Tech & Engineering Essay Examples and Topics. Page 7

4,441 samples

Bluetooth Technology in Your Life

Bluetooth Smart Ready mechanisms are the gadgets receiving information sent from the conventional Bluetooth and Bluetooth Smart gadgets and passing it to the applications, which make use of those data.
  • Subjects: Internet
  • Pages: 9
  • Words: 2518

General Aviation Security Liabilities

Presently, the increase in the number of attacks on airports and airlines due to poor maintenance and negligence is a serious concern to a number of stakeholders.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2310

“The Most Human Human” by Brian Christian

In the introduction, the author outlines the genesis of his choice of the book's title by discussing the origin of the term, 'the most human.' Therefore, the introductory chapter gives the reader a strong base [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 843

Protection: Housekeeper Safety and Injury Prevention

This paper has established that the duty to reduce injuries and increase safety in housekeeping is a shared responsibility between individual housekeepers and their employers.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2750

Raw Materials for Newspaper Manufacturing

Resins bind other components of the ink and form a film for binding the ink and the paper. Transportation of wood, paper fiber, and ink is also necessary to deliver the raw material to the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 591

Hospitality Information Systems and Users

Given the high demand for the aforementioned services as well as the increasing number of businesses offering the services, most organizations have opted for the application of information technology in the hospitality sector just like [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1117

Electrical and Electronics Engineering Career Development

Electronics engineering is the branch of electrical engineering, which deals with the uses of "the electromagnetic spectrum and with the application of such electronic devices as integrated circuits, transistors, and vacuum tubes".
  • Subjects: Engineering
  • Pages: 10
  • Words: 2743

“It’s a Flat World, After All” by Thomas Friedman

Information technology was and has remained critical in the realization of a global virtual village, which is marked by the ease of access to information from all corners of the world and the ability to [...]
  • 1
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2214

Jet Engine in the Air Transport Industry

The purpose of this essay is to evaluate the impacts of the jet engine development on the air transport industry. The following is a discussion of some of the implications that the jet engine brought [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1978

Using Smartphones in Learning

The other purpose of the study is to understand the recent developments that have been made to the smartphones and how people are able to adopt the changes.
  • 4.3
  • Subjects: Technology in Education
  • Pages: 22
  • Words: 6084

Metadata and Tools in American Express

The ETL tool is used in the data integration section of the master data management implementation to alternate, standardize and transfer data to the master data management hub. Another factor that companies should consider in [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1478

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Cognitive Development: Information Processing Theory

Using the computer analogy, the proponents of this theory assert that the human mind is a hardware comprising of the brain and nerves as peripherals and that the mental processes are software.
  • Subjects: Data
  • Pages: 14
  • Words: 3948

Solar Photovoltaic (PV)

Role of subsidiaries, in this case, would be to foresee the completion of grid-based rural electrification to off-grid areas that have poor and dispersed population.
  • Subjects: Engineering
  • Pages: 13
  • Words: 3763

Video Game Effects: Good or Bad?

Given the fact that there is indeed a logically sound rationale to such a suggestion, throughout the course of conducting my study, I remained thoroughly observant of the article's classification-related suggestions, in regards to the [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1290

Who Should Be Allowed to Filter the Internet?

In this study, I shall discuss several issues pertaining filtering and censoring among them being: countries rights or needs to filter the internet, internet, how the Great Firewall of China reflects a particular form of [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1708

Dependency on Computers

For example, even the author of this paper is not only using the computer to type the essay but they are also relying on the grammar checker to correct any grammatical errors in the paper. [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1411

Social Media Ethics Essay: Examples & Definition

In the initial stages of social media, it was easy fro companies to brush aside the idea of social media and have nothing to do with it, hence, risk being victims of the two risks.
  • 2
  • Subjects: Internet
  • Pages: 12
  • Words: 3702

Wireless Sensor Networks

The set up of this topology is very organised in such a way that, every single node in the system has a unique number of nodes, which are interlinked to it, at the lower point [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1618

Impact of Technology on Teaching

The demographics of the Department of Defense Education Activity schools highlight the nature of students and the expected challenges in both teaching and learning.
  • 5
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2760

Geotechnical Failure

The purpose of the preliminary study is to examine suitability of the study for the proposed construction, economize the design, assess ground conditions, and evaluate impact on the pre-existing neighbouring structures.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1964

Solar Furnace (Font Romeu – Odeillo, France)

The furnace stands as a demonstration of the potential of solar energy to the world and it remains amongst the world's greatest projects especially in the line of solar energy exploitation.
  • Subjects: Engineering
  • Pages: 12
  • Words: 3329

