Tech & Engineering Essay Examples and Topics. Page 7

4,370 samples

The Home Internet and Network Security

In addition, system security should be considered as well in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 400

A Commercial Tanker Incident Analysis

Due to the limited vision, the pilot and the bridge crew had a difficult time performing an accurate assessment of the situation in order to make the necessary modifications.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 2097

Disruptive Innovation: Comparative Advantage

In summary, the greatest risk is that if the company commits to disruptive innovation, its customers might prefer the products of the organization's rivals that provide sustaining innovations.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 358

Pipeline Hazards in Computer Architecture

Therefore, branch instructions are the primary reasons for these types of pipeline hazards to emerge. In conclusion, it is important to be able to distinguish between different pipeline types and their hazards in order to [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 306

The Smart Parking Space App and Its Functions

The median occupancy rate for the two days of the week, Monday and Friday, is exactly the same. There is a breakdown of the occupancy rates for each lot, broken down by day and hour.
  • Subjects: Applications
  • Pages: 5
  • Words: 908

Risks and Opportunities of “Platformization”

The growth of the sharing economy, which has been witnessed through the success of multinational companies, such as Airbnb and Uber, has also elevated the importance of "platformization" in the global economy.
  • Subjects: Programming
  • Pages: 9
  • Words: 2558

The Invento Robotics Products Analysis

The 5 C's of brand management has grown in popularity since it thoroughly evaluates all the important aspects of a company and allows for approach adjustments depending on what is and is not effective.
  • Subjects: Robotics
  • Pages: 6
  • Words: 1665

The Digital Transformation and Innovation Nexus

The practical orientation of the study ensures its applicability in the current economic environment characterized by the increasing complexity of the organizational landscape.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2128

Defining Data, Information, and Knowledge

Thus, information can be defined as data that develops in one's cognitive system with the help of context and human intention. Knowledge is the process of understanding and explaining the information that happens in the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 852

The Boeing Failure Case Analysis

Several crucial factors contributed to Boeing's issues and consequent crashes of the 737 Max in Indonesia and Ethiopia, disrupting the company's reputation and finances.
  • Subjects: Aviation
  • Pages: 1
  • Words: 455

The Role of Databases in Organizations

In the contemporary technology-driven world of business, the use of information technologies is essential for the efficient and competitive implementation of business practices.
  • Subjects: Data
  • Pages: 1
  • Words: 291

Advantages and Disadvantages of Remote Work

With the transition of employees of different companies to the remote principle of work, there was an optimization and increase in the efficiency of electronic communications.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 300

Multithreading Models: Definition and Types

The programming system facilitates the running of various filaments in parallel, and all the possible threads reach the kernel at the same period.
  • Subjects: Programming
  • Pages: 2
  • Words: 672

Buffer Overflows and Data Execution Prevention

Since buffer overflow is about memory, the user can protect it by not writing beyond the specified space, which can be covered by the Data Execution Prevention method by preventing the application from being executed [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 858

Smoke Control Systems, Their Types and Analysis

The construction of a building determines the type of smoke control system that will be the most relevant in it because the effectiveness of control depends on the organization of space.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1721

Amazon’s AI-Powered Home Robots

The objective of the present plan is to provide a comprehensive analysis and evaluation of the introduction of AI-powered home robots as Amazon's next disruptive customer product.
  • Subjects: Robotics
  • Pages: 11
  • Words: 3033

Sony’s Response to North Korea’s Cyberattack

Therefore, while the terrorists used cyberattacks to steal the company's information and destroy their equipment, Sony switched the release to on-demand platforms and streaming services, allowing a speedy and widespread release of the film.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 574

Sampling Resolution and Quantization

The spatial resolution of a digitized image is affected by the sampling rate, whereas the amount of grey levels in a digital snapshot is controlled by the quantization level.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 565

Characteristics of Robotics

What concerns the elaboration of an obstacle course in a "real-world" simulation, it is essential to ensure the presence of several procedure testing steps that will determine the functionality of a robot. What concerns the [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 917

The Concept and Underlying Science of Hyperloop

The representatives of the two firms argued that there was a great possibility of implementing the Hyperloop in the Middle East or Asia because of the increased need for fast and efficient transport and reduced [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2035

