Tech & Engineering Essay Examples and Topics. Page 6

4,399 samples

Impact of the Digital Society

Electronic commerce has the following drives with respect to impact of digital society: Internet penetration Many individuals and organizations are capable of accessing internet services to check emerging and market trends Internet charge services have [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1589

Virtual Reality Technology

The third negative impact of virtual reality is that it causes human beings to start living in the world of fantasy.
  • 5
  • Subjects: Other Technology
  • Pages: 2
  • Words: 610

How Technology has had a Major Effect on Education

In direct relation to this, the creation of the iPad can be considered a tool that enables teachers to open a child's imagination and feed their natural curiosity with little effort on the part of [...]
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1853

The Internet Is a Powerful Force

In Nicholas Carr's book, What the internet is doing to our brains, he describes the impact the internet has brought to our capacity to concentrate and think deeply.
  • Subjects: Internet
  • Pages: 4
  • Words: 1142

How Business Sectors Benefit from Information Technology?

The industry is quite promising since in the past few years, more initiatives have been released to the market and in regards to that, future systems will be required to do more complex procedures requiring [...]
  • Subjects: Applications
  • Pages: 11
  • Words: 3003

History and Development of X-Rays

Professor Roentgen's discovery of X-Ray in 1895 was a very big step in the field of medicine since it was the beginning of a long and interesting journey in the study of radiation.
  • 5
  • Subjects: Engineering
  • Pages: 6
  • Words: 1644

Lockhart River Plane Crash

It is also clear that the radar squad did not continuously observe the position of the plane; furthermore, it was fathomed minutes later that the plane was absent Systems and Methods The cause of the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2761

Overview of the Internet Age

Although the young tech-savvy generation has been closely associated with the fast growth of digital crime through the internet, it is understood that individuals who are above 35 years account for nearly 45% of all [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 598

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 780

Creating a Strong Password

Users should create a password that contains secure relations to certain applications or tasks so that it will be easy to remember.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 605

Use of Simulation in Military

The first type of simulation used in the military is live simulation. The second application of simulation in the military is the use of virtual simulation.
  • Subjects: Applications
  • Pages: 2
  • Words: 618

Information Technology and Low-Cost Airlines

This is made possible by many factors but it can be said that the most significant component is the use of information technology specifically the utilization of the Intranet and Extranet networking system.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1625

Importance of Speed Limits and Stop Signs for Road Safety

Obeying the speed limit and stopping at stop signs are not merely legal obligations; they are crucial for ensuring the safety of drivers and pedestrians alike. Speed limits and stop signs are specifically designed and [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 557

Cyber Security: Fortifying the Digital Fortress

To effectively tackle the ever-changing threat landscape and guarantee the security and stability of the digital realm, a thorough and multi-faceted approach to cyber security is essential, integrating organizational measures, education, cooperation, and technological innovations.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1008

Smartphone Technology: Impact on the Camera Industry

The camera industry has been disrupted due to smartphone technology because of the improved camera experience and the cloud's capabilities, thus, companies are recommended to adopt measures such as software implementation to avoid being eclipsed.
  • Subjects: Phones
  • Pages: 4
  • Words: 988

Artificial Intelligence in Aviation

The findings demonstrate that the absence of AI-based laws and regulations in the aviation sector has hampered the deployment of safety-critical AI.
  • Subjects: AI
  • Pages: 1
  • Words: 318

Queuing Theory at Heathrow Airport

The arrival time, service and departure processes, the waiting regulation, the lineup size, and the customers being serviced are the six components that make up a line as it is studied employing queuing theory.
  • Subjects: Aviation
  • Pages: 3
  • Words: 946

Data Visualization Review and Analysis

The use of color coding makes the data easier to interpret, while the interactivity allows the user to explore different aspects of the data and draw conclusions.
  • Subjects: Data
  • Pages: 2
  • Words: 642

New Technology’s Influence on the Future

This paper will focus on the analysis of this problem and what innovations in the current world are important and able to change the market industry in the future.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1719

