Tech & Engineering Essay Examples and Topics. Page 7

4,333 samples

Internet of Things for Home: Benefits and Challenges

The IoT can be characterized as the unification of the virtual and real worlds with the help of many devices and sensors connected to the same network and providing interaction between machines and people.
  • Subjects: Internet
  • Pages: 10
  • Words: 2771

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

Transition From Analog to Digital World

However, one should understand that this state of affairs has not always been the same, and the analog world preceded the digital one.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 279

Software Piracy and Its Impact on Society

Two, the absence of warranties with the pirated software means they are exposed to increased security risks with the software containing viruses and associated malware that affect computers.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 283

Trends in Embedded Systems

The area of embedded systems has received massive development because of emerging platforms dependent on computers and embedded systems for controlling and monitoring all matters autonomously. The evolution of IoT has occurred due to the [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1680

Ethical Issues of the Information Age

Accuracy refers to the accountability for errors in information and the subsequent choice of the person to blame. Property deals with the question of ownership of information and the means of its transmission.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 298

Mechanical and Electrical Engineering Branches

It is mainly characterized by the deepening of the specialization of production and the expansion of its scale."Small" metallurgy should be added to the listed divisions of mechanical engineering.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1436

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

The Near-Miss Marine Reporting Fails

The overall effectiveness of the thesis and the article is high, as the author talks in detail about the existing problems in the topic he is covering.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 298

The Digital Workplace Transformation Issues

In this research, it is important to emphasize the significance of the digitalization of the present workspace and all the consequences, challenges, and obstacles that are associated with them.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1172

Discord Server as Online Public Space

Interestingly, both types of relationships are natural to Discord because it has many functions, and there is possible to create many channels with the same people, so different parts of a project can be separated [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 324

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Tracking: More Advantages Than Disadvantages?

In this case, tracking helps the authorities to identify the exact location of criminals and apprehend them. This is because criminals might track the location and behavior of a person they intend to harm.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 293

Airport Planning and Management

This paper discusses the issues of airport capacity and delay and the related causes. Lack of capacity is a term commonly used to refer to the cause of the airport delay.
  • Subjects: Aviation
  • Pages: 3
  • Words: 920

Data Mining and Its Major Advantages

Thus, it is possible to conclude that data mining is a convenient and effective way of processing information, which has many advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 290

Object-oriented Programming. Java and C++ Programming

Besides, software engineers are required to understand the languages that are suitable for object orientation since not all languages can implement the OO programming concepts. In other words, classes are used to implement the concept [...]
  • Subjects: Programming
  • Pages: 4
  • Words: 1227

Management Information Systems (MIS)

The advances in the evolution of devices and the achievement of a new stage of development critically impacts MIS and creates the basis for the emergence of multiple changes towards the achievement of better outcomes [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 573

Malware and Social Engineering Attacks

Social engineering attacks date back to the advent of the Internet, and before that, criminals were using the telephone to masquerade as trusted agents to obtain information.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1226

Samsung NX1000: Digital Camera Overview

The NX1000 is relatively small in size. This makes them it convenient for travelling. It has Light and darkness sensor features.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 363

How Computer Works?

In order for a computer to function, stuff such as data or programs have to be put through the necessary hardware, where they would be processed to produce the required output.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 891

Office Kitchen Hazards Identification and Control

Since kitchen hazard is the issue at hand, it is crucial to know what are the common accidents. Kitchen hazards are not just food – appliances and hygiene are highly important.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 1326

VMware Server Virtualization Solution

This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
  • Subjects: Computer Science
  • Pages: 45
  • Words: 13587

Health and Environment: The Impact of Technology

This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
  • Subjects: Technology Effect
  • Pages: 20
  • Words: 5816

Computer Network: Data Flow and Protocol Layering

The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

Fire Protection Review Plan

For the firefighting process to be effective, firefighting equipments should be given to the community members to use them in case of a fire outbreak.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 962

What Is an Algorithm and How Does It Works

Bayesian network is a network structure of a directed acyclic graph of a set of variables and it represents a probability distribution of the variables in a given set of data.
  • Subjects: Programming
  • Pages: 2
  • Words: 718

