Tech & Engineering Essay Examples and Topics. Page 7

4,328 samples

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 4954

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

Technological impact of the Samsung NC215S Netbook

While many netbooks and laptops have been launched with great technological features, the thing that sets this Netbook apart from others is that its lid carries a solar panel on the top that allows the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 601

The Role of the Internet in Business

The thesis statement The role of the Internet in business cannot be neglected, as the World Wide Web can be regarded as one of the most powerful and effective tools for conducting business.
  • Subjects: Internet
  • Pages: 4
  • Words: 1090

Impact of New Forms of Technology on Our Understanding of Pornography

This paper therefore shows that technology has completely changed concepts of the production of pornographic material, the distribution of pornographic material, access to pornographic material and our understanding of the concepts of privacy and identity.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2276

Safety Engineering

The importance of safety culture and management To achieve safety goals, any organization is to be familiar with safety culture. Safety engineering is really the important science as it gives the students the opportunity to [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1665

New Technology Training in Hospitality Industry

The emergence of new technologies in the hospitality industry has made it possible to enhance training and learning among the employees and the management team.
  • 4.5
  • Subjects: Applications
  • Pages: 11
  • Words: 3016

The Airbus Fly-By-Wire Control System

In fly-by-wire, the control of the aircraft is only achieved through the use of electrical signals. The fly-by-wire control systems have enabled automatic stability system to be included in the plane and act autonomously to [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1651

Globalization and Digitalization

The tools that are necessary in the technological exodus from the traditional mode to higher fashions have posed a challenge in the labor force in relation to the level of expertise.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Brief History of the Boeing 787

The above information on the Boeing 787 is crucial as it has given the quest to explore the power behind the success of the aircraft in the market.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Smartphone as a Communication Sector Revolution

The Smartphone has done much to pull the world towards the core of digital database. The youth has exploited this utility to download music and movies from the world over and store it for their [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 560

The Evolution of the Personal Computer and the Internet

Due to the complexity of the subject matter it is necessary to digress once more and discuss briefly the history of the World-Wide-Web so that there is a clearer understanding of what it is all [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2435

Prezi vs. PowerPoint

In making presentations, the choice of presentation software to be used will be dictated by the amount of information the presenter wishes to pass to the audience, as well as the format of data the [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1702

Fibre Reinforced Plastic

Secondly, it is important to consider the change in the stiffness of the member to be strengthened. This requires the use of FRP composite, which is bonded to the tension face.
  • Subjects: Engineering
  • Pages: 2
  • Words: 370

Ethics in Computer Technology: Cybercrimes

The first one is the category of crimes that are executed using a computer as a weapon. The second type of crime is the one that uses a computer as an accessory to the crime.
  • 5
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1334

The Issue of Privacy

In the magazine article named 'Privacy and the Limits of Law', the author Ruth Gavison has pointed out that perfect privacy is impossible to be achieved most of the times with the emerging technologies in [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2208

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

Smart Classroom and Its Effect on Student Learning

In the event of a need for some practical experience, there was some assembly of some equipment in a separate room such as a laboratory and the teachers together with the students engaged in the [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1628

The Cloning Controversy

Considering the fact that most of the controversy about cloning arises from misinformation or ignorance about the matter, this study shall set out to conclusively research on cloning and its merits so as to attest [...]
  • 3.5
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1207

The iPhone’s Main Features and Productivity

The sophistication of the iPhone is reiterated by Jacko who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 728

Industrial Engineering

This is to facilitate development of appropriate construction designs, allocation of resources, and crafting of superior strategic plan to enhance effectiveness.
  • 4
  • Subjects: Engineering
  • Pages: 4
  • Words: 1094

Pros and Cons of Information Technology

Some of the disadvantages of the improved technology include new forms of pollution that are as a result of the gadgets used to access the resource.
  • Subjects: Internet
  • Pages: 2
  • Words: 609

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

Smartphone Technology: Impact on the Camera Industry

The camera industry has been disrupted due to smartphone technology because of the improved camera experience and the cloud's capabilities, thus, companies are recommended to adopt measures such as software implementation to avoid being eclipsed.
  • Subjects: Phones
  • Pages: 4
  • Words: 988

Researching of Ubuntu Operating System (OS)

The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2048

Education: Impact of Technology

As the use of technology in the classroom increases, people have to be more mindful of ethical issues that arise from it. It is important to remember that there are also legal issues connected to [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 399

