Tech & Engineering Essay Examples and Topics. Page 6

4,379 samples

How the Internet Has Affected Amazon.com

Looking at its location, and with a wide range of products it deals with, coupled with a high demand for its products in the world market, we have to appreciate the role played by the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 514

Electricity Hazards for Human Body

The main points of this article are to offer the reader with an awareness of the generally dangers of electricity, and to provide some insight into the physiological effects of electrical shock on the human [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1641

Secondary and Primary Data Collection Methods

Carvajal, Maucec and Cullick argue that the industry of the oil and gas is the world's largest sector in terms of dollar value. The aim of the research is to investigate how digital transformation has [...]
  • Subjects: Other Technology
  • Pages: 60
  • Words: 15625

Airline Planning of a New Domestic Route

When adding a new route to the network of a domestic airline, it is necessary to evaluate a range of factors to ensure this route will be profitable.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1086

Home Networks, Their Functions and Features

A home network is a small local area network that enables communication among two or more computing devices within a limited area of a home. Typical elements of a home network are a modem, a [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 552

Evie.ai: Artificial Intelligence and Future Workforce

That is why it is crucial to analyze some trends in artificial intelligence that are being adopted by many businesses for better functioning, in particular, the implementation of Evie.ai, its functions, and the consequences.
  • Subjects: AI
  • Pages: 4
  • Words: 1215

Driverless Cars and Safety Concerns

However, in the future, the application of machine learning might as well make driverless cars safer and their systems "smarter" in a way that they would mimic human reactions to unpredicted events.
  • Subjects: AI
  • Pages: 1
  • Words: 441

Effective Power Transmission Systems

After accentuating the necessity of the new transmission system and the associated planning, the authors focused on the benefits of transmission systems in general.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1677

The Bring Your Own Device Policy

What are the advantages and disadvantages of allowing employees to use their personal smartphones for work? Compare the BYOD experiences of IBM and Intel.
  • Subjects: Phones
  • Pages: 7
  • Words: 2015

IPhone 5S Instructional Manual

As indicated in Figure 1, the phone has a total of 12 features. In point form, the features are as follows: A face time camera.
  • Subjects: Phones
  • Pages: 5
  • Words: 956

DELL and HP Machines Comparison

The two brands are known to produce good quality machines, and consumers prefer these models over the rest of the models in the markets.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Nova Scotia’s Westray Mine Tragedy

The report of Richard Justice blamed the business firm that supervised the coal mine and different government superintendents who overlooked defiant stare of safety mistreatment. In addition, the Westray administration never conformed to protection guidelines [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1192

Software Engineering Career Information

Software Engineering is a field in engineering that requires the practitioner to apply the principles of engineering in the design and development of software products.
  • Subjects: Engineering
  • Pages: 2
  • Words: 549

Causal Loop Diagram as a Specific Visualization Tool

In this regard, the given paper is devoted to the in-depth investigation of the given method, its nature, the way it is applied, and how it now helps managers to achieve particular goals.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1123

Technological Innovation in Law Enforcement

It shows that criminals may use the same methods as police officers and also indicates that the storage of personal information in cyberspace is related to major safety risks.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 870

Impact of Technology on the K-12 Education

The major asset of the present research is that the T-test will indicate the students' performance progression. The paired sample T-test is the core of the proposed quantitative research, which is designed to establish if [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 636

The Printing Technology: Principles and Applications

It has been established that the thickness of the dead zone is in the range of tens of micrometres, which calls for a judicious estimation of the correct parameters to be used as conceptualised in [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1687

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1111

Artificial Intelligence and Humans Co-Existence

Some strategies to address these challenges exist; however, the strict maintenance of key areas under human control is the only valid solution to ensure people's safety.
  • Subjects: AI
  • Pages: 2
  • Words: 658

The Impact of Technological Change on Business

While it is obvious that effective and diverse means of communication have been at the disposal of entrepreneurs for more than a century now, it is undeniable that the development of the informational technology, especially [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1735

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
  • 5
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1413

Time Travel: Is It to the Past or Future?