Use of Seatbelt While Driving

The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1038

Cybercrime and Its Impact in the GCC Region

The introduction of the information and communication technologies nowadays offers a great range of advantages for the society, especially for the financial sector.
  • Subjects: Cyber Security
  • Pages: 20
  • Words: 5268

Wi-Fi and LAN Technologies: Data Communication Lab

The units were TCP/IP LAN technology, advanced LAN technology, rack server module, wireless LAN technology, copper tool kit, protocol analyser, and network analyser. The notes indicated how the units were configured in real LAN networks.
  • Subjects: Data
  • Pages: 4
  • Words: 1113

Small Billing Business Network Design

This proposal is about the design of a network for a small billing business. After a thorough discussion with the small billing business the following needs were identified: Workstations: 2 pieces A quality printer: 1 [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 975

Aircraft Crash and Emergency Management: Flight UA232

There was no indication of any type of problem that could have warned the pilots of the impending disaster that would force them to crash-land the DC-10 that carried 285 passengers and eleven crew members.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2038

Dependability of Computer Systems

In the dependability on computer systems, reliability architects rely a great deal on statistics, probability and the theory of reliability. The purpose of reliability in computer dependability is to come up with a reliability requirement [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3384

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2967

The John F. Kennedy International Airport

The airport links the United States with the rest of the world being the main entry and exit point from the U.S.the JKF airport got its name from the 35th U.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1304

Cyber Crimes: Court – United States vs. Ancheta

Reasoning: The jury argued that the defendant conspired to violate the Computer Fraud Abuse Act as well as the CAN-SPAM Act, caused havoc to computer networks of the national defense department of the federal government, [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 548

Daily Workouts App Evaluation

I will be discussing the free version in terms of the features which it has to offer, the functions of the app, and its overall convenience.
  • Subjects: Applications
  • Pages: 3
  • Words: 873

The Rise & Fall of the Concorde

An investigation into the cause of the 2000 Concorde crash was crucial not only to the aviation industry but also to the assurance of the safety of future users of the aircraft.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1157

Automation and the Future of Jobs

The suggested paper offers the analysis of two different opinions on the issue presented by Autor and Rotman in their articles, discussion of their arguments, and reflection on the future of people in the age [...]
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2776

Cyberbullying and the First Amendment

Under the geographical approach, the defendant can argue that since the event in question occurs online and outside of school property, it is covered by the First Amendment and the school has "no authority to [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 593

Data Visualization Software: The Case of Nike

This is why data visualization is a crucial business asset that may be used to realize the organization's full potential with the help of experts in the field and all the insights gained from the [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2301

The Influence of Robots and AI on Work Relationships

In the early 20th century, Taylor's work focused on production management and labor efficiency, which led to the attention of managers to the problems of selection, the motivation of employees, and their training.
  • Subjects: AI
  • Pages: 3
  • Words: 903

Research Tools Used by Computer Forensic Teams

Computer Forensics is a branch of digital forensics which is used in "identifying, preserving, recovering, analyzing and presenting facts and opinions about the information".
  • Subjects: Other Technology
  • Pages: 2
  • Words: 536

Network Infrastructure Upgrade: Selection Process

As one of the top management team members, I was involved in advertising a job for a suitable company to write a proposal report and present to us so that we could evaluate them and [...]
  • Subjects: Other Technology
  • Pages: 13
  • Words: 3501

Fire Incident and Emergency Services Reflection

As for the matters of the analysis, the context and the details of the incident will be analyzed from the perspective of possible impacts and consequences, and the scales of these consequences.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2474

Net Neutrality: Freedom of Internet Access

In the principle of Net neutrality, every entity is entitled access and interaction with other internet users at the same cost of access.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1239

Flight Physiology and Human Factors Principles

In the situation where a pilot breathes in the air at high altitudes, there is usually insufficient oxygen pressure to allow ample quantities of oxygen into the casing of the lungs.
  • Subjects: Aviation
  • Pages: 9
  • Words: 2485

Internet: Past and Present

Keeping in view the plethora of uses that the internet has been made to foster, the beginnings of the system emerge as somewhat of a startling revelation.
  • Subjects: Internet
  • Pages: 3
  • Words: 847