Discussion of Cybercrimes in Modern World

The relevance of cybercrime research is dictated by the fact that it is challenging to ensure the complete safety of data on the Internet.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1447

Hackers: The Good, the Bad and the Gray

They are the most familiar with the latest methods of Black Hat hacking, thus making it possible to prevent attempts and reinforce security.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1146

Fire Incidents: The Role of Extinguishers

Opening of the hatch, lack of fire safety skills, delayed reporting of the incident and acceleration of the ship to full speed were the main factors that contributed to the spreading of the fire.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1172

Data Mining and Its Major Advantages

Thus, it is possible to conclude that data mining is a convenient and effective way of processing information, which has many advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 290

Facial Recognition Technology Lab Report

The implantation of a chip in video cameras to identify the face of the shown participant is actively used for national security purposes of the state, in the agricultural sector, and in the front camera [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 588

The Usage of VR Technologies in Football

In sports, VR is on its way to becoming one of the essential tools for a sports organization that aims to acquire a competitive advantage.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 562

Database Systems & Open Sourcing

It is prudent to mention that although the open distribution offers the source cord of a product for access by the public.
  • Subjects: Data
  • Pages: 3
  • Words: 966

Reproductive Technologies: Ways of Regulation

For instance, through the use of in-vitro fertilisation IVF, assistance has now been given to those who have problems in conception; also the use of PDGs prevents conception of severely abnormal children.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1572

Establishing a SOCC: The Best Practices to Follow

The role of the Security Operation Center is to prevent, detect, and respond to cybersecurity threats. The first practice that should be implemented at Sifers-Grayson is the establishment of a system for data extraction and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

The Problem of the Identity Theft

Identity theft is a unique problem that is presently affecting the experiences and goals of many individuals in different parts of the world.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1377

Legal Driving Age Policy in the United States

In the following paper, the issue of changing the legal driving age in the United Stated in order to raise the level of safety on the roads will be examined.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1648

CAQDAS: Software Programs Analysis

This paper provides concrete advantages and disadvantages of using qualitative software programs in general (CAQDAS).
  • Subjects: Applications
  • Pages: 10
  • Words: 2848

Office Kitchen Hazards Identification and Control

Since kitchen hazard is the issue at hand, it is crucial to know what are the common accidents. Kitchen hazards are not just food – appliances and hygiene are highly important.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 1326

Hyperloop Case Study

The concept of a relatively new technology named Hyperloop is expected to change the way we view transportation. It is not a jetpack but rather a sort of high-speed train.
  • Subjects: Other Technology
  • Pages: 20
  • Words: 3691

Network Security: Why Is It Important?

Network safety, regardless of the company size, is one of the most important things to remember when operating over the Web, local area network or other technologies.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 656

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Subjects: Internet
  • Pages: 4
  • Words: 1285

Network Reconnaissance Using Command Line

The command enters works through the interactive mode when no arguments are stated, or when the in itial argument is a - and the following argument is the server's internet address name or the host [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2247

Compound Bows: Term Definition

Archery: this is the art shooting arrows using a compound bow Cam: this is the pulley of a compound bow The intention of this document is to offer archers with relevant information about compound [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1114

Stress-Strain Relation of Stainless Steel After Exposure to Fire

To study the behavior of stainless steel at elevated temperatures, the material data of the steel obtained through testing is important.ca Steady-state tensile tests and transient-state procedures determine the stress-strain relationships of stainless steel at [...]
  • Subjects: Engineering
  • Pages: 15
  • Words: 4453

Failure Modes and Effect Analysis (FMEA)

Planning risks are the risks associated with the activities and processes of the planning stage of a project. In addition the components of the system are to be tested together and not in groups.
  • Subjects: Programming
  • Pages: 12
  • Words: 3373

Association of Computing Machinery (ACM)

This is mainly because the field is wide and hosts millions of professionals, researchers, as well as educators that strive to improve scientific computing. The main aim of this association is to promote computing as [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 990

Small Billing Business Network Design

This proposal is about the design of a network for a small billing business. After a thorough discussion with the small billing business the following needs were identified: Workstations: 2 pieces A quality printer: 1 [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 975

The Trebuchet Project Analysis

It is important to note that the number of parts to be replaced is limited to one in the period of the completion and part that are replaced should have the same technical specifications as [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1154