Coarse- and Fine-Grained Parallelism

Fine-grained parallelism uses smaller parts of the program for parallel processing and requires a large number of threads to perform tasks.
  • Subjects: Programming
  • Pages: 3
  • Words: 914

Ways that Robotics Can Transform Our Daily Lives

Robots will help to increase the labor force in the country in the future. Robots will be used to increase the productivity of human labor within the government sector and help in speeding up the [...]
  • Subjects: Robotics
  • Pages: 12
  • Words: 3265

Online Transactions Challenges and Solutions

These regulations are formulated by the most relevant brands in the industry, such as MasterCard and Visa, to ensure the safety of online transactions.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 277

Queuing Theory at Heathrow Airport

The arrival time, service and departure processes, the waiting regulation, the lineup size, and the customers being serviced are the six components that make up a line as it is studied employing queuing theory.
  • Subjects: Aviation
  • Pages: 3
  • Words: 946

Data Visualization Review and Analysis

The use of color coding makes the data easier to interpret, while the interactivity allows the user to explore different aspects of the data and draw conclusions.
  • Subjects: Data
  • Pages: 2
  • Words: 642

Aspects of the Fire Prevention and Safety

According to the 2019 International Building Code, materials and features in buildings need to be structurally fire-resistant to safeguard against the spread of fire and smoke.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 613

Helicopter Air Ambulance Collision with Terrain

The commercially licensed pilot, the flight nurse, and the paramedic died, and the helicopter was ruined. Due to the 2,400-foot ceiling and 11 km of visibility, the evening shift pilot rated the weather as "excellent".
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2844

Engineering: Technological Discipline

With software engineering, students are taught about computers and technology and how they can code programs and design applications, software and websites. The most popular and growing professions are electrical engineering.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Information System and Its Various Dimensions

Therefore, the information system is a collection of data, facts, or knowledge integrated in an intentional manner for the purpose of collecting, processing, and storing.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 612

The Harry Potter Phenomenon Analysis

Since these groups sowed the seeds of the Potter phenomenon, the connectors and, later, the mavens were crucial to the publication of the first novel, Harry Potter and the Philosopher's Stone.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1770

Space Science and Technology Development in the UAE

For this reason, the given study focuses on investigating the role of space science and technology development in the UAE and their contribution to the development of international relations.
  • Subjects: Technology Effect
  • Pages: 40
  • Words: 11835

Drawing 3D Objects With Use of Robotic Arm

The hot end of the printer melts the material and embeds it onto the surface onto the intended surface. The research also utilized the Arduino development board to interface the programs written and the physical [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2759

Temperature Effects in Laser Diodes

Consequently, the emission wavelength of a semiconductor laser diode is described by a temperature dependence similar to the bandgap in the same linear order.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1913

Introduction to the Engineering Design Process

NASA's Best Engineering Design Process course demonstrates how presenting the audience with the idea of bringing a satellite to the Moon can lead to introducing deeper problems associated with the engineering side of the idea.
  • Subjects: Engineering
  • Pages: 1
  • Words: 323

Virtual and Augmented Reality in Education

The novelty of this technology can be used by unscrupulous employees as an excuse to avoid preparing for lessons and working with students.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1153

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

Impact of Cyber Crime on Internet Banking

The paper evaluates a con article on 'The impact of cybercrime on e-banking' [1]. H2: Identity theft will have a negative impact on the adoption of electronic banking.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 882

Artificial Intelligence Transforming the World

The possible effects of any program on the community can then be planned for and measured by managers. To conclude, even though most people are unfamiliar with AI, the world is on the verge of [...]
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 557

Cybersecurity Contingency & Incident Review Process

Next, it is necessary to implement various stages of digital transformation of cybersecurity, which include improving the maturity of enterprises in cybersecurity issues and the use of new solutions.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1416

The Hybrid Robot Vacuum Cleaners

The EUFY series of hybrid vacuum cleaners is one of the most popular choices in the market, and the company offers products in various pricing ranges. In the context of hybrid robot vacuum cleaners, market [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2869

Researching of Waterfall Model

The Agile SDLC paradigm is a blend of iterative and incremental modeling techniques that emphasizes process scalability and service quality through the fast turnaround of a functional software package.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 697