Computers: The History of Invention and Development

It is treated as a reliable machine able to process and store a large amount of data and help out in any situation."The storage, retrieval, and use of information are more important than ever" since [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1660

Routing Protocols: RIP, EIGRP, and OSPF

The scope of the current project entails the use of interior protocols such as RIP, EIGRP, and OSPF. One is Distance-vector routing and the other is Link-state routing.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Yahoo Inc.: Competing on the Edge

Internet based companies have increased over the last decade as facilitated by the invention of the World Wide Web and the internet.
  • Subjects: Internet
  • Pages: 7
  • Words: 2070

Development of Mobile Phones and the Future

The first commercial mobile phone network known as APA was launched in Finland in 1971 and in 1978, the Bell labs made an attempt to launch the first commercial cellular network.
  • Subjects: Phones
  • Pages: 3
  • Words: 906

Children’s Pastimes Today and Yesterday

Due to a lot of television time and the production of popular gadgets made for individual use and diversion, leaving the house for a quiet stroll in the park or a visit to a friend [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 613

How and Why to Cleaning Rifles

To keep the firearm in the best conditions, there are pre-requisites that the responsible gun owner needs to follow. Before cleaning starts, the gun owner must have the following cleaning impediments.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 576

The Social Implications of the Blackberry Technology

The uniqueness of the Blackberry in relation to the PDA phones is its ability to deliver e-mails in real-time. The introduction of the blackberry, as it is with new communication technology, has numerous impacts on [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1231

Digital Ethics and Privacy in Enterprises

For example, Clubb, Kirch, and Patwa name a number of privacy issues related to the Internet of Things, such as terms of use that force the user to agree without understanding the contents, the overall [...]
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2187

Beech King Air 200 Crash and Human Factors

For instance, throughout the approach of the localizer runway, the aircraft was actually five miles ahead of what the first officer and captain believed they were.
  • Subjects: Aviation
  • Pages: 2
  • Words: 594

Biofuel Trend in the Petroleum Engineering Sector

The use of such a resource is a modern trend in the industry under consideration, and its application in practice can be valuable from the point of view of the economy.
  • Subjects: Engineering
  • Pages: 3
  • Words: 836

Full Surface Fuel Fire at an Oil Refinery

It is important to establish the drainage of water from the fire and the removal of toxic substances to ensure the safety of the firefighting crew.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 941

Robotics. “Humans Need Not Apply” Video

Mechanical muscles are more strong and reliable than humans, and the replacement of people by mechanisms in physical work allows society to specialize in intellectual work, develop economics and raise the standards of living.
  • Subjects: Robotics
  • Pages: 1
  • Words: 304

Massive Open Online Courses

The introduction of MOOCs has changed the course of the development of VBL. The retention of users is one of the major challenges for MOOCs.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 586

Aviation Security at Regional and Global Levels

According to Earley and Mosakowski, the government has made deliberate steps to ensure that the economy is highly diversified to reduce overreliance on the oil and gas sector as the main driver of the economy.
  • Subjects: Aviation
  • Pages: 50
  • Words: 13802

Data Mining Techniques and Applications

The use of data mining to detect disturbances in the ecosystem can help to avert problems that are destructive to the environment and to society.
  • Subjects: Data
  • Pages: 2
  • Words: 758

Powered Exoskeleton in Military & Space Industries

The use of exoskeletons by the military will lead to a reduction in the need for heavy-lift machinery on the battlefield since the soldiers will be able to lift heavy objects with the help of [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 587

ATN Corporation’s Cloud Computing Mechanisms

The second mechanism expected to be a part of the described solution is the virtual server. Finally, the third mechanism likely to be leveraged as a part of the described solution is a cloud usage [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 828

Ship Unloaders and Belt-and-Bucket Elevators

These systems have an automatic sink-in device found in the HL-SKT as a component of the marine leg to ensure the best position when the unloader starts operations and, therefore, automatic unloading can be achieved [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1531

Science and Technology Impact on Globalization

Globalization has by now laid down the phase for this epoch through making the world interrelated further and the tools of empowerment available to all."To start with, Globalization refers to the trend toward countries joining [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 826