Personal Computer Evolution Overview

It is important to note that the first evolution of a personal computer occurred in the first century. This is because of the slowness of the mainframe computers to process information and deliver the output.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2972

The Hyatt Regency Hotel Walkway Collapse

On collapse, the 2nd and 4th floor walkways feel into the floor of the atrium. Collection of samples for failure analysis, therefore involved debris from areas related to the hanger rod connections.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1644

Simulation of a Direct Detection Optical Fiber System

Meanwhile, the report will be discussing the procedures initiated during integration processes that includes the device parameters and stating all components required to make the device. Below are the procedures and the components used in [...]
  • Subjects: Programming
  • Pages: 7
  • Words: 1928

Software Engineering: Data Modelling and Design

It may be physical e.g.a toy car representing a real car or it can be conceptual, only represented on paper to bring a good description of the operation of the real object."A data model is [...]
  • Subjects: Programming
  • Pages: 10
  • Words: 1210

Concepts of Technology: Good or Bad

Since the advent of industrial revolution, technological innovations have been the primary determinant of the quality of life, a fact that every individuals can attest, because of the human dependence on technology in everything they [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1182

Open Search Standard in Windows

A standard definition for OpenSearch as given by its website, opensearch.org, says that "OpenSearch is a collection of simple formats for the sharing of search results".
  • Subjects: Data
  • Pages: 6
  • Words: 1432

Application of Pneumatics and Hydraulics

The use of these systems results in much less complicated systems as parts like gears and cams are eliminated and fluids used in the transmission of power instead of solid parts.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1673

Qantas Airways: Cross Culture and Safety Management

The latest development in the field is relevant to cross-cultural issues and their impact on safety which still requires further study and appropriate application in the airline industry as merger and acquisition of airlines is [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3740

Building a PC, Computer Structure

The choices available are Western Digital 320GB and Seagate 320GB and my advice would be to go for Western Digital as it is a good performer all along.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 910

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

Computer Problems

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1056

Telecommunications Design Project: From 1G to 3G

The initial activity for this communication system is the installation of a suitable number of base stations to be put up into operation to form a network The report covers the different aspects in location [...]
  • Subjects: Other Technology
  • Pages: 27
  • Words: 7185

Hot-Mix Asphalt and Portland Cement Concrete

The purpose of this paper is to compare and contrast the two materials based on their properties, requirements, production, and the use in road construction.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 639

Control Philosophy. Variable Speed Drives

The second one is the management and provision of adequate and stable pressure connected to all the identified stakeholders in the project.
  • Subjects: Engineering
  • Pages: 1
  • Words: 396

Screen Readers’ Evolution and Their Current Usability

The study results constitute a linear account of the instruments, technologies, and events that caused the advance of assistive technologies and screen readers specifically, outlining their history.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2091

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

Factors that Affect Control Valve Pressure Drop

Moreover, the pressure drop in a fluid that goes through a control valve is subject to numerous factors, relating to the design of aperture, type of fluid, piping system of fluid, temperature, and pressure.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1174

Cyberbullying and the First Amendment

Under the geographical approach, the defendant can argue that since the event in question occurs online and outside of school property, it is covered by the First Amendment and the school has "no authority to [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 593

History of Radio and Guglielmo Marconi

Marconi demonstrated the usability of the radio for military and naval purposes and launched the company to develop and distribute radio communication services and equipment.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 336

Agricultural Sector: The Use of Drones

Thompson states that the application of drones in agriculture, specifically in the United Kingdom, can promote the enhancement of the crops and reduce the usage of pesticides.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 666

Cisco Packet Tracer: A Simulation Tool

The administration usage of the computers is represented by A. 255 as the address range of F Administration = 176.16.1.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 1326

The Effects of Technology on Our Life

First, to demonstrate how technology has taken up the role of directing people's actions, she uses the example of the balloon that appears at the right bottom side of the computer.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 874

History of the Personal Computer: From 1804 to Nowadays

The Analytical engine was a far more sophisticated general purpose computing device which included five of the key components that performed the basic of modern computers. A processor/Calculator/Mill-this is where all the calculations were performed.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1346

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Mobile Texting and Chatting Negative Effects