Information Technology and Pedagogy in Nigeria

Both public and private universities across the world have embraced the ICTs and are keen to utilize the potential of this technology to improve both the quality and efficiency of education. What are the environmental [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1768

Single and Double Buffering Analysis

The concepts of single buffering and double buffering are essential to understanding how animation is being displayed. Hence, single buffering and double buffering are particularly useful in animation and address the issue of display and [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 283

Google Docs as a Tool for Collaborative Writing

The significance of the problem: the inability to adapt teaching practices to the needs of ELLs is likely to result in a continuing learning gap for all current and future students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 688

Airline Certification Process and Dot Operational Requirements

The certification course involves examining the techniques that will be utilized to verify that the systems and the plane conform with federal regulations, carrying out flight and ground tests, and assessing the aircraft to ascertain [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1114

Conjoint Analysis of Mobile Preferences

The mobile preferences provided an overview of the nature and use of conjoint analysis as a research tool, and two, to demonstrate its value by using the tool to analyze the value that the consumer [...]
  • Subjects: Phones
  • Pages: 1
  • Words: 471

Human Existence in Age of Informational Knowledge Work

The essay examines the publications of Zuboff, Taylor, Boyett and Conn, Davidow and Malone, and Castells to investigate their perspectives on the fundamental principles, needs, and possibilities of modern society experiencing the technological shift.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1432

Multithreading Models: Definition and Types

The programming system facilitates the running of various filaments in parallel, and all the possible threads reach the kernel at the same period.
  • Subjects: Programming
  • Pages: 2
  • Words: 672

Smartphone Technology and Its Brief History

One of the ways that prove smartphone technology has impacted the global economy is the dramatic increase in the capacity to communicate and collaborate.
  • Subjects: Applications
  • Pages: 8
  • Words: 2212

Expenses in Today’s Air Industry

Hence, the number of costs and expenses involved in the industry is also changing. According to the Federal Aviation Administration report, the largest expense of the airline industry is labor, which constitutes 32.
  • Subjects: Aviation
  • Pages: 3
  • Words: 956

Civil Aviation During the COVID-19 Pandemic

Using the HRM perspective as the basis for the discussion, the study analyzes the effectiveness of the employed methods and their contribution to overcoming the crisis.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2021

Transition From Analog to Digital World

However, one should understand that this state of affairs has not always been the same, and the analog world preceded the digital one.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 279

Mechanical and Electrical Engineering Branches

It is mainly characterized by the deepening of the specialization of production and the expansion of its scale."Small" metallurgy should be added to the listed divisions of mechanical engineering.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1436

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Cybersecurity Weaknesses: The Case of LinkedIn

The Internet has become the largest storage of personal and corporate information in the history of the world. The data relating to hundreds of millions of users was leaked online in the Dark Web segment [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 652

EBay: Cloud Computing SAAS Model

Software-as-a-Service is a cloud computing model that suits eBay's needs outlined in the previous slide. As anyone can access the service without specialized hardware, software, or knowledge, it can be brought to a large audience [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 617

The Near-Miss Marine Reporting Fails

The overall effectiveness of the thesis and the article is high, as the author talks in detail about the existing problems in the topic he is covering.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 298

Zoom Technology and Its Ethical Issues

According to Zoom operators, the organization promised end-to-end encoding, but the commission alleges the end-to-end encryption provided was being stored on its server.
  • Subjects: Internet
  • Pages: 5
  • Words: 1456

Discussion: How Does AI Improves Manufacturing?

The lean standards of manufacturing are the activities and techniques applied in the production process to identify the bottlenecks and streamline the efficiency of the process while ensuring high productivity.
  • Subjects: AI
  • Pages: 7
  • Words: 1937

Technological Development of Civilizations

The current stage in the development of human civilization is closely related to the use of technology. The fundamental thesis of his writings is that technology contributes to the development of human communities but that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1214

The Digital Workplace Transformation Issues

In this research, it is important to emphasize the significance of the digitalization of the present workspace and all the consequences, challenges, and obstacles that are associated with them.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1172

Discord Server as Online Public Space

Interestingly, both types of relationships are natural to Discord because it has many functions, and there is possible to create many channels with the same people, so different parts of a project can be separated [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 324

Should the Internet Be Regulated?

