Tech & Engineering Essay Examples and Topics. Page 7

4,325 samples

IPhone Product Life Cycle Analysis

The product life cycle is one of the most crucial methods describing the processes of development, introduction, growth, maturity, and decline of a product.
  • Subjects: Phones
  • Pages: 2
  • Words: 557

Agricultural Sector: The Use of Drones

Thompson states that the application of drones in agriculture, specifically in the United Kingdom, can promote the enhancement of the crops and reduce the usage of pesticides.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 666

Main Challenges of Medical Technology Startups

Further, in the second part, the author draws attention to misunderstandings between developers of startups in the field of medical technology and representatives of public medical institutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 631

The Role of Digital Technologies in Education

The interactive Mother's Day card and the story of a 13-year-old boy convey the idea of the importance of technology for an individual's development.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 937

Materials Comparison About Packaging

Although the forests are cut down to manufacture paper-based containers, they are recyclable, and compared to wood, paper's recycling rate is the highest among recyclable materials, so it is more friendly to the environment than [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1124

Coding and Data Analysis Process

The concept of pre-coding in qualitative data analysis has been highly focused in recent days. It is worth noting that pre-coding in qualitative data analysis enables the use of computers for tabulating and analyzing data.
  • Subjects: Programming
  • Pages: 3
  • Words: 690

Weaknesses and Strengths of Apple iPad

The device has been designed to accommodate all applications, which run on previous editions of the device, including the iPhone. A threat to the advancement of this device is the lack of adequate distribution channels.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 866

Technological Facilities: Computers in Education

The researcher chooses the students who study in the high school stage to investigate the issue of computer usage in high schools Physics classrooms in Saudi Arabia because different computer software is highly beneficial for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 842

Safari, Google Chrome, iPad – SWOT Analysis

The preceding edition of Safari for Windows noticeably altered the nature of the browser from something of an incomplete curiosity to a substitute with critically quick chops. The investment has now extended to include the [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1379

Analysis and Interpretation of Text and Image

Text analysis in this discourse will focus on critically examining and analyzing the language structure in the document to identify the communication function of the discourse.
  • Subjects: Applications
  • Pages: 12
  • Words: 3352

Malware: Code Red Computer Worm

The worm used the vulnerability by running a long string of the repeated character 'N' to get entry to the computer.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 840

Cell Phones While Driving: Is It Legal?

The message conveyed over the phone takes priority and driving takes a back seat which inevitably results in an accident, the severity of the same depends on more factors than one, the most important of [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 994

Relevance of Technology in Schools

But this rapid advancement in technology has created problems in understanding and adjusting for the laypersons in the society. The point that should be focused on is to use this available technology effectively so that [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 852

Warehouse Safety and Occupational Health

Materials/goods should be well placed on the forks and lifted correctly to avoid slipping and falling on people. Forklift should be driven slowly and both the fork and the loads should be kept low while [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1174

Aviation and Aerospace Future Technology

Aerospace refers to the earth's atmosphere and the space beyond it. Technology in both aviation and aerospace has proved to be of great advantage to mankind over the years.
  • Subjects: Aviation
  • Pages: 2
  • Words: 716

Use and Benefit of Computer Analysis

The introduction of computers, therefore, has improved the level of service delivery and thus enhances convenience and comfort. Another benefit accruing from the introduction of computers is the ability of the world to manage networks [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 550

The Internet: Arguments Against and for It

The internet has brought a lot of changes to the information industry. This is because there are a number of deficiencies found on the net that leave it wanting.
  • Subjects: Internet
  • Pages: 3
  • Words: 636

Electrical and Civil Engineering Analysis

Sakae M Light rail is a modern concept that is versatile in nature and it fits perfectly in the engineering visions of a bus and the heavy metro.
  • 1
  • Subjects: Engineering
  • Pages: 7
  • Words: 1740

Effects of AI on the Accounting Profession

They aimed to find out how AI affects the performance of accounting professionals, investigate whether there have there been changes in employee attitudes toward AI, explore factors that could influence changes in the attitudes of [...]
  • Subjects: AI
  • Pages: 60
  • Words: 17991

Technophobes and Their Fear of Technology

Technophobes assume that they will whether be laid off by the company or will have to commit to continuous learning, which to many people, is a big challenge on its own.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 432

Information Security Concepts and Policies

In addition, she argues that there has been an increase in the complexity of computers attached to these large networks; therefore, this has become a serious challenge because it is not easy to analyze, secure, [...]
  • Subjects: Computer Security
  • Pages: 20
  • Words: 336