Artificial Intelligence in Soil Health Monitoring

Therefore, the new value provided by AI technology is that it allows automation and algorithm-based predictions for more solid decision-making. AI in soil health monitoring is an unconventional application of the technology, albeit capable of [...]
  • Subjects: AI
  • Pages: 1
  • Words: 376

How to Build a Gaming Computer

The first step to creating a custom build for a PC is making a list of all the necessary components. This explanation of how to build a custom gaming computer demonstrates that the process is [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 604

The Impact of Photoshop on Graphic Design

Many digital artists have stated that Photoshop is more than just a means to an end, it is a blank slate that encourages them to create something extraordinary with their talents.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1129

Technology Trends and Ethical Considerations

It is important to note that all the trends are significant to society, but some have fewer impacts on the community. In addition, the ability of the robots to have their rights is considered.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 634

Importance of Big Data Analytics in Sourcing

Thus, big data analytics has had an extraordinary impact on strategic sourcing due to the opportunities, lack of barriers, and options that managers are able to access currently.
  • Subjects: Data
  • Pages: 1
  • Words: 393

Artificial Intelligence and Machine Learning

There are both benefits and challenges to the use of AI and ML in the customer complaint resolution process. The ability of a company to provide a customer experience depends on that business's power to [...]
  • Subjects: AI
  • Pages: 2
  • Words: 707

The Solar Powered Flashlight and Its Advantages

Once fully charged, the solar powered flashlight will play an important role of ensuring one is able to navigate all the challenges that might arise at night.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 556

Information Security Awareness

One of the significant human factors that influence ISA is the individuals' perception of security. Hence, individuals' perceptions of information leakage and security awareness play a significant role in the success of ISA programs.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 958

Combining Programming Languages C++ and Python

C++ and Python are not the only languages that can be combined in this way. By combining this functionality with Python's data-processing functionality, one can adjust the grocery-tracking program to work with a graphical interface, [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 281

Artificial Intelligence: The Trend in the Evolution

Thus, the lens of history is a great way to consider knowledge and understanding of society and technology from a different angle in terms of comprehending the dynamics of society and the importance of technology [...]
  • Subjects: AI
  • Pages: 1
  • Words: 393

Ethical Issues in the Artificial Intelligence Field

This study will analyze ethical bias and accountability issues arising from freedom of expression, copyright, and right to privacy and use the ethical frameworks of utilitarianism and deontology to propose a policy for addressing the [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1458

The Age of Artificial Intelligence (AI)

The film "In the Age of AI" exhibits the importance of AI in transforming society. According to the documentary, AI integration in the transport sector has made it easier and safer for people to move [...]
  • Subjects: AI
  • Pages: 3
  • Words: 875

Defining Data, Information, and Knowledge

Thus, information can be defined as data that develops in one's cognitive system with the help of context and human intention. Knowledge is the process of understanding and explaining the information that happens in the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 852

The Boeing Failure Case Analysis

Several crucial factors contributed to Boeing's issues and consequent crashes of the 737 Max in Indonesia and Ethiopia, disrupting the company's reputation and finances.
  • Subjects: Aviation
  • Pages: 1
  • Words: 455

Unemployment Rate Due to Impact of Technology

By understanding the role of technology on unemployment, the public can develop innovative mechanisms to overcome the issue. The impact of technology on the labor market is relevant to my present and future life.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1109

Advantages and Disadvantages of Remote Work

With the transition of employees of different companies to the remote principle of work, there was an optimization and increase in the efficiency of electronic communications.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 300

Cybersecurity Dangers and Their Analysis

The officer clicks the file, and the malware attacks the system stealing the data and bypassing some security measures. The cyber security framework under the NIST is helping organizations to understand and manage cybersecurity.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2960

Internet of Things for Home: Benefits and Challenges

The IoT can be characterized as the unification of the virtual and real worlds with the help of many devices and sensors connected to the same network and providing interaction between machines and people.
  • Subjects: Internet
  • Pages: 10
  • Words: 2771

Amazon’s AI-Powered Home Robots

The objective of the present plan is to provide a comprehensive analysis and evaluation of the introduction of AI-powered home robots as Amazon's next disruptive customer product.
  • Subjects: Robotics
  • Pages: 11
  • Words: 3033

