Tech & Engineering Essay Examples and Topics. Page 7

5,887 samples

Pipeline Installation Elements

This must take into account the line size of the pipeline and the length of the barrel. Design Pressure The design pressure must serve as a basis for determining the thickness of the wall of [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2790

Cloud Computing Pros and Cons

In a computer system using cloud computing, the workload of running applications is shifted from the local computer to the cloud, which consists of network computers.
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2752

Fire Plan Design and Prevention System

The formula for calculating the need fire flow is: The need fire flow for 25% involvement will be 1333. The water aids the fire departments when the building is on fire.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 585

Monopolistic Competition of Smart Phones

4
In the flurry of the responses that followed, there was concern whether the smart phone market was becoming monopolistic. This was a clear indication that the competition in the smart phone market was becoming monopolistic.
  • Subjects: Phones
  • Pages: 3
  • Words: 863

Effective Project Management Practices: Case Study

A project scope encompasses the entire task involved in the creation of the products of the project and the processes that creates them and also the processes that are involved in the definition and controlling [...]
  • Subjects: Project Management
  • Pages: 8
  • Words: 2303

The Evolution of the Car Engine

France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2226

The Advantages and Disadvantages of PMA

The difference between the licensed and independent PMA is in the character of the cooperation between the companies and the features of producing the PMA parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 553

Wireless Sensor Networks

The set up of this topology is very organised in such a way that, every single node in the system has a unique number of nodes, which are interlinked to it, at the lower point [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1618

Fire Protection of Flammable Storage Tanks

The kind of storage tank used in storing combustible and flammable liquids heavily relies on the stored product physical characteristics and the location of the tanks.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1374

Project Initiation Document

In essence, proper remuneration of the staff and availability of material and financial resources were necessary for the successful implementation of the project.
  • Subjects: Project Management
  • Pages: 5
  • Words: 1189

Apple MacBook Pro

The development of Apple MacBook Pro can be seen as a great milestone in computer technology and specifically for the MacBook family and MacBook Pro line.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 792

Project Management: A Critical Evaluation

It is against this background that the present paper seeks to respond to a few issues related to project scheduling, primarily the identification of activities needed to estimate resources and durations, identification and discussion of [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1370

The Airbus Fly-By-Wire Control System

In fly-by-wire, the control of the aircraft is only achieved through the use of electrical signals. The fly-by-wire control systems have enabled automatic stability system to be included in the plane and act autonomously to [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1651

Analysis of Dubai’s Aviation Model

This paper not only sheds light on the factors contributing to the success of the sector but also analyzes the contributions of the aviation sector to Dubai's economy. The success of the partnership is attributed [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1574

Airports Electronic Gate (E-Gate)

The invention and innovation of computer applications has resulted in the development of electronic gate used in airports; the innovative electronic passport control system is used to boost security and facilitate the flow of people [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1621

Artificial Intelligence: Pros and Cons

3
Artificial intelligence, or robots, one of the most scandalous and brilliant inventions of the XX century, causing people's concern for the world safety, has become one of the leading branches of the modern science, which [...]
  • Subjects: Robotics
  • Pages: 4
  • Words: 1163

How Business Sectors Benefit from Information Technology?

The industry is quite promising since in the past few years, more initiatives have been released to the market and in regards to that, future systems will be required to do more complex procedures requiring [...]
  • Subjects: Applications
  • Pages: 11
  • Words: 3003

Music Industry and Technology

The paper further describes some of the technological innovations and analyses how the innovations have contributed to the positive growth of the music industry.
  • Subjects: Other Technology
  • Pages: 12
  • Words: 3878

Computer Aided Software Tools (CASE)

The use of the repository is common to both the visual analyst and IBM rational software with varying differences evident on the utilization of services.
  • Subjects: Engineering
  • Pages: 2
  • Words: 2489

The History of Relational Database Technology

5
In 1980's the disadvantages associated with relational database systems and the need to increase capacity of manageable objects led to the invention of commercial object-oriented database systems.
  • Subjects: Data
  • Pages: 8
  • Words: 2179

The iPhones Fourth Generation

It is the fourth generation of the iPhone, having succeeded the iPhone 3GS, the other two previous models are the original iPhone and the iPhone 3G.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Hacking: Positive and Negative Perception

The possible advantage of cooperating with hackers for security systems mangers of international organizations and governmental organizations is the probability to recruit them and use their knowledge to empower different organizations to improve their security [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 538

Dangers of Texting while Driving

5
The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1267

How Do Vacuum Cleaners Work?