Blackberry Smartphone Consumer Behavior

Description of Internal Variables Consumer Personality: the personality of the consumer especially that of the middle class has a significant influence on the purchase decisions. With the brand and the specific outlet in mind, a [...]
  • Subjects: Phones
  • Pages: 7
  • Words: 2249

Negative Impacts of Computer Technology

For instance, they can erase human memory, enhance the ability of human memory, boost the effectiveness of the brain, utilize the human senses in computer systems, and also detect anomalies in the human body. The [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1103

Effects of Technology on Tertiary Education

By referring to the technology, they seek to ensure that their students have the necessary technological expertise required in the job market.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1415

Impact of New Forms of Technology on Our Understanding of Pornography

This paper therefore shows that technology has completely changed concepts of the production of pornographic material, the distribution of pornographic material, access to pornographic material and our understanding of the concepts of privacy and identity.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2276

Installing a Power Supply Back Up System

This is because, power required to run the oven and freezers for long should be available and if a power supply cannot produce that equivalent of power the tests will be invalid.
  • Subjects: Engineering
  • Pages: 3
  • Words: 811

The Airbus Fly-By-Wire Control System

In fly-by-wire, the control of the aircraft is only achieved through the use of electrical signals. The fly-by-wire control systems have enabled automatic stability system to be included in the plane and act autonomously to [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1651

Telecom Services Providers Industry in UK

The competitiveness of the market and the influence of the macroeconomic environment on the performance of the industry will be illuminated.
  • Subjects: Internet
  • Pages: 6
  • Words: 1678

Macintosh Advantages and Disadvantages

Based on the various facts presented it can be seen that in terms of their overall ease of use, versatility when it comes to using media based applications, external aesthetic quality and the inherent stability [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 577

Microsoft Information System

The validity and reliability of the data is also analyzed by a variety of tools and techniques feeded in the system just to enhance total quality management and other related knowledge.
  • 5
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3007

Code switching and millennial generation

Although the Millennial generation has learnt to code switch between the two versions of English depending on audience, it is unquestionable that technologically- inflected version of English is affecting standard written English.
  • Subjects: Internet
  • Pages: 2
  • Words: 564

The best phone in the year 2013

Despite the stiff competition from other models such as the iPhone 5 and Samsung galaxy S4, the HTC-One Smartphone is ranked as one of the best Smartphones in the market.
  • Subjects: Phones
  • Pages: 4
  • Words: 1102

Process Description: 3D Printing

The material is the string-like strand of plastic coiled in the back of the printer. In turn, the movement of the print head is directed by the 3D file sent to the printer.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 539

Fibre Optic vs. Coaxial Cables: Advantages and Disadvantages

The cables are used mainly for the transmission of data from different terminal points, including computers and televisions. The cables are also immune to noise interferences that affect the quality of coaxial cables.
  • 2
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1111

Internal Combustion Engine

It is responsible for the transfer of power produced by the exploding gases in the combustion chamber, to the crankshaft through a connecting rod that is usually attached to it.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1868

The Internet’s Advantages and Disadvantages

The resent and the most influential invention in the life of people is the creation of the Internet. Nowadays, the invention of the Internet allows people monitor the work of the departments abroad, run relationships [...]
  • 5
  • Subjects: Internet
  • Pages: 4
  • Words: 1091

Meteorological Hazards in Aviation

Available literature demonstrates that there exists a multiplicity of weather conditions that qualify as hazards in aviation due to the scope and context of the dangers they present to the industry.
  • Subjects: Aviation
  • Pages: 7
  • Words: 1920

Creating a Strong Password

Users should create a password that contains secure relations to certain applications or tasks so that it will be easy to remember.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 605

Evolution of Fire Fighting Gear

The traditional shape of the helmet was created with a short brim on the front and a long brim on the back to keep embers and hot water from going down the back of the [...]
  • Subjects: Accidents & Protection
  • Pages: 12
  • Words: 3236

Improvement of the Hp Touchpad and WebOS

Due to the poor performance of the Hp touchpad, many people started speculating the reasons for the poor sales performance of the gadget with some experts observing that the lack of Apps and the failure [...]
  • 5
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2148

Contribution of the Factors to the Internet Growth

With the use of this different scripting languages integration of multimedia features into products has become a reality and with the advancement in scripting languages the internet in the near future is expected to have [...]
  • Subjects: Programming
  • Pages: 5
  • Words: 1653

Normative Ethics and the Right to Privacy

Recent advances in technologies have prompted a new consideration of e-mail, use of e-mail, and its relation to ethics. From the deontological perspective, the court's decision to give Ellsworth's parents legal access to his e-mail [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 892