Information About Network Devices

A solid router capable of managing the network of a small business, in case the four ports it is equipped with will be enough.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 560

Moleskine Social Data Analysis

The Facebook data includes engagement statistics, Moleskine's posts, users' posts about the brand, and comments by both users and the company. The uniqueness of this information is in the disclosure of the way Moleskine communicates [...]
  • Subjects: Data
  • Pages: 3
  • Words: 500

Contextual Factors in Engineering

In the area of Knowledge and Skill Base, it is important to determine for the analysis such competence as "Knowledge of contextual factors impacting the engineering discipline"; and in the area of Professional and Personal [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 502

Digital X-Rays: Recent Development in Radiography

The developments in digital x-ray technology have mostly taken place in digital detection technology, where images are created, scanned, archived, or stored in digital archives to allow for the easy retrieval of the images.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1456

Computer-Based Systems Effective Implementation

Under this methodology, there is a provision that gives attention to the needs of the people involved in the organization about the demands of the technology.
  • Subjects: Computer Science
  • Pages: 31
  • Words: 1241

The “Smart City” Concept

Such end users are the Dubuque authorities that receive valuable data as the decision makers and the responsible citizens of the city as the evaluators of the impact the project has on their life in [...]
  • Subjects: Technology Effect
  • Pages: 12
  • Words: 1940

Computer Technology in the Student Registration Process

The registration process became more efficient due to the reduction in the number of registration staff because they are only tasked with the transfer of the students' information to their respective departments.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 591

Computer Hardware Components and Functions

Hardware is the physical components of a computer, while the software is a collection of programs and related data to perform the computers desired function.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 251

Fire Department Strategic Plan and Analysis

Become the best fire organization by providing advanced services and training personnel to ensure they deliver quality and timely services by use of the available resources.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1144

The Modern Aviation Industry and Its Threats

However, the creation of a new digitalized environment can result in the appearance of new vulnerabilities due to the nature of the software and technologies used in airports to organize their functioning and guarantee appropriate [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 3205

Concept of the Network Virtualization

Network virtualization is characterized by the capacity to make consistent, virtual systems that are decoupled from the core system equipment to guarantee the network can incorporate and support progressively virtual situations.
  • Subjects: Programming
  • Pages: 12
  • Words: 3368

The Challenger Space Shuttle Disaster

The case of the space shuttle Challenger is, probably, one of the biggest disasters in the history of American space exploration.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1104

Dubai Technological Advancement: the Smart City

The city of Dubai is the capital of the Emirate of Dubai and the largest city in the UAE. According to Salem, the readiness of society and the government to embrace technology is a vital [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1913

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1445

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Spot Mini Robot by Boston Dynamics

While the bigger robots by Boston Dynamics are designed to operate in extreme conditions, Spot Mini is a household robot, which makes it marketable to a wider community and, therefore, profitable.
  • Subjects: Robotics
  • Pages: 2
  • Words: 551

TransAsia Airways Flight 235 Accident

The purpose of this paper is to review the Flight 235 accident, as well as to analyze the causes of its origin and the importance of the human factor, which made a critical contribution to [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2171

Television, Its Invention and Technical Evolution

The history of television involves the contribution of several engineers from different parts of the world. This paper seeks to explore the technical evolution of the television from its invention to the current developments.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1099

Computer Viruses, Their Types and Prevention

A memory-resident virus is one of the most resilient types of viruses out there since it resides in the RAM of the computer and comes out of stasis every time the computer's OS is activated.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1108

Graphic Card Industry and Evolution

A graphic card, usually, referred to as a video card or a graphic accelerator card is an electronic circuit installed on the motherboard inside the central power unit, mostly on Laptops and desktop computers.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2193

CCD Camera vs Tube Camera Comparison

In reality, the camera did not change positions in the scene; this effect is the result of the editing done so that a viewer could comprehend the film.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1324

Wireless Networks’ Historical Development

The paper concludes by describing the implications of wireless networks for different emergency agencies and the police. The history of wireless networks is "founded on the development of the first wireless telegraph".
  • Subjects: Internet
  • Pages: 8
  • Words: 2276

Heinrich’s Domino Safety Theory

In other cases, some employers tend to ignore the safety needs of their employees by providing unsafe working conditions, which eventually contribute to accidents within the workplace.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 298

Space Shuttle Challenger’s Explosion Factors

A fault tree analysis can be used to identify and examine the major factors that led to the failure of the O-rings in the Solid Rocket Boosters. The failure of the O-rings led to the [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 836