The purpose of this paper is to investigate the domain of time travel and to provide evidence that traveling to the future is more likely than to the past if the necessary conditions have been [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 894

Access Control System in the Dormitory Project

Also, the system must also capture any individual trying to access the door and relay that information to the cameras at the security control room. The project's scope involves the successful installation of the Access [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 711

Disney Resort Crisis Communication Plan

When dealing with an emergency, the head of crisis communication has to carefully follow a crisis communication plan. He or she will compile a list of key publics that have to be notified of the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1987

The Importance of Virtual Learning Communities

The learning communities enable the instructors and the students to volunteer their questions. The virtual learning communities enable online degree programs to give students autonomy over the learning process.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1679

UAE Cybercrime Laws and Statistics in Dubai

According to the chart provided above, the introduction of the new legislation has contributed to a minor drop in cybercrimes. In addition, it can be suggested that programs should be created to educate people on [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 449

Digital Libraries Pros and Cons

Furthermore, the assessment looks into the arguments of scholars, who support the retention of traditional libraries and explain the various benefits of traditional libraries citing the negative aspects of digital platforms in their quest to [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2236

Technology and Relationships: Positive and Negative Effects

The research proposal provides an analysis of two topics namely 'the positive effects of using technology to communicate in an organization' and 'the negative impacts of using technology for individual and family communication'.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2514

Software Bugs Types, Causes and Consequences

A software bug is a term that is used to denote a fault, error, or failure in a piece of computer software, which yields an undesirable result such as a software crash, incorrect behavior of [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 681

Screwdriver – Mechanism Description

The fulcrum shank of a hex nut screwdriver is a metallic rod that is attached to the handle of the screwdriver and ends with a blade.
  • Subjects: Engineering
  • Pages: 2
  • Words: 579

Microsoft SharePoint as a Private Cloud App

The SharePoint allocation has the capability of efficiently replacing the sandbox and farm solutions thus, guaranteeing satisfaction to the administrators, users, and third-party application experts. In terms of the users' recompense, the SharePoint application enables [...]
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 602

Cybersecurity: Stuxnet Virus

Cyber security is one of the major concerns of governments in the contemporary world. It is important to note that in case of Stuxnet the three aspects prove to be vulnerable.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1126

Thermistor and Its Applications

This paper examines the working mechanism and applications of Thermistors Thermistors are special kind of variable resistors whose resistance changes with changing temperature i.e.a change in thermal temperature results in changes in its resistance value.
  • Subjects: Engineering
  • Pages: 2
  • Words: 668

Colgan Flight 3407: Human Factors of the Accident

The cause of the accident was attributed to the failure of the flight crew to monitor airspeed according to the rising position of the low-speed cue, the flight crew's failure to stick to the cockpit [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1845

Modern Technology: Development and Effects

It has made the daily functions easier and more practical, as the software programs, internet and stored memory have extended the use of information and understanding.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 559

Smartphones Role in Lifestyles Changes

The fast and quick connectivity of smartphones to the internet provides a wide spectrum of understanding issues that individuals face in their professional and social lives. Creativity and innovation that smartphones facilitate lead to enhanced [...]
  • Subjects: Phones
  • Pages: 8
  • Words: 2330

Technological Development and Dependency

With rapid technological developments, many people are today concerned with the impact of technology in the life of the modern man.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 622

Internet Evolution and Structure

The creation of the network was meant to be a security measure to ensure that data and information belonging to ARPA remained within the system.
  • Subjects: Internet
  • Pages: 5
  • Words: 1406

Singapore’s Cyber Crime Scene

The significant cybercrime perpetrators in Singapore are the youths who are techno-savvy, and about 80% of the whole population has been the victim of cybercrime.
  • Subjects: Internet
  • Pages: 3
  • Words: 798

American Airlines 1420: Accident Overview

Because of the thunderstorm and heavy rain on the way, the pilot did not manage to land the plane safely, and it crashed after the overrunning the end of the runway.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1385

Fixing the Digital Divide in the US

Following the explosion and mass adoption of the Internet in the US in the past decade, researchers have conducted many studies to identify the Internet access and usage among Americans.
  • Subjects: Internet
  • Pages: 7
  • Words: 1971

Fire Hazards Related to Fireworks

In the period of the Song Dynasty that lasted from 960 to 1279, a majority of the ordinary persons could buy a variety of forms of fireworks from market sellers, and splendid exhibits of fireworks [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2798

Globalization Influence on the Computer Technologies

In spite of the fact that globalization may be defined as a serious problem in different spheres of life, it is wrong to believe that the future of IT may undergo negative effects; it seems [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1119

Engineers and Ethical Dilemmas

Recently in the Kenyan media there was a situation in which a road engineer had been approached by the government to aid in the design and construction of a road in the Langata area.
  • Subjects: Engineering
  • Pages: 2
  • Words: 585

Emerging IT-Related Technology’s Ethical Issues

The 21st century is marked by the development of information technology and the emergence of IT-related technologies. The ethical dilemma under research is privacy and confidentiality on the application of emerging technology such as online [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 589