Analyzing the iPhone as an Artifact

At the time of the release of the first iPhone, it was a challenge for thinking and action for the whole world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1140

Microsoft Power BI Software’s Features

Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Ethical Issues of the Information Age

Accuracy refers to the accountability for errors in information and the subsequent choice of the person to blame. Property deals with the question of ownership of information and the means of its transmission.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 298

Future Innovations and Their Role in People’s Life

For instance, laptops and smartphones that allow people to make video calls to their friends and family on a different continents altered the conventional realization of space and time.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 806

Failure of Airbus A380 Production

This paper looks at the review of the problems facing the airline industry as a whole, the methodology used in the research, findings on the failure of A380 production and the analysis.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2846

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Government Restriction on the Internet

The restriction by the government has been enforced to promote the limitation of the content display that is only necessary for the user.
  • Subjects: Internet
  • Pages: 6
  • Words: 1737

The New Kinds of Identity Theft

In addition, the education sector and medical industry will be more affected by cyberattacks as success, in this case, will result in the acquisition of considerable amounts of personal information.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 331

Device Addiction: Consequences and Solutions

One of the essential traits of smartphone addiction is tolerance which is defined as "a gradual increase in the mobile phone use to obtain the same level of satisfaction".
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1204

Discord Server as Online Public Space

Interestingly, both types of relationships are natural to Discord because it has many functions, and there is possible to create many channels with the same people, so different parts of a project can be separated [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 324

“Artificial Intelligence and Its Role in Near Future”

The author's work is devoted to the role of artificial intelligence in human life: He writes about the development of AI, especially noting how computer technology has caused a renaissance of influence on processing data [...]
  • Subjects: AI
  • Pages: 4
  • Words: 1141

How Smartphones Changed Society and the World

Introduction of the smartphone to mass public Driven by iPhone created by Apple and Steve Jobs in 2007 Revolutionized the world of communications and information exchange Smartphone went from being a tool to the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 430

Facial Recognition Technology Lab Report

The implantation of a chip in video cameras to identify the face of the shown participant is actively used for national security purposes of the state, in the agricultural sector, and in the front camera [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 588

The Cloud Storage: Advantages and Disadvantages

They can encrypt it on a computer with the help of a software program before uploading information to the Cloud. In conclusion, it can be noted that Cloud storage is an effective device used by [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 852

Cyber-Security in Small Healthcare Services

Ensure accurate understanding of cyber-security to small businesses offering healthcare services. As a result, small healthcare firms will require cyber-security frameworks to keep unauthorized individuals out of the systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 558

AppMaker: Threat Agents of Web Attacks

These factors are the capability of the agent, the motivating factor, and the opportunity to attack. This is the main reason most security agents are consistent in exploring web applications with hopes of identifying complicated [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 854

Database Systems & Open Sourcing

It is prudent to mention that although the open distribution offers the source cord of a product for access by the public.
  • Subjects: Data
  • Pages: 3
  • Words: 966

Layering and Encapsulation Security Design

The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures. Thus, it is an example of a wrong solution to the world.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 720

Metadata: Organizing Cars Photos

In that regard, the present report takes the subject photos of cars and provides an investigation of suitable methods for metadata organization of such collection.
  • Subjects: Data
  • Pages: 14
  • Words: 2634

Positive Influence of AI on Business

The majority of use cases are related to business and manufacturing, making it much easier for organizations to make sure that their improvements are beneficial to business [1].
  • Subjects: AI
  • Pages: 1
  • Words: 362

Leveraging Technologies to Stay Successful

For example, to stay successful with my studies, I need help with time management, and the Focus Keeper application is my solution.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 593

Office Kitchen Hazards Identification and Control

Since kitchen hazard is the issue at hand, it is crucial to know what are the common accidents. Kitchen hazards are not just food – appliances and hygiene are highly important.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 1326

Educational Technology During the COVID-19 Pandemic

Both learners and teachers agree that adopting educational technology to enhance virtual and online classes is the best move in continuing the learning and teaching processes during and after the COVID-19 pandemic.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1170

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 50
  • Words: 14365

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Subjects: Internet
  • Pages: 4
  • Words: 1285