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1162

Emergency Response Planning in the Airline Industry

The goal of this paper is to provide information about the concepts surrounding this issue and to look into the impact of emergency response on the reputation of an airline and legitimacy based on real-life [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 3558

The Role of Social Media in Aviation Crisis Management

Therefore, this paper considers the general role that social media might play in a crisis or emergency in the airline industry and describes methods that could be used to deal with the potential adverse outcomes [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 3603

Secure Software Development Life Cycle

Then there was a challenge response model according to which the system sent the user a challenge in the form of randomized character string, and the user responded with a computational value based on the [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2242

How Technology Has Destroyed Jobs in Our World Today?

As pointed out by Rotman, the same technology that is apparently making work easier and helping to increase the level of productivity in business enterprises is responsible for killing jobs and getting rid of humans [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 850

Airline Scheduling and Planning Factors

The schedule planners seek to provide the best service to the public while maintaining a stable financial position for the airline.
  • Subjects: Aviation
  • Pages: 2
  • Words: 670

Microsoft SharePoint as a Private Cloud App

The SharePoint allocation has the capability of efficiently replacing the sandbox and farm solutions thus, guaranteeing satisfaction to the administrators, users, and third-party application experts. In terms of the users' recompense, the SharePoint application enables [...]
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 602

Mobile Internet Consumption and Challenges

The advent of the mobile Internet is directly related to the development of mobile technologies. GPRS functioned on the principle similar to the ordinary Internet: the data was divided into packets and sent to the [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 647

ISURVEY, Dub Interviewer, Voxco Online Software

The present paper undertakes a comparative analysis of three such data collection software namely iSURVEY, Dub Interviewer, and Voxco Online.iSURVEY is the versatile and reliable data collection software that supports unlimited devices and can be [...]
  • Subjects: Data
  • Pages: 3
  • Words: 895

Internet Evolution and Structure

The creation of the network was meant to be a security measure to ensure that data and information belonging to ARPA remained within the system.
  • Subjects: Internet
  • Pages: 5
  • Words: 1406

Welding Underwater – Engineering

On the other hand, wet welding uses a system that allows a welder to weld an area that is in a wet environment. The use of under-sea robots is an emerging approach in under-sea welding.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1098

Components and Aspects of Whistleblowing in Engineering

The purpose of this paper is to explore components of whistleblowing in engineering through case studies of notable cases in various fields and professions, including cases of Michael DeKort, Franz Gayl, and Diane Hartley.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4292

VPN Security Vulnerabilities

The functionality, security protocols, and management policies of the network facilitate the safe and secure dissemination of information among users. It facilitates the creation of a virtual dialup private network that connects users to other [...]
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2283

Internet Piracy and SOPA Act

At the end of it all, internet piracy will hurt the same people who are profiting from it because they will have fewer materials to sell or distribute in the future.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 559

Integrating Educational Technology into Teaching

Educational technology is a process that consists of researching and practicing things which can make the process of learning easier, and the performance of students better.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 712

Protection: Housekeeper Safety and Injury Prevention

This paper has established that the duty to reduce injuries and increase safety in housekeeping is a shared responsibility between individual housekeepers and their employers.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2750

Google Docs Challenges and Opportunities

In this paper, I will discuss the Google Docs as a one of the prominent tools for collaboration, and try to present the challenges that are faced in its implementation, and how they are overcome.
  • Subjects: Applications
  • Pages: 5
  • Words: 1483

Addressing Information Technology Access Challenges for Students

The main purpose of the proposed study is to critically evaluate viable ways modern distance teaching universities can employ to deal with the challenge of lack of access to information and communication technologies that are [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2269

Cloud Computing and Virtualization Technologies

Through cloud computing, the organization is in a position to access complex applications and enormous computing sources through the internet. Through cloud computing and virtualization technologies, the organization is likely to benefit from economies of [...]
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1109

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1864

DATA and Information Security

According to Smyth, the consequences related to the loss of data that was in the custody of the organization demonstrate the vulnerability of the organization's information systems.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 604

Cyber Theft and Its Consequences

This research paper will address the usage of internet and how internet theft has continued to thrive as the technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3150

Mobile Technology Advancements

This wide range of customer requirements underpins the fact that mobile system based users require a high level of availability to access IT and IS systems.
  • Subjects: Phones
  • Pages: 7
  • Words: 1977

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2970

The Internet Radio: A Critical Discussion

Through a critical examination of the concept of Internet Radio, the current paper will seek to extrapolate how users of the medium can create and place content over the internet and how users can use [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 982

