Tech & Engineering Essay Examples and Topics. Page 6

4,315 samples

Propeller-Driven Performance vs. Jet-Driven Performance

Propeller-driven aircraft is more efficacious at low speeds than jet-driven aircraft, for they create higher propulsive efficiency and, consequently, greater thrust while the craft is moving at lower airspeed; however, jet-driven aircraft experience the deficiency [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 655

The Trebuchet Project Analysis

It is important to note that the number of parts to be replaced is limited to one in the period of the completion and part that are replaced should have the same technical specifications as [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1154

Advantages and Disadvantages of Solid State Drives

In modern technology, the NAND-based flash memory is the standard for many solid-state drives. Solid-state drives are made up of DRAM volatile memory or the NAND flash non-volatile memory.
  • Subjects: Data
  • Pages: 2
  • Words: 715

Tenerife Plane Crash

The whole chain of events contributed into this disaster; they ranged from bad weather, human errors, fatigue, and impatience to the lack of communication between the captain and the crewmembers in the case with KLM [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 638

How Has Technology Affected Your Life?

In this essay, I will provide examples proving the positive and negative influence of technology. I believe that filtering content and controlling the time spent on social networks will maximize the positive influence of technology.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 398

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

Agricultural Sector: The Use of Drones

Thompson states that the application of drones in agriculture, specifically in the United Kingdom, can promote the enhancement of the crops and reduce the usage of pesticides.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 666

Qualitative Data Analysis Recommendations

All a researcher should do is to open the file in the software itself, underline the piece to be coded and haul the code from the code administrator.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 923

Computers: The History of Invention and Development

It is treated as a reliable machine able to process and store a large amount of data and help out in any situation."The storage, retrieval, and use of information are more important than ever" since [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1660

Boot Process of a CISCO Router and Computer

An understanding of the processes that would help in setting up the configuration of a router and its various elements can lead to relating the booting process of the router to that of any other [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 581

Development of Mobile Phones and the Future

The first commercial mobile phone network known as APA was launched in Finland in 1971 and in 1978, the Bell labs made an attempt to launch the first commercial cellular network.
  • Subjects: Phones
  • Pages: 3
  • Words: 906

Warehouse Safety and Occupational Health

Materials/goods should be well placed on the forks and lifted correctly to avoid slipping and falling on people. Forklift should be driven slowly and both the fork and the loads should be kept low while [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1174

Introduction to Database Management System

Among all the Address Spaces it has, the first address space is called Database Service Address Space that provides the database capability to manipulate the DB2 data structures.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1755

Electricity Hazards for Human Body

The main points of this article are to offer the reader with an awareness of the generally dangers of electricity, and to provide some insight into the physiological effects of electrical shock on the human [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1641

Cybercrime and Its Legal and Practical Management

With the development of various programmes that significantly simplify the daily activities of the organisations and individuals, the issues of privacy and security became more spread.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2042

Home Networks, Their Functions and Features

A home network is a small local area network that enables communication among two or more computing devices within a limited area of a home. Typical elements of a home network are a modem, a [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 552

Evie.ai: Artificial Intelligence and Future Workforce

That is why it is crucial to analyze some trends in artificial intelligence that are being adopted by many businesses for better functioning, in particular, the implementation of Evie.ai, its functions, and the consequences.
  • Subjects: AI
  • Pages: 4
  • Words: 1215

Full Surface Fuel Fire at an Oil Refinery

It is important to establish the drainage of water from the fire and the removal of toxic substances to ensure the safety of the firefighting crew.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 941

Technology and Causes of Using It

In this way, to a large extent, information sharing supported by contemporary technologies helped change the view of the world and make it more integrated.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 565

Engineers Australia Stage 1 Competencies

I have been able to exhibit the above elements in a number of ways. As a leader, I have been able to understand the engineering students' challenges during placements.
  • Subjects: Engineering
  • Pages: 3
  • Words: 879

Science and Technology Impact on Globalization

Globalization has by now laid down the phase for this epoch through making the world interrelated further and the tools of empowerment available to all."To start with, Globalization refers to the trend toward countries joining [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 826

Audio-Visual Media and World Wide Web in Education

Due to manifold effects of technological innovations, education has undergone positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide Web, one [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 785

Environmental Effects of Cell Phones on Society

The amount of EMF generated, measured in watts per meter square, by cell phones is in the range of 0. Many of these materials such as lead, nickel, mercury, and the chemicals are toxic.
  • Subjects: Phones
  • Pages: 9
  • Words: 2563

The Technology of Drones

Drones are an emerging sector of the aviation industry that has been received differently by the public primarily due to the possibility of misuse, infringement of privacy, and military use in combat.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Human Factors in Aviation Accidents

This fatal accident led to the death of all the passengers and members of the crew. The second framework that can be used to analyze the role of human factors in aviation accidents is the [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1663

Planetary Gearbox System and Its Applications

The planetary gear system borrows its name from the behavior of the sun and the planets in the solar system, as the gears in the system behave in a similar manner to the planets.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2204