Linguists and communication experts often argue that close to ninety percent of one's conversation is not what is said it is actually how one says it and the body language that the person uses.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1313

“The Real Transformers” by Robin Marantz Henig

The addition of "Real" in the title clearly indicates the theme of the article, in which the gap between the progress in the fields of robots and science fiction predictions casts doubt on whether we [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 572

Human Mind Simply: A Biological Computer

When contemplating the man-like intelligence of machines, the computer immediately comes to mind but how does the amind' of such a machine compare to the mind of man?
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 974

Nintendo Gameboy: Technological Advancement

Nintendo has made lots of variation in the original game boy this includes the Game boy pocket which is 30% smaller than the original game boy with equal size screen, the Game boy color it [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1243

Routing Protocols: RIP, EIGRP, and OSPF

The scope of the current project entails the use of interior protocols such as RIP, EIGRP, and OSPF. One is Distance-vector routing and the other is Link-state routing.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

The Concept of Digital Divide in Society

The main issues that are discussed here is: The difference between the people who use internet and those who do not, the rights to computer, and the digital divide between men and women.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 1037

Yahoo Inc.: Competing on the Edge

Internet based companies have increased over the last decade as facilitated by the invention of the World Wide Web and the internet.
  • Subjects: Internet
  • Pages: 7
  • Words: 2070

Warehouse Safety and Occupational Health

Materials/goods should be well placed on the forks and lifted correctly to avoid slipping and falling on people. Forklift should be driven slowly and both the fork and the loads should be kept low while [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1174

Mobile Phones and True Communication

This problem led to the invention of mobile phones which foster true communication in the following aspects. The radio enhances communication because one is capable to get world news despite the compactness of the phone.
  • Subjects: Phones
  • Pages: 2
  • Words: 560

Introduction to Biotechnology and Its Elements

The impacts of biotechnology on life are tremendous and now this industry is becoming the essential one in our daily life. The biotechnology industry is regulated by the US Food and Drug Administration, the Environmental [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1095

Open Technology. Marshall Poe’s The Hive Article

For instance, in training their leaders and the staff, you find that these people are in a position to learn online through the use of the internet and this has helped these organizations to reduce [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1297

Do Video Games Cause Violence?

Those in favor of violent video games contend that fantasy and violence are integral parts of our life, which we tend to manifest in the form of storytelling.
  • 5
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 652

The Social Implications of the Blackberry Technology

The uniqueness of the Blackberry in relation to the PDA phones is its ability to deliver e-mails in real-time. The introduction of the blackberry, as it is with new communication technology, has numerous impacts on [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1231

Media Future and New Technology – Mobile Phone Culture

Contrasting the Internet, this has flickered panics of a "digital divide" flanked by the modern and the third world countries, as cell phones have become popular in the society, community or all over the planet.
  • Subjects: Technology Effect
  • Pages: 11
  • Words: 2996

Airbags’ History, Working Principles, Usefulness

Road traveling and road transportation are some of the oldest methods of road uses since the birth of technological era and the commencement of human civilization.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1889

Cybercrime and Its Legal and Practical Management

With the development of various programmes that significantly simplify the daily activities of the organisations and individuals, the issues of privacy and security became more spread.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2042

Effects of AI on the Accounting Profession

They aimed to find out how AI affects the performance of accounting professionals, investigate whether there have there been changes in employee attitudes toward AI, explore factors that could influence changes in the attitudes of [...]
  • Subjects: AI
  • Pages: 60
  • Words: 17991

Secondary and Primary Data Collection Methods

Carvajal, Maucec and Cullick argue that the industry of the oil and gas is the world's largest sector in terms of dollar value. The aim of the research is to investigate how digital transformation has [...]
  • Subjects: Other Technology
  • Pages: 60
  • Words: 15625

Technological Revolutions and Social Challenges

With the invention of new ways of production, communication, transportation, and medicine, society had to adapt in order to respond not only to the benefits but also to various challenges posed by the invention of [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2019

Threats of the Internet

Such digital giants as Google and Amazon have access to all the personal and behavioral information that we share on the net, and though they claim to use for our benefit, the algorithms of the [...]
  • 5
  • Subjects: Internet
  • Pages: 3
  • Words: 864