Assistive Technology Outcomes and Benefits

In addition, the improvement in technology has resulted in devices and equipments that can assist the disabled to access facilities and services that other people can access.
  • Subjects: Applications
  • Pages: 8
  • Words: 2336

Impact of New Forms of Technology on Our Understanding of Pornography

This paper therefore shows that technology has completely changed concepts of the production of pornographic material, the distribution of pornographic material, access to pornographic material and our understanding of the concepts of privacy and identity.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2276

Solar Energy in the United Arab Emirates

The success of the solar power initiatives in the UAE is largely attributed to the wide range of financial incentives that the UAE government has offered to the companies that are prepared to advance the [...]
  • 5
  • Subjects: Engineering
  • Pages: 5
  • Words: 1352

Safety Engineering

The importance of safety culture and management To achieve safety goals, any organization is to be familiar with safety culture. Safety engineering is really the important science as it gives the students the opportunity to [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1665

Communication Technologies in Egypt

Significant technologies as developed with respect to two Egyptian revolutions, one in the year 1952 and the other in the year 2011 are discussed in line with the roles that these communication technologies played in [...]
  • Subjects: Phones
  • Pages: 12
  • Words: 3349

Globalization and Digitalization

The tools that are necessary in the technological exodus from the traditional mode to higher fashions have posed a challenge in the labor force in relation to the level of expertise.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Analysis of Sony PS3

As a gaming console the PS3 promised, and subsequently delivered, games which would literally astound gamers with the depth of the graphics and the greater degree of in-game features not present in the previous generation [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 592

Internet Files Sharing

The tutor and the student are now able to communicate and exchange file over the internet in form of lessons, instructions, and assignments online.
  • Subjects: Internet
  • Pages: 4
  • Words: 1079

Information Retrieval Methods

The search mechanism is the system that allows for the searching of the database for the retrieval of the information stored in it.
  • 4
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2493

The Mobile Phone as an Electronic Wallet

Based on this it is possible to conclude that the penetration of mobile phones within the Abu Dhabi area is very widespread given that it is the largest of the emirates.
  • Subjects: Phones
  • Pages: 6
  • Words: 1772

Tablet Computer Technology

It weighs less than 500g and operates on the technology of AMOLED display with a resolution of WVGA 800 480 and a detachable input pen.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 540

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 780

Smart Grid Technology

The most common application of smart grid technology is in electricity distribution. In conclusion, smart grid technology has changed the way power is generated and transmitted.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Fire sprinkler system

Objectives Ascertain the history of fire sprinkler system Portray the role of fire sprinkler system Establish the recommendations for improvement of fire sprinkler system Significance of Study This study is significant in identifying the growth [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3314

Normative Ethics and the Right to Privacy

Recent advances in technologies have prompted a new consideration of e-mail, use of e-mail, and its relation to ethics. From the deontological perspective, the court's decision to give Ellsworth's parents legal access to his e-mail [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 892

Preparation of Correspondences by Typewriters and Computers

On the other hand, the computer relies on software program to generate the words encoded by the computer user. The typewriter user has to press the keys of the typewriter with more force compared to [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 891

Hacking: Positive and Negative Perception

The possible advantage of cooperating with hackers for security systems mangers of international organizations and governmental organizations is the probability to recruit them and use their knowledge to empower different organizations to improve their security [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 538

Design a helper

Therefore, personal robots in addition to making life easier should be able to perceive and understand the surroundings. However, robots are a source of worry in the future as they can be risky to humans.
  • Subjects: Robotics
  • Pages: 4
  • Words: 1091

Sample of Chart or Graph

While the stacked bar chart is very helpful in understanding the overall votes by respondents as well how many considered each focus area as critical or high, it does not give an idea of the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 559

Pros and Cons of Information Technology

Some of the disadvantages of the improved technology include new forms of pollution that are as a result of the gadgets used to access the resource.
  • Subjects: Internet
  • Pages: 2
  • Words: 609

Business Intelligence Approaches

Business intelligence is a term used to refer to a collection of applications that aim at keeping and making available a data bank in a certain industry or organization; the bank is referred to when [...]
  • Subjects: Data
  • Pages: 2
  • Words: 629

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Subjects: Internet
  • Pages: 3
  • Words: 832

The Smart Cities Technologies: Key Benefits

As the transportation manager of a city, I will not invest heavily in driverless vehicles, but focus more on green mobility and automated logistics in restricted locations such as ports.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 294