The Printing Technology: Principles and Applications

It has been established that the thickness of the dead zone is in the range of tens of micrometres, which calls for a judicious estimation of the correct parameters to be used as conceptualised in [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1687

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

Computer Based Learning in Elementary Schools

The main purpose of the research is to consider the background of the chosen sphere, the elementary education, and discuss current business issues in the computer technologies which may be used in the sphere and [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2230

Centralia Mine Disaster and Public Administration Failure

Scanlan, who was the district inspector at the time, identified the hazards surrounding the coal mines and reported his findings about a possible explosion to other relevant professionals. Scanlan should not have taken heed to [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1120

Testing Approaches and Change Management Process

There are several integration testing levels: Component Integration Testing checks the interaction between the system components after their testing. System Integration Testing checks the interaction between different systems after the system testing.
  • Subjects: Programming
  • Pages: 3
  • Words: 845

Technology and Relationships: Positive and Negative Effects

The research proposal provides an analysis of two topics namely 'the positive effects of using technology to communicate in an organization' and 'the negative impacts of using technology for individual and family communication'.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2514

Texting’s Importance for the Society

Debate on whether texting is good or bad continues to prevail across the world, especially with the extensive growth in the use of mobile telephony in the 21st century.
  • Subjects: Phones
  • Pages: 6
  • Words: 1719

The NBA 2K Game as the Element of Popular Culture

Despite the original aim of producing the series of popular video games NBA 2K is a popularization of basketball among the representatives of the modern situation, the release of the series also focuses on advertising [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 555

American Airlines 1420: Accident Overview

Because of the thunderstorm and heavy rain on the way, the pilot did not manage to land the plane safely, and it crashed after the overrunning the end of the runway.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1385

Accidents and Ramp Damage – Aviation

In order to prevent substantial expenses described afore, it is undoubtedly worthwhile for airlines and aviation companies to invest in ground operations safety and train all the staff working in the ramp and gate areas.
  • Subjects: Aviation
  • Pages: 2
  • Words: 560

How Technology Has Changed Lives?

Although most of the music sold in online stores is copyrighted, there are people who manage to pirate and make a living out of it.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 669

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

Singapore Airline

The main objective of the analysis is to have firsthand experience of the problems facing the company and gain knowledge concerning probable developments and potentials.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1596

Electrical and Electronics Engineering Career Development

Electronics engineering is the branch of electrical engineering, which deals with the uses of "the electromagnetic spectrum and with the application of such electronic devices as integrated circuits, transistors, and vacuum tubes".
  • Subjects: Engineering
  • Pages: 10
  • Words: 2743

Computer-Based Technologies That Assist People With Disabilities

The visually impaired To assist the visually impaired to use computers, there are Braille computer keyboards and Braille display to enable them to enter information and read it. Most of these devices are very expensive [...]
  • Subjects: Computer Security
  • Pages: 7
  • Words: 1995

The Software Engineering Debate

The second reason the author adduces to his view that software development is not an engineering activity is the lack of standardized approaches to software development.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1148

Ephone v900 Mobile Telephone Advert

In the advert, the artist uses the element of space to illustrate the background thus indicating to the viewer the probable setting of the image.
  • Subjects: Phones
  • Pages: 2
  • Words: 570

The Internet Radio: A Critical Discussion

Through a critical examination of the concept of Internet Radio, the current paper will seek to extrapolate how users of the medium can create and place content over the internet and how users can use [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 982

Effects of Technology in Education

The invention of computers and the Internet technology have brought a major revolution in the education field. This is quite a big development in the field of education and it can all be attributed to [...]
  • 1
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 873

NSPE Code of Ethics vs. Other Engineering Codes Essay

Similarities between NSPE code of ethics and AiChE Engineers should use their skills to ensure health, welfare and safety of the public as provided by the first principle. The goal is to enhance health and [...]
  • 2
  • Subjects: Engineering
  • Pages: 2
  • Words: 623

Mobile Computing and Its Future Scope

Mobile communication, mobile hardware and software are the main concepts in mobile computing. The objective of mobile computing is to be able to work from anywhere.
  • 4
  • Subjects: Phones
  • Pages: 9
  • Words: 1347

A Review on Cloud Computing: Concepts and Benefits

According to Rodriguez, several organizations establish community cloud to have common requirements and need to share infrastructure to understand the benefits and aspires to assemble ideologies of a digital ecosystem with the use of a [...]
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2768

Ethical Hacking: Bad in a Good Way

Introduction of personal computers led to the increase in the number of hackers as well as hacker targets were widened. Many hackers lack the skills to damage network systems in a major way.
  • 3
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1718

Apple MacBook Pro

The development of Apple MacBook Pro can be seen as a great milestone in computer technology and specifically for the MacBook family and MacBook Pro line.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 792

Technology in Hospitality Industry

Some customers would like to continue working while in the hotel or even to keep in touch with the progress of their businesses and information technology advancement has made this possible nowadays.
  • Subjects: Applications
  • Pages: 2
  • Words: 545

Technology and Music Industry

The impact of file sharing technology in the music industry has been a major obstacle to its advancement. In a clearer way, the future purchase and sale of music is anticipated to be easier.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1720

Is Modern Conveniences and Technology a Curse or a Blessing?