Regardless of the type, the mechanics of the vacuum cleaners is that while the engine is running, traction is created in the device, by which garbage, dust and dirt particles are sucked through a long [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 654

Layering and Encapsulation Security Design

The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures. Thus, it is an example of a wrong solution to the world.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 720

Technology and Wind Energy

Efforts by the elite members of the society enlightened the global countries about the benefits of renewable energy sources in conserving the environment prompting the need to consider wind energy.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 295

Propeller-Driven Performance vs. Jet-Driven Performance

Propeller-driven aircraft is more efficacious at low speeds than jet-driven aircraft, for they create higher propulsive efficiency and, consequently, greater thrust while the craft is moving at lower airspeed; however, jet-driven aircraft experience the deficiency [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 655

Risk and Trust – Internet Relationships

Politics has hampered efforts to spread the knowledge of the risk society. It is noted that scientists have also failed to come up with a rational solution to the risks of modernity.
  • Subjects: Internet
  • Pages: 8
  • Words: 2217

Why Is Samsung Considered a Design Inspiration?

The reimagined camera is one of the key features of the Samsung smartphone that reflects the inspirational design. Samsung employs the horizontal integration strategy in the production of its smartphones and other products.
  • Subjects: Phones
  • Pages: 5
  • Words: 1444

Technology and Human Development

This paper discusses video games as learning tools to highlight the kind of knowledge that they present to learners and their effectiveness in enabling people to acquire the knowledge.
  • Subjects: Technology in Education
  • Pages: 9
  • Words: 2508

Al Wahda Master Development Project Management

In 2011, under the guidance of EC Harris' chief executive, Philipp Youell, the company merged with Arcadis, the international design and engineering enterprise headquartered in Amsterdam. Nowadays, the AWMD project is perceived as one of [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1211

“The Dumbest Generation”

This is proven by the fact that he has gone beyond his limits to investigate the impacts of technology on America's young people.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1101

The Impact of iPad on Children between 2-10 Years

The objective of this program is to bring out the negative effects of using iPads among the children. The program intends to enlighten the parents on the need to limit the number of hours their [...]
  • Subjects: Phones
  • Pages: 4
  • Words: 1024

Archives Unique Collections

The difference between the archival materials and the library materials is that in the archives,the materials are arranged in groups on the basis of their information content.
  • Subjects: Data
  • Pages: 10
  • Words: 2750

Internet Files Sharing

The tutor and the student are now able to communicate and exchange file over the internet in form of lessons, instructions, and assignments online.
  • Subjects: Internet
  • Pages: 4
  • Words: 1079

Impact of the Weather on Aviation

The weather can significantly impact flight cancellations and delays. In some instances, weather-related issues may cause flight delays or cancellations to protect the well-being of passengers and crew.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1390

Drawing a Performance-Evaluation Data Flow Diagram

Mukunda approved the data flow diagram for workplace applications, given that it covers the entire scope of a performance evaluation process, including employee self-reflection and collaborative coordination between top managers and their subordinates.
  • Subjects: Applications
  • Pages: 1
  • Words: 372

The Harry Potter Phenomenon Analysis

Since these groups sowed the seeds of the Potter phenomenon, the connectors and, later, the mavens were crucial to the publication of the first novel, Harry Potter and the Philosopher's Stone.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1770

Space Science and Technology Development in the UAE

For this reason, the given study focuses on investigating the role of space science and technology development in the UAE and their contribution to the development of international relations.
  • Subjects: Technology Effect
  • Pages: 40
  • Words: 11835

AR and VR for Maritime Industry Training

The first advantage of AR and VR for maritime training is that it is expected to provide trainees with a high level of practical experience in dealing with different scenarios.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2805

Aspects of Malware: Detection and Analysis

The host of malware is software that the virus itself has infected. Even if a system is rebooted, the majority of malware will continue to operate.
  • Subjects: Computer Security
  • Pages: 27
  • Words: 7535

Defining Data, Information, and Knowledge

Thus, information can be defined as data that develops in one's cognitive system with the help of context and human intention. Knowledge is the process of understanding and explaining the information that happens in the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 852

Project Management on the Basis of a Real-Life Example

In general, project management may be regarded as a process that involves planning, organization, and overseeing a team's performance to create and improve a particular organizational project within the framework of the achievement of organizational [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 1723

The Role of Databases in Organizations

In the contemporary technology-driven world of business, the use of information technologies is essential for the efficient and competitive implementation of business practices.
  • Subjects: Data
  • Pages: 1
  • Words: 291