Evolution of Power Production

The goal of this paper is to review the evolution of power production as the basis for considering the future options of power for the planet.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2534

Solutions to Computer Viruses

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 562

Impact of Textbooks and Computers on Modern Education

Textbooks and computers have contributed positively to the field of education, with the former providing standard materials for learning and the latter providing cheap and easy-access schooling tools.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 878

Smartphone Technology: Impact on the Camera Industry

The camera industry has been disrupted due to smartphone technology because of the improved camera experience and the cloud's capabilities, thus, companies are recommended to adopt measures such as software implementation to avoid being eclipsed.
  • Subjects: Phones
  • Pages: 4
  • Words: 988

LaGuardia Airport: The Cyber Risk Identification

The rising tensions between the North Atlantic Treaty Organization and the Russian Federation have heightened the risk of cyber-attacks. As in Figure 1, the consequences are severe in the event of a successful assault since [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1491

Machine Learning in Medical Imaging

Therefore, the clarification of the basic processes of the different topics of medical imaging, including X-rays, MRIs, and CT scans, will provide context for our investigation of machine learning in the next section.
  • Subjects: AI
  • Pages: 5
  • Words: 1250

The Need for Physical Security in the Modern World

The adoption and integration of Internet of Things and Industrial Internet of Things devices have produced a network of Cyber-Physical Systems that is more interconnected than before, increasing the attack surface and hiding features of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1183

Case Study on Ethical Issues: Cyberbullying

The child may be in a state of shock and upset because of the psychological pressure associated with experiencing cyberbullying and reporting it to the teacher.
  • Subjects: Cyber Security
  • Pages: 9
  • Words: 2587

Problems in the Aviation Industry

Although the trend of airplane crashes has been on a downward trend since the 1980s, and statistics estimate that the probability of dying in such a crash is 1 in 3. However, the lack of [...]
  • Subjects: Aviation
  • Pages: 1
  • Words: 482

Developing Design Solutions for Smart Home

The researchers offer insights into how parents' perceptions of the hazards smart home technologies bring to children's physical and digital safety developed and altered over the course of three phases. User needs in smart homes: [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1394

Human Performance and Technology in Education

In the article "Application of Performance Technology in Educational Technology," Yingying Sun asserts the attention and concern channeled towards the performance technology in the educational technology framework.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1214

How to Choose an Encryption Algorithm Cipher

Modern encryption algorithms are sufficiently secure to be infeasible to defeat without access to the key; while theoretically possible, it would require more than a human's lifetime to do with the most advanced hardware.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 589

Virtual and Augmented Reality in Education

The novelty of this technology can be used by unscrupulous employees as an excuse to avoid preparing for lessons and working with students.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1153

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

Impact of Cyber Crime on Internet Banking

The paper evaluates a con article on 'The impact of cybercrime on e-banking' [1]. H2: Identity theft will have a negative impact on the adoption of electronic banking.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 882

Information Security Awareness

One of the significant human factors that influence ISA is the individuals' perception of security. Hence, individuals' perceptions of information leakage and security awareness play a significant role in the success of ISA programs.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 958

The Invento Robotics Products Analysis

The 5 C's of brand management has grown in popularity since it thoroughly evaluates all the important aspects of a company and allows for approach adjustments depending on what is and is not effective.
  • Subjects: Robotics
  • Pages: 6
  • Words: 1665

The Effects of Cyberbullying on Health

Even though education facilities frequently organize the assessment of cyberbullying prevalence, in the case of an adolescent patient's visit, a questionnaire with additional questions related to his family, peers, and self-esteem should be provided.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 636

Government Funding of Airports

Therefore, this paper discusses the federal and local funding of airports and the AIP and its applications in the aviation sector.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1203

Single and Double Buffering Analysis

The concepts of single buffering and double buffering are essential to understanding how animation is being displayed. Hence, single buffering and double buffering are particularly useful in animation and address the issue of display and [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 283

Waterfall Programming Methodology

The main principles of the Waterfall model are the importance of observing the stages of work and precise documentation. Due to the requirement of the complete order in the documentation, work on the project can [...]
  • Subjects: Programming
  • Pages: 1
  • Words: 376

Importance of Data Modelling in Programming

The second step is to understand the importance of details the more important they are, the more reasons to use the logical data model there are.
  • Subjects: Programming
  • Pages: 1
  • Words: 318

The Airline Industry After the COVID-19 Pandemic

The claims made by Roni Tidhar on the severity of the effects of the COVID-19 pandemic on the airline industry are weighty and well within the full spectrum of the effects of COVID-19 on air [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 936

