Pages: 7
  • Words: 1995

E-Commerce System for a Clothing Company in Abu Dhabi

Consequently, the following is the work breakdown configuration: Work Breakdown Configuration for the Development and Implementation of the e-Commerce Application Project Preliminary Study/Survey Understanding the Apparel Market and its trends in marketing and selling Evaluation [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2836

Archives Unique Collections

The difference between the archival materials and the library materials is that in the archives,the materials are arranged in groups on the basis of their information content.
  • Subjects: Data
  • Pages: 10
  • Words: 2750

Intel and Advanced Micro Devices

Of the two companies, AMD was the first to introduce a 64-bit chipset with a clocking capability measurable in gigahertz. Although Intel chips resist over-clocking, the location of the L2 cache memory facilitates faster memory [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Impact of New Forms of Technology on Our Understanding of Pornography

This paper therefore shows that technology has completely changed concepts of the production of pornographic material, the distribution of pornographic material, access to pornographic material and our understanding of the concepts of privacy and identity.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2276

Fire protection systems for Offshore oil rigs

The weight of the barge and the ballast water drives the support legs to the bottom of ocean or the sea in order to avoid further penetration when the rig is in operation.
  • 2
  • Subjects: Engineering
  • Pages: 14
  • Words: 3829

Effects of Internet Use in Society

Excessive use of the internet causes a person to feel lonely and depressed. The internet has provided the society with a lot of information both good and bad.
  • Subjects: Internet
  • Pages: 3
  • Words: 879

Project Management: A Critical Evaluation

It is against this background that the present paper seeks to respond to a few issues related to project scheduling, primarily the identification of activities needed to estimate resources and durations, identification and discussion of [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1370

Communication Technologies in Egypt

Significant technologies as developed with respect to two Egyptian revolutions, one in the year 1952 and the other in the year 2011 are discussed in line with the roles that these communication technologies played in [...]
  • Subjects: Phones
  • Pages: 12
  • Words: 3349

The Impact of Technology on Global Business

The growth of the internet in the period between the early 1990s and today has seen the area of network for businesses spread to cover the entire world.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 797

Technology Impact on Human Civilization

Despite the large amount of information that the internet provides to people, research shows that the internet may have a negative effect on the intellectual ability of an individual. The use of technological devices may [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 816

Network Technology NA 4

This network is usable in the Local Area Network and the Internet. A directory service is the type of software that keeps, arranges and avails information in a directory; it is an information store as [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 808

Uninterruptable Power Supply (UPS) Systems

The equipment running under the UPS gets supply of power for several minutes before switching the power to an alternative or emergency power options such as batteries in case of electric failures.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1928

Mounting Drives: Advantages and Disadvantages

Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 594

The Concept and Underlying Science of Hyperloop

The representatives of the two firms argued that there was a great possibility of implementing the Hyperloop in the Middle East or Asia because of the increased need for fast and efficient transport and reduced [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2035

Smart Bed Technology in Healthcare

An example of such a technology is a smart bed, which is a type of bed with sensors that collect information on the occupant. Nurses could use smart beds to track a patient's response to [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 292

Children’s Dependence on Technology

About 75% of parents say that "they are satisfied with the amount and quality of the educational media available to their children".
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1098

Cybersecurity Implementation Plan for PBI-FS

Therefore, the current plan will define the objectives, goals, and objectives, and scope of the implementation. The implementation of the cybersecurity management plan pursues both business and project goals and objectives.
  • Subjects: Cyber Security
  • Pages: 16
  • Words: 4430

Online Platform Development: Rafeeq

The company is also catering the needs of the target customers in the most creative manner. The order received by the administration, which acknowledges the order with the restaurant and the customer.
  • Subjects: Applications
  • Pages: 1
  • Words: 1666

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

Advancement of Communication Through Technology

From this it can be seen that advances in communication are intertwined with advances in technology and as such this paper will explore the various new forms of communication that have occurred as a direct [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 804

Relational Database: The University Database

A tutor also qualifies as a module coordinator and hence the primary key of any of the tutors is the ModCoord. The association between the module coordinator and the student table is a one-to-many type.
  • Subjects: Data
  • Pages: 7
  • Words: 2325

Personal Protective Equipment for Firefighters

It is for the serious impact of the fire that the department of fire fighting was initiated within every country to respond to fire incidences.
  • Subjects: Accidents & Protection
  • Pages: 45
  • Words: 14095

How Has Technology Affected Your Life?

In this essay, I will provide examples proving the positive and negative influence of technology. I believe that filtering content and controlling the time spent on social networks will maximize the positive influence of technology.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 398

Qualitative research: Data Analysis and Reporting Plan

Consequently, the analysis will involve the interpretation of the respondents' responses provided on the questionnaires. In addition, a final analysis will be conducted to focus on the issues which arise after data collection.
  • Subjects: Data
  • Pages: 2
  • Words: 611