Integration of Artificial in Human Resource

The paper will focus on summarizing the piece of work to comprehend the contribution of the authors in understanding the role of AI in modern HR practices.
  • Subjects: AI
  • Pages: 9
  • Words: 1673

Microsoft Power BI Software’s Features

Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Application Development Using Android Studio

Android Studio offers a range of testing tools and frameworks to help one in testing the app. Further, an XML file in the Android Studio enables one to create a layout and resources.
  • Subjects: Applications
  • Pages: 2
  • Words: 560

Discussion of Cybercrimes in Modern World

The relevance of cybercrime research is dictated by the fact that it is challenging to ensure the complete safety of data on the Internet.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1447

Is the Internet Affecting People Negatively?

Opponents of the Internet tend to view and criticize it one-dimensionally as a source of mindless entertainment, whereas in reality, it is rich with potential uses that have their unique properties.
  • Subjects: Internet
  • Pages: 5
  • Words: 1306

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Cybersecurity Workforce in Emergent Nations

The lack of help from developed countries in the training and education of a cybersecurity workforce for developing nations can negatively affect the former. Public and private organizations also contribute to the development of cybersecurity [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 831

Tracking: More Advantages Than Disadvantages?

In this case, tracking helps the authorities to identify the exact location of criminals and apprehend them. This is because criminals might track the location and behavior of a person they intend to harm.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 293

Airport Planning and Management

This paper discusses the issues of airport capacity and delay and the related causes. Lack of capacity is a term commonly used to refer to the cause of the airport delay.
  • Subjects: Aviation
  • Pages: 3
  • Words: 920

Boolean Search and How to Use It

The use of the created Boolean string yields 1726 results, which is a relatively large number of articles for manual selection of the most relevant sources.
  • Subjects: Programming
  • Pages: 6
  • Words: 449

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Subjects: Internet
  • Pages: 4
  • Words: 1285

Influence of YouTube and Facebook on Business

Two of the most influential and promising technologies in this age are the YouTube and Facebook, a social website. The impact of social media on business is remarkable and companies use YouTube to market their [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 2171

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

Modern Navigation Systems and Safety

It is also capable of determining the ground speed and the time in relation to ground station when in "line of sight" of transmission. LORAN is capable of providing highly accurate bearing, distance, time to [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 3430

Mobile Devices and Convenience

Mobile devices that fulfill such requirements provide the merit of functionality optimization, mobile network security with the consequence of the reduction in costs associated with downtimes while not negating the privilege of reduced general costs [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1618

Overview on 4G Technologies

The major plan of 4G technology is to ensure that users can access and have a faster and more reliable internet access on their mobile phones and the mobile broadband services and combine all other [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 921

The Various Effects of Cybercrime

The primary objectives for this strategy were to prevent any attacks against the United State's infrastructures, to reduce the country's propensity to attacks over the internet and to reduce to the lowest levels possible the [...]
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 3923

Are Word Processing Programs Making Students Lazy?

Besides, easy access, availability, and strong support in learning institutions have contributed to the widespread use of word processing programs among students. However, the capability of word processing programs in correcting grammatical and spelling mistakes [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 884

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1233

Can Manufacturing Material and Process

However, the period of technological advancements that started after the Second World War saw a breakthrough in the extraction of aluminum and easy smelting of aluminum.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2015

Computer Sciences Technology: Smart Clothes

In this paper we find that the smart clothes are dated back to the early 20th century and they can be attributed to the works of artists and scientists.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2648

Growing Use of 3D Technology in Theatres and at Home

One of the major beneficiaries of technological advances that have been made by man over the cause of the last century has been the entertainment industry which as grown exponentially through the years.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4446

The Wireless Robotic Car: Design Project

2
In this prototype, the task is to design a robotic car that can be controlled by a computer using wireless communication technology.
  • Subjects: Robotics
  • Pages: 6
  • Words: 1992

Computer Problems: Review

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1056

Microsoft Power Point: Program Review

The latest version of the Microsoft Office system program is a 32-bit application and can run on a Windows 64-bit platform.
  • Subjects: Programming
  • Pages: 2
  • Words: 749

Personal Post-Project Review

To obtain an overview of the project, the author investigated its findings about the inefficiencies that were discovered and the measures that were taken to address them.
  • Subjects: Project Management
  • Pages: 16
  • Words: 2197

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Aerodynamic Controls of a Typical Aircraft

The drag created as a result of the occurrence of a lift is called induced drag, while the other type of drag, parasitic drag, is not related to the lift.
  • Subjects: Aviation
  • Pages: 3
  • Words: 842

Cybersecurity and Social Networks

Recently, there have been many trends the security of information and communication technologies, in particular, due to the expansion of the reach of social media which increase the size of social network, which has taken [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 2895

Qualitative Data Analysis Recommendations

All a researcher should do is to open the file in the software itself, underline the piece to be coded and haul the code from the code administrator.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 923

John Searle: Can Machines Think?