Dialysis Water Treatment System

Heat exchanger: the evaporated water from the boiler is passed through the heat exchanger where it loses heat to the working fluid/feed water in the heat exchanger.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1788

Computer Technology in the Last 100 Years of Human History

These communication tools are based on computer technology, and are the foundation of younger generations' living. Computer technology is detrimental to the lives of younger generations because it fails.
  • 5
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1113

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Internet Filtering Positives and Negatives

The issue of keeping of information by governments does not hold because as the government leaves the internet open to no filtering, it only protects the rights of a few individuals.
  • Subjects: Internet
  • Pages: 4
  • Words: 1042

Virtual Reality Versus Augmented Reality

In fact, this amounts to one of the merits of a virtual reality environment. A case example of this type of virtual reality is the Virtual Reality games.
  • 4.3
  • Subjects: Other Technology
  • Pages: 3
  • Words: 850

The Evolution of the Car Engine

France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2226

The Advantages and Disadvantages of PMA

The difference between the licensed and independent PMA is in the character of the cooperation between the companies and the features of producing the PMA parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 553

How the technology impact education

It is noted that technology plays a significant role in spheres of life and the field of education is not an exception. Experts in the field of education have acknowledged that technology is another gift [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 593

Mobile Technology Advancements

This wide range of customer requirements underpins the fact that mobile system based users require a high level of availability to access IT and IS systems.
  • Subjects: Phones
  • Pages: 7
  • Words: 1977

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 4954

Linux, the Operating System of Choice

A recent trend in the field of software is the open source genre, and it can rightly be said that the Linux operating system has become the embodiment of this genre.
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3421

Technology and Its Future Development

It is clear that technology is starting to become smaller but it is to the benefit of people and with careful control will not evolve into a great evil.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 559

The Dishwasher Advantages

Many people now rely on the dishwasher, and the traditional method of manually cleaning the utensils has become a thing of the past.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1068

Cheating in the Internet

The presence of ecommerce has increased the number of fraudulent deals in the internet. However, with the increasing number of transactions in the internet, fraudsters are taking advantage of the situation.
  • 1
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Fire protection systems for Offshore oil rigs

The weight of the barge and the ballast water drives the support legs to the bottom of ocean or the sea in order to avoid further penetration when the rig is in operation.
  • 2
  • Subjects: Engineering
  • Pages: 14
  • Words: 3829

Virtual Reality Technology

The third negative impact of virtual reality is that it causes human beings to start living in the world of fantasy.
  • 5
  • Subjects: Other Technology
  • Pages: 2
  • Words: 610

Airports Electronic Gate (E-Gate)

The invention and innovation of computer applications has resulted in the development of electronic gate used in airports; the innovative electronic passport control system is used to boost security and facilitate the flow of people [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1621

Decision Support Systems

A DSS has three major elements: Database management system that stocks huge volumes of data that is vital in finding solutions to problems for which the DSS has been designed to solve; Model-based management systems [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1369

The Internet Is a Powerful Force

In Nicholas Carr's book, What the internet is doing to our brains, he describes the impact the internet has brought to our capacity to concentrate and think deeply.
  • Subjects: Internet
  • Pages: 4
  • Words: 1142

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 780

Smart Grid Technology

The most common application of smart grid technology is in electricity distribution. In conclusion, smart grid technology has changed the way power is generated and transmitted.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Nanotechnology Risk in NanoBatteries

When the nanobatteries are exposed to fire, the inhalation of the fumes may cause severe respiratory tracts inflammation in the upper region of the respiration systems, which can lead the damage of the lungs.
  • 4
  • Subjects: Engineering
  • Pages: 5
  • Words: 1524

Impact of Technology on Education

The history shows that technological progress and modernity are closely interconnected, arranging a tandem for the development of more sophisticated techniques for the cognition of the surrounding world.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1715

What Are the Benefits of the Internet?