The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
  • Subjects: Internet
  • Pages: 2
  • Words: 661

5G Technology and Its Implementation in Business

The addition of advanced connectivity methods in the form of 5G networks opens new opportunities for business and new methods to increase the efficiency of business processes.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 847

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Data Mining and Its Major Advantages

Thus, it is possible to conclude that data mining is a convenient and effective way of processing information, which has many advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 290

Using AI Emotional Surrogates to Overcome Loneliness and Trauma

These statistical findings underpin the pervasiveness and severity of the crisis, necessitating the adoption of such innovative interventions as artificially intelligent emotional surrogates to alleviate the loneliness and associated trauma. Despite the sophistication and level [...]
  • Subjects: AI
  • Pages: 9
  • Words: 2515

Protecting Digital Assets Overseas for U.S. Companies

The question of how U.S.companies can protect their digital assets can be answered by examining available protection frameworks and how to take advantage of them The U.S.government offers cybersecurity for its companies both domestically and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 573

The Million Dollar Page: Why Is It Popular?

Lastly, online advertising's effectiveness was still questionable and difficult to measure; thus, in 1999, Alex's idea would not get enough customers to fill the one million pixels.
  • Subjects: Internet
  • Pages: 1
  • Words: 295

The Delta Airlines Flight 191 Crash

When the pilot successfully flies through to the other end of the microburst, the direction of the wind changes and becomes a tailwind because it is now behind the plane.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2849

Database Systems & Open Sourcing

It is prudent to mention that although the open distribution offers the source cord of a product for access by the public.
  • Subjects: Data
  • Pages: 3
  • Words: 966

Microsoft Excel 2019 Experience

The program offers modern tools for creating simple and pivot tables, importing information, performing calculations using complex mathematical formulas, analyzing statistics, and visualizing it in graphs and charts.
  • Subjects: Applications
  • Pages: 1
  • Words: 279

How Do Hybrid Cars Work

The branch supports hybrid cars because they help to protect the environment through the reduction of emissions to the atmosphere and use of less fuel.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Object-oriented Programming. Java and C++ Programming

Besides, software engineers are required to understand the languages that are suitable for object orientation since not all languages can implement the OO programming concepts. In other words, classes are used to implement the concept [...]
  • Subjects: Programming
  • Pages: 4
  • Words: 1227

Aviation Weather: Atmospheric Pressure

On the other hand, temperature changes the air pressure; therefore, altimeters mostly indicate an altitude different from the true altitude. Thus, the altitude of an airport is the most meaningful altitude to a pilot.
  • Subjects: Aviation
  • Pages: 2
  • Words: 549

Management Information Systems (MIS)

The advances in the evolution of devices and the achievement of a new stage of development critically impacts MIS and creates the basis for the emergence of multiple changes towards the achievement of better outcomes [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 573

Establishing a SOCC: The Best Practices to Follow

The role of the Security Operation Center is to prevent, detect, and respond to cybersecurity threats. The first practice that should be implemented at Sifers-Grayson is the establishment of a system for data extraction and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

Artificial Intelligence in Drone Technology for Farming

Automated drones fitted with spraying features are used in the monitoring of agricultural processes and crops to schedule tasks and expeditiously address the observed issues throughout plant life.
  • Subjects: Robotics
  • Pages: 11
  • Words: 3010

VMware Server Virtualization Solution

This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
  • Subjects: Computer Science
  • Pages: 45
  • Words: 13587

Airports Security Systems’ and Passengers’ Satisfaction

All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
  • Subjects: Aviation
  • Pages: 19
  • Words: 4975

Analysis of The Veteran Affairs Data Breach

The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 589

Computer Network: Data Flow and Protocol Layering

The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

Usability Testing and Pact Analysis Report

The PACT analysis is conducted to find the utility of the tool in the optimum resource management at a call center. The usefulness of the Call Center Traffic Monitoring System is to be measured by [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3200

Influence of YouTube and Facebook on Business

Two of the most influential and promising technologies in this age are the YouTube and Facebook, a social website. The impact of social media on business is remarkable and companies use YouTube to market their [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2171

Computer Museum: Personal Experience

While in the Revolution, I got a chance to see a working replica of the Atanasoff-Berry Computer, which was the first real model of a working computer.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1211

Fire Protection Review Plan

For the firefighting process to be effective, firefighting equipments should be given to the community members to use them in case of a fire outbreak.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 962