He says that according to strong AI, the computer is a mind if it is well programmed, that is, it can be said to understand things if it is given the correct programs.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 1001

Analysis and Interpretation of Text and Image

Text analysis in this discourse will focus on critically examining and analyzing the language structure in the document to identify the communication function of the discourse.
  • Subjects: Applications
  • Pages: 12
  • Words: 3352

The Different Sides of Hacking

In a general sense, computer hacking involves the intrusion of the computing privacy of other people, damage of the computing property of other people like files, software etc.or the theft of private information by unauthorized [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 575

The United Airlines Flight 232 Accident

Such factors as crew's strategy, their interpersonal communication, and cooperation, as well as the involvement of the crew members and flight attendants in the communication process, prove the efficiency of the CRM in this particular [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 862

Effect of Modern Methods of Construction

MMC includes; Make use of more effective material Speed up hiring delivery Enable high standards of design quality Can help to reduce resource consumption It has often been regarded as a mean of improving quality, [...]
  • Subjects: Engineering
  • Pages: 20
  • Words: 3504

Responsibilities of Internet Users

Along with so many advantages of the internet, there are some very serious disadvantages that are associated with the usage of the internet and it is the responsibility of the internet users to be aware [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 2153

Computer Virus User Awareness

It is actually similar to a biological virus wherein both the computer and biological virus share the same characteristic of "infecting" their hosts and have the ability to be passed on from one computer to [...]
  • Subjects: Computer Security
  • Pages: 1
  • Words: 685

Aviation and Aerospace Future Technology

Aerospace refers to the earth's atmosphere and the space beyond it. Technology in both aviation and aerospace has proved to be of great advantage to mankind over the years.
  • Subjects: Aviation
  • Pages: 2
  • Words: 716

Thomas Edison’s Study of Electricity

From humble beginnings to the giant that he was, Edison's life is a source of inspiration to the thousands of young people trying to make their mark in the world.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2309

Airbags’ History, Working Principles, Usefulness

Road traveling and road transportation are some of the oldest methods of road uses since the birth of technological era and the commencement of human civilization.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1889

Evie.ai: Artificial Intelligence and Future Workforce

That is why it is crucial to analyze some trends in artificial intelligence that are being adopted by many businesses for better functioning, in particular, the implementation of Evie.ai, its functions, and the consequences.
  • Subjects: AI
  • Pages: 4
  • Words: 1215

Science and Innovation in Different Societies

Firstly, it is critical to study the importance of science and innovation because the fields high influence the life of people by making it more convenient such as the usage of elevators.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 274

Project Control, Audit, and Termination

The process of project controlling is a complicated system of various actions which requires a lot of experience and efforts. This type of control meets some challenges as it is not always easy to identify [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 844

Work-Breakdown Structure in Project Management

Mostly, a WBS should be presented in a diagrammatic representation as this is the simplest way to outline the various sets of work required for the completion of the project.
  • Subjects: Project Management
  • Pages: 2
  • Words: 341

The Detailed Network Design and Layout Implementation

The internal network is connected to the external network with a T-1 link from Verizon using a dynamic NAT router installed and tested and overloaded with PAT to support a higher number of clients with [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 827

Mechanical Engineering Profession

Keeping in consideration the fact that not all the people are well educated to understand the nuances of mechanical engineering, the text of this paragraph has been kept as moderate as possible.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1097

Multimedia Technology for Teaching and Learning

Studies have shown that the use of multimedia is a technological phenomenon because its applications involve the use of technology. The implication is that multimedia has a theoretical basis for both teaching and learning.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 567

Cyber Attack on Sony Company

The main goal of this paper is to analyze the case of cyberattacks on Sony, discussing the existing evidence and alternative decisions that could have alleviated the negative impact of the incident on customers.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 871

“What’s Your Best Innovation Bet?” by Schilling

Therefore, the article holds that the understanding of the evolutionary process of technology and the dynamic needs of customers is critical in designing innovations that would become relevant for a considerable time.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1144

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571