However, although modern conveniences and technological innovations have some negative effects, the benefits of such conveniences and innovations overshadow such effects; hence, modern conveniences and technological developments have greatly improved the quality of life; hence, [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 845

Pros and Cons of Information Technology

Some of the disadvantages of the improved technology include new forms of pollution that are as a result of the gadgets used to access the resource.
  • Subjects: Internet
  • Pages: 2
  • Words: 609

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Subjects: Internet
  • Pages: 3
  • Words: 832

History of the Networking Technology

The development of computer networks is the answer to the urgent need of the modern day workplace to have the ability to receive and send information quickly and efficiently.
  • Subjects: Internet
  • Pages: 10
  • Words: 2699

Transformative Learning Theory and Spirituality

In the 2013 article, "Transformative Learning Theory and Spirituality: A Whole-Person Approach," Piercy indicates that the learning process of adults can be understood by addressing the biblical understanding and the transformative approach to man's nature.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 323

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

In-House vs. Outsourced IT Solution

The components of the source, the vendors, and the origin of the software-intensive system are the key drivers of the outcomes of a component sourcing option.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

Impact of the Weather on Aviation

The weather can significantly impact flight cancellations and delays. In some instances, weather-related issues may cause flight delays or cancellations to protect the well-being of passengers and crew.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1390

The Air Florida Flight 90 Crash Analysis

This paper will analyze the performance of the crew and other relevant teams concerning the principles of aircrew training and Crew Resource Management and the principles of 6th Generation CRM/Threat and Error Management.
  • Subjects: Aviation
  • Pages: 3
  • Words: 912

Ways that Robotics Can Transform Our Daily Lives

Robots will help to increase the labor force in the country in the future. Robots will be used to increase the productivity of human labor within the government sector and help in speeding up the [...]
  • Subjects: Robotics
  • Pages: 12
  • Words: 3265

Cargo Security Planning and Risk Assessment

Cargo security planning involves analyzing the risks and creating solutions that minimize the challenges during the movement of goods. This may include the use of technology to ensure that cargo is theft-proof.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 402

America Burning: The Importance of Fire Safety

America Burning has acted as a road map for the fire service and the federal fire programs for the past 15 years, directing them toward enhancing fire safety in the United States."America Burning Revisited" served [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 563

AR and VR for Maritime Industry Training

The first advantage of AR and VR for maritime training is that it is expected to provide trainees with a high level of practical experience in dealing with different scenarios.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2805

Artificial Intelligence Transforming the World

The possible effects of any program on the community can then be planned for and measured by managers. To conclude, even though most people are unfamiliar with AI, the world is on the verge of [...]
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 557

Forensic Accounting and Cyber Security

The recent trend of increased exposure due to the access of extended financial and fraud concerns by social media and the internet has necessitated the need to curb the tendency.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1399

Researching of Waterfall Model

The Agile SDLC paradigm is a blend of iterative and incremental modeling techniques that emphasizes process scalability and service quality through the fast turnaround of a functional software package.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 697

Information Technology and Pedagogy in Nigeria

Both public and private universities across the world have embraced the ICTs and are keen to utilize the potential of this technology to improve both the quality and efficiency of education. What are the environmental [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1768

Classification of Mobile Applications

Utility apps are the kind of applications that people need daily. The user session time is one of the longest in entertainment and social media apps.
  • Subjects: Applications
  • Pages: 2
  • Words: 576

Sony’s Response to North Korea’s Cyberattack

Therefore, while the terrorists used cyberattacks to steal the company's information and destroy their equipment, Sony switched the release to on-demand platforms and streaming services, allowing a speedy and widespread release of the film.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 574

Recursion Explained With the Mirror Analogy

Binary search through the integers or dictionary is conducted through the recursive binary search function that includes the array and the target information. Base case in recursion is a special case where the solution is [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 559

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Smart Bed Technology in Healthcare

An example of such a technology is a smart bed, which is a type of bed with sensors that collect information on the occupant. Nurses could use smart beds to track a patient's response to [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 292

Windows Server Installation and Configuration

The fourth stage is the configuration of Remote Access and Service. The logs are used to monitor the server activities and troubleshoot problems in the system.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 401

Cryptographic Algorithms: The Use in Cyber Security

Cryptographic protection of a system depends on two factors, 1) the strength of the keys and effectiveness of associated protocols, and 2) protection of said keys via key management.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 638

The Digital Workplace Transformation Issues

In this research, it is important to emphasize the significance of the digitalization of the present workspace and all the consequences, challenges, and obstacles that are associated with them.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1172