Modern Communication Impacted by Technology

The purpose of this writing is to examine how communications have evolved as a result of technological advancement. The glorious thing about all of these choices is that people may select the one that best [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 317

Unemployment Rate Due to Impact of Technology

By understanding the role of technology on unemployment, the public can develop innovative mechanisms to overcome the issue. The impact of technology on the labor market is relevant to my present and future life.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1109

The Autopilot Systems: Examples of Devices

The Pixhawk 4 and MP21283X autopilots with different characteristics to redundancy are analyzed, as well as the NASA Swift UAV using off-the-shelf autopilot solutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 702

The Dipole and Dish Antenna Experiments

The transmitter and receiver's wavelength are in proportion to the antenna height. It indicates that the shorter the antenna, the greater the frequencies, and the larger the transmitter, the lesser the intensity.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 967

Using Technologies in Kindergarten Classrooms

Integrating modern technologies into the educational process in kindergartens helps educators transmit knowledge to the children and influence their emotions and perception of the materials.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1671

The Triumph of the Nerds Video Analysis

It highlights the different factors that led to the fallout between IBM and Microsoft and how different working cultures influenced the success of the two companies.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 894

The Best Website for Creating a Portfolio

That is why it is important to use the right and reliable portfolio sites that help people organize their CVs in the right and pleasant way.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 609

Analyzing the iPhone as an Artifact

At the time of the release of the first iPhone, it was a challenge for thinking and action for the whole world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1140

Microsoft Power BI Software’s Features

Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Characteristics of Robotics

What concerns the elaboration of an obstacle course in a "real-world" simulation, it is essential to ensure the presence of several procedure testing steps that will determine the functionality of a robot. What concerns the [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 917

Recursion Explained With the Mirror Analogy

Binary search through the integers or dictionary is conducted through the recursive binary search function that includes the array and the target information. Base case in recursion is a special case where the solution is [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 559

The Concept and Underlying Science of Hyperloop

The representatives of the two firms argued that there was a great possibility of implementing the Hyperloop in the Middle East or Asia because of the increased need for fast and efficient transport and reduced [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2035

Discussion of Cybercrimes in Modern World

The relevance of cybercrime research is dictated by the fact that it is challenging to ensure the complete safety of data on the Internet.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1447

Government Restriction on the Internet

The restriction by the government has been enforced to promote the limitation of the content display that is only necessary for the user.
  • Subjects: Internet
  • Pages: 6
  • Words: 1737

White Hat and Black Hat Hacking

On the other hand, White Hats work with companies and help them identify weaknesses in their systems and fix relevant vulnerabilities to ensure that attackers cannot illegally gain access to data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 608

Application Software Integration: Pros and Cons

The breakthroughs within the field of information technologies revolutionized the environment of software development. The integration often leads to the improvement of the reporting process.
  • Subjects: Applications
  • Pages: 1
  • Words: 294

Discord Server as Online Public Space

Interestingly, both types of relationships are natural to Discord because it has many functions, and there is possible to create many channels with the same people, so different parts of a project can be separated [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 324

Is the Internet Affecting People Negatively?

Opponents of the Internet tend to view and criticize it one-dimensionally as a source of mindless entertainment, whereas in reality, it is rich with potential uses that have their unique properties.
  • Subjects: Internet
  • Pages: 5
  • Words: 1306

Amazon Company’s Acquisition Risk Analysis

Since Amazon is one of the largest companies in the world highly sensitive to cybersecurity risks, it would be appropriate for the company to use the best provider regardless of the price of the solution.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2264

Artificial Intelligence in Cybersecurity

The use of AI is regulated by a large amount of documentation, which should take into account the current legislation in the country of use and ethical issues related to AI, many of which have [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 585

Advantages and Disadvantages of MS Project

Microsoft provides support to their users, and MS Project team members of the project will be able to receive assistance with the software when necessary.
  • Subjects: Applications
  • Pages: 1
  • Words: 377

GG Freightways Mobile Marketing Application Project

The mobile marketing application intends to assist in tracking the whereabouts of the goods transported hence contributing to the timely delivery of the freight to the clients.
  • Subjects: Applications
  • Pages: 5
  • Words: 1379

Importance of Army Cybersecurity

This includes bringing awareness to the cybersecurity issue, involving more people to combat the problem of cyberattacks, and organizing the information based on specialty and tasks that must be completed.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1114

Big Data and Distributed Databases

Big data refers to a type of set of information that requires memory beyond the capacity of the conventional relational databases.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Airport Planning and Management

This paper discusses the issues of airport capacity and delay and the related causes. Lack of capacity is a term commonly used to refer to the cause of the airport delay.
  • Subjects: Aviation
  • Pages: 3
  • Words: 920