Avianca Flight 52 Accident and Its Reasons

However, at the same time, the pilots managed to reach their destination point and were ready to land, though dispatchers of the airport did not allow them to do it, not understanding or ignoring the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 839

Power Backups as a Solution to Outage Problem

Unless there is a solution to the situation, the project will be late. A technician will not be able to handle the outages alone, and thus, the problem will not be solved.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 848

Educational Technologies and Their Integration

The primary goals of technology include 1) orientation of the learners of the widespread of the educational technology; 2) information on how the educational technology can be used as the media opportunities of the teaching [...]
  • Subjects: Technology in Education
  • Pages: 13
  • Words: 3641

Electrical and Electronics Engineering Career

The main aim of the report is to enable the career consultants who will be acting as career advisors to be able to understand my career field and in the process, they will be able [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 621

Software Engineering Career Information

Software Engineering is a field in engineering that requires the practitioner to apply the principles of engineering in the design and development of software products.
  • Subjects: Engineering
  • Pages: 2
  • Words: 549

Physical Security Approaches in Aviation

However, the multi-layered security system the dominant approach to airport security is nowadays being criticised as consuming an excessive amount of money and resources; an alternative has been proposed in the form of a risk-based, [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3861

Fire Department Strategic Plan and Analysis

Become the best fire organization by providing advanced services and training personnel to ensure they deliver quality and timely services by use of the available resources.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1144

Information and Communication Technology in Learning

According to the results of the experiment during which the students had to work with an interactive board, the incorporation of ICT into the academic process allows students to acquire the needed abilities faster and [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1188

Environmental Pollution in the Petroleum Industry

At the same time, it threatens nature and creates many long-term issues related to pollution of air, soil, water, the weakening of the ozone layer, and the facilitation of the greenhouse gas effect.
  • Subjects: Engineering
  • Pages: 4
  • Words: 916

The Challenger Space Shuttle Disaster

The case of the space shuttle Challenger is, probably, one of the biggest disasters in the history of American space exploration.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1104

Information Visualization: Task by Data Type Taxonomy

In the Department of Tourism and Commerce Marketing, the way the TTT may be implemented at the individual, group, and organizational levels can be substantially defined by both the types of data used at those [...]
  • Subjects: Data
  • Pages: 10
  • Words: 2734

Information Security Management System: ISO 27001

According to the existing description of the standard, the process of facilitating a control over the data management processes in a company is crucial to the security of its members.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 868

Embedded Intelligence: Evolution and Future

The importance of mobility in the current business context has motivated the use of embedded technology to design systems. It is used in the management of energy systems such as production, distribution, and optimization.
  • Subjects: AI
  • Pages: 12
  • Words: 3653

Mechanical Engineering Education and Profession

This paper is aimed to prove that even though two years of technical studies is enough to work in the sphere of Mechanical engineering as a technician, it is not enough to prepare an efficient [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1176

Security and Logical Functions of Microsoft Excel

This consists of the cell which can be a text or value which identifies the information in the cell. IS" can be described as another function of the excel program that describes the nine functions [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 599

Short Message Service (Center) Technologies

The key objective of the current research is to learn about the peculiarities of the SMS and SMSC technologies and, after that, to be able to evaluate the quality of these services and propose the [...]
  • Subjects: Phones
  • Pages: 4
  • Words: 1191

Disney Resort Crisis Communication Plan

When dealing with an emergency, the head of crisis communication has to carefully follow a crisis communication plan. He or she will compile a list of key publics that have to be notified of the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1987

Mobile Applications’ Benefits and Challenges

The other factor to consider is the number of handsets obtainable for a mobile platform and their characteristics. Additionally, it also determines the type of mobile devices that can use the applications.
  • Subjects: Applications
  • Pages: 6
  • Words: 1646

State Farm: Dangerous Intersections Study

The Dangerous Intersection gives a report of the accidents caused by intersections and makes an effort to prevent further loss through improvement of safety intersection in the United States. Gross misconduct of the driver and [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 457

Testing Approaches and Change Management Process

There are several integration testing levels: Component Integration Testing checks the interaction between the system components after their testing. System Integration Testing checks the interaction between different systems after the system testing.
  • Subjects: Programming
  • Pages: 3
  • Words: 845