The Internet has been one of the biggest inventions that have made a great difference in the lives of many people in the world.
  • Subjects: Internet
  • Pages: 4
  • Words: 1026

Dangers of Texting while Driving

The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • 5
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1123

The iPhone’s Main Features and Productivity

The sophistication of the iPhone is reiterated by Jacko who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 728

Challenges of Computer Technology

Computer Technologies and Geology In fact, computer technologies are closely connected to any sphere of life, and it is not surprisingly that geology has a kind of dependence from the development of computers and innovative [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1673

Sample of Chart or Graph

While the stacked bar chart is very helpful in understanding the overall votes by respondents as well how many considered each focus area as critical or high, it does not give an idea of the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 559

Solutions to Computer Viruses

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 562

Privacy Risks and Tech Use Among the Elderly

With the rise in popularity of smartphones and tablets, the elderly now make up a sizable portion of the population who utilize digital goods and services.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1611

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

Technological Driver of Change

Businesses have been pushed to alter how they design and build their websites and applications as a result of the popularity of mobile devices.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 636

Low-Code No-Code Platforms’ Cybersecurity Risks

In conclusion, the cyber security risks of using low-code no-code platforms can be significant. While users find it easy to design software without much skill in programming languages, they should understand the security implications of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

Forces on a Rotating System Laboratory

The mass appears to push outward due to its inertia in the case of a spinning system because the centripetal force pulls the mass inward to follow a curved path.
  • Subjects: Engineering
  • Pages: 2
  • Words: 576

Digital Certificate Management

The paper focuses on the process of issuing and managing digital certificates, discussing the weaknesses and vulnerabilities of different methods and the issues with revoking certificates, and possible remedies.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1223

Sony Pictures: The Cyber Attack

The incident also highlighted the vulnerability of large companies to cyberattacks and the need for better security measures."Guardians of Peace" was the hacker organization that breached the computer networks of Sony Pictures Entertainment, a prominent [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 858

Electrical Multimeters: Overview and Application

It is a crucial tool for the electrical and electronics industries because it enables electricians and techs to identify electrical issues, analyze circuitry, and test electrical parts [1].
  • Subjects: Other Technology
  • Pages: 2
  • Words: 589

Aspects of the Cybersecurity Theories

Constructivism indicates that states' beliefs of the significance of cybersecurity and the norms around cybersecurity are crucial elements in shaping their conduct in cybersecurity. The use of coercion and intimidation to achieve political aims is [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 669

Coarse- and Fine-Grained Parallelism

Fine-grained parallelism uses smaller parts of the program for parallel processing and requires a large number of threads to perform tasks.
  • Subjects: Programming
  • Pages: 3
  • Words: 914

Recovery of Airbus A380 From Failure

The demise of the A380 can be linked to various issues, including a change in the market as well as reduced demand for the craft, that is regarded among the largest airplanes.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2316

Principles of Fire Prevention and Safety: An Overview

The public's knowledge of fire safety, the evaluation of building plans for both new and existing structures, and the investigation of fires are further grounds for carrying out fire inspections and fire safety enforcement activities.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1152

The Department of Homeland Security’s Cybersecurity Mission

Cybersecurity is evolving rapidly, and DHS's cybersecurity mission is equipped with models adapting to the ever-changing security and information dynamics. The DHS cybersecurity mission is designed with models that adapt to changing dynamics and landscapes.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 357

Cargo Security Planning and Risk Assessment

Cargo security planning involves analyzing the risks and creating solutions that minimize the challenges during the movement of goods. This may include the use of technology to ensure that cargo is theft-proof.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 402

Academic Writing Under Impact of Technology

A study of the impact of technology on academic writing will determine the potential future development of different types of academic writing.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1264

Cloud-Based Attendance Software

In the context of data storage and retrieval, a cloud-based database is designed to operate in a public or hybrid cloud environment.
  • Subjects: Programming
  • Pages: 8
  • Words: 2242

Engineering: Technological Discipline

With software engineering, students are taught about computers and technology and how they can code programs and design applications, software and websites. The most popular and growing professions are electrical engineering.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Artificial Intelligence’s Impact on Communication

Therefore, it is worth concluding that although artificial intelligence is now at a high level of development, the communication of technologies among themselves needs to be improved. The bots will be trained by artificial intelligence [...]
  • Subjects: AI
  • Pages: 1
  • Words: 367

Linked Lists as a Data Structure

The linked list begins with a HEAD, which designates the beginning or the location in memory of the first node. The pointer to the list's first node is found in the circular linked list's last [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 591

Drawing a Performance-Evaluation Data Flow Diagram

Mukunda approved the data flow diagram for workplace applications, given that it covers the entire scope of a performance evaluation process, including employee self-reflection and collaborative coordination between top managers and their subordinates.
  • Subjects: Applications
  • Pages: 1
  • Words: 293

Big Data and Python Tools for Data Analysis

Volume describes the amount of data, variety refers to the complexity of the data types in the set, and velocity defines the rate at which new data is generated.
  • Subjects: Data
  • Pages: 2
  • Words: 565