The Importance of Database Design

It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
  • Subjects: Data
  • Pages: 3
  • Words: 548

Tabletop Centrifuge Manual

The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

Particle Swarm Optimization: Definition

Particle swarm optimization (PSO) is an artificial intelligence (AI) or a computational method for getting solutions to problems through maximization and minimization of numeric.
  • Subjects: AI
  • Pages: 10
  • Words: 349

Propeller-Driven Performance vs. Jet-Driven Performance

Propeller-driven aircraft is more efficacious at low speeds than jet-driven aircraft, for they create higher propulsive efficiency and, consequently, greater thrust while the craft is moving at lower airspeed; however, jet-driven aircraft experience the deficiency [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 655

Mechanics of Materials, Stresses in Beams

It implies that the material near the top surface of the beam is in compression with the x-direction with the bottom surface in tension.
  • Subjects: Engineering
  • Pages: 15
  • Words: 3876

Advancement of Communication Through Technology

From this it can be seen that advances in communication are intertwined with advances in technology and as such this paper will explore the various new forms of communication that have occurred as a direct [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 804

Network Reconnaissance Using Command Line

The command enters works through the interactive mode when no arguments are stated, or when the in itial argument is a - and the following argument is the server's internet address name or the host [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2247

Fire Protection Review Plan

For the firefighting process to be effective, firefighting equipments should be given to the community members to use them in case of a fire outbreak.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 962

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

Condenser Operation and Maintenance

The design of the surface condenser is such that steam is made to get its way into the condenser system through an opening at the top section of the condenser system after which distribution takes [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2202

Wi-Fi and LAN Technologies: Data Communication Lab

The units were TCP/IP LAN technology, advanced LAN technology, rack server module, wireless LAN technology, copper tool kit, protocol analyser, and network analyser. The notes indicated how the units were configured in real LAN networks.
  • Subjects: Data
  • Pages: 4
  • Words: 1113

Fire Tube Boiler and How It Works

For example, thermal conduction is the process through which the heat of the gases is absorbed by the water in the tank.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1111

How to Build a Desktop Personal Computer

The processor will determine the speed of the system but the choice between the two major types-Intel and AMD- remains a matter of taste.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1259

Programming Solution Proposal Analysis

The preliminary investigation will crystallize the benefits of the proposed system compared with the current system to reinforce the rationale of adopting and implementing the proposed system.
  • Subjects: Programming
  • Pages: 2
  • Words: 550

Making Informed User Decisions: Windows v. Linux

Security is one of the most critical differentiating components between Linux and Windows considered in the discussion as user programs and data at corporate and individual levels get majorly concerned about the safety of their [...]
  • Subjects: Programming
  • Pages: 20
  • Words: 5667

Simulation of a Direct Detection Optical Fiber System

Meanwhile, the report will be discussing the procedures initiated during integration processes that includes the device parameters and stating all components required to make the device. Below are the procedures and the components used in [...]
  • Subjects: Programming
  • Pages: 7
  • Words: 1928

The Tactical Throwable Robot

The main technical characteristics of the machine are given below in the table offered by Czupryniak Rafal and Trojnazki Maziej in their article "Throwable tactical robot description of construction and performed tests".
  • Subjects: Robotics
  • Pages: 4
  • Words: 1151

Blackberry and iPhone: Exploits of Smartphones

The trends in mobile technology changed the entire concept of mobile phones and different models are entering the market. Unauthorized calls from Blackberry and iPhones have, in many cases, caused threats to the security of [...]
  • Subjects: Phones
  • Pages: 14
  • Words: 3684

Using Robots in the Medical Industry

Third, the robot surgery further has been observed to increase comfort on the part of the patient as the surgery proceeds, and this results from ergonomic position that the robot assumes as the operation proceeds.
  • Subjects: Robotics
  • Pages: 3
  • Words: 990

The Internet is a Democratic Technology

As opposed to what in the media channels of communication where the information let out to the public is filtered and influenced by what the government want the people to know, the Internet is free [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 890

Low-Cost Carriers and Secondary Airports

LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
  • Subjects: Aviation
  • Pages: 2
  • Words: 929