Tech & Engineering Essay Examples and Topics. Page 7

4,449 samples

Ethics and Nanotechnology

Although the development of nanotechnology is significant for the general technological progress of the contemporary science and it can meet the people's needs, from the perspective of their impact on humans, the achievements in nanotechnology [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1884

OPSEC and Site Security

The importance of individual responsibility is critical in enhancing the safety of the facilities and personnel. Thus to enhance accountability in the event of a terrorist incident, the association offers free updated information and training [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 747

Computer Safety: Types and Technologies

The OS of a computer is a set of instructions communicating directly to the hardware of the computer and this enable it to process information given to it.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2917

Technology in Hospitality Industry

Some customers would like to continue working while in the hotel or even to keep in touch with the progress of their businesses and information technology advancement has made this possible nowadays.
  • Subjects: Applications
  • Pages: 2
  • Words: 545

Internet Should Be Free From All Government Control

A report by the group of eight most developed countries in the world, the G 8, indicates that information and communication technology is one of the most powerful forces that will play a decisive role [...]
  • 5
  • Subjects: Internet
  • Pages: 9
  • Words: 2860

The Internet Is a Powerful Force

In Nicholas Carr's book, What the internet is doing to our brains, he describes the impact the internet has brought to our capacity to concentrate and think deeply.
  • Subjects: Internet
  • Pages: 4
  • Words: 1142

People Have Become Overly Dependent on Technology

This is because it has come to the knowledge of many that human being is prone to errors, and the only way these errors can be eliminated is to engage technology in order to ensure [...]
  • 4.3
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1095

GPS Technology Pros and Cons

GPS Navigation technology Navigation technology uses a GPS receiver and internal road database, which provides the user with a clear view of the surrounding in real time.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 632

Technological Advances in Education

One of the biggest advantages that technology has brought in the field of education is global learning. It is a fact that technology has brought about massive improvement in the field of education.
  • 3
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2999

Technology Impact on Human Civilization

Despite the large amount of information that the internet provides to people, research shows that the internet may have a negative effect on the intellectual ability of an individual. The use of technological devices may [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 816

History of the Cellular Technology

With the developments in the cellular technology, electrical engineering has been affected by the changes and development of this technology. Ever since the introduction of the first mobile phones in the 1980s, electrical engineering experts [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 563

Ethics in Computer Technology: Cybercrimes

The first one is the category of crimes that are executed using a computer as a weapon. The second type of crime is the one that uses a computer as an accessory to the crime.
  • 5
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1334

The History of Relational Database Technology

In 1980's the disadvantages associated with relational database systems and the need to increase capacity of manageable objects led to the invention of commercial object-oriented database systems.
  • 5
  • Subjects: Data
  • Pages: 8
  • Words: 2179

Regional Airlines: SkyWest Airlines

In 1977, the SkyWest Airlines made agreements with American Airlines, United Airlines, Texas International and Hughes, and this allowed check-in and baggage transfers between the airlines for the passengers.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2205

Digital Technology in Modern Society

From the above analysis, it is more evident that digital technology has a wide range of effects to our culture and to the young generation.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1091

Benefits of the Internet

One of the uniqueness of using internet to communicate is that, there are no barriers, as people can connect easily at any place and all the time.
  • Subjects: Internet
  • Pages: 4
  • Words: 1123

Technology, Privacy, and the Person

These threats revolve around personal information and all efforts have to be put in to protect the privacy of internet users.
  • Subjects: Internet
  • Pages: 4
  • Words: 1144

The Internet’s Good and Bad Sides

On the other hand, the internet is the root of some of the bad evils that have befallen many people, true and the internet is the beginning of what Gibson described as a place to [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1632

What Are the Benefits of the Internet?

The Internet has been one of the biggest inventions that have made a great difference in the lives of many people in the world.
  • Subjects: Internet
  • Pages: 4
  • Words: 1026

Hacking: Positive and Negative Perception

The possible advantage of cooperating with hackers for security systems mangers of international organizations and governmental organizations is the probability to recruit them and use their knowledge to empower different organizations to improve their security [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 538

Global Information Systems (GIS)

Information on the country in which the organization operates is relevant to the organization because it provides the relevant information regarding the existing business opportunities in the country and the possibility of their exploitation.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2773

Effects of Word Processors on Writing Ability

Using word processors, I can retrieve pieces of writing written in the past and try to improve on them. Sometimes I am not able to spot my mistakes in writing when using word processors.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 568

The Cloning Controversy

Considering the fact that most of the controversy about cloning arises from misinformation or ignorance about the matter, this study shall set out to conclusively research on cloning and its merits so as to attest [...]
  • 3.5
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1207

Online Persona: Ethical Implications

For the purposes of this essay, let us accept that a fabricated online persona remains ethically unsound, as we consider the social harm this causes, namely, the perpetuation of crippling social stigmas, and the erosion [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 821

The iPhone’s Main Features and Productivity

The sophistication of the iPhone is reiterated by Jacko who is of the opinion that the exquisite look of the gadget coupled with the touch screen effectiveness has made many other firms come groping for [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 728

Sample of Chart or Graph

While the stacked bar chart is very helpful in understanding the overall votes by respondents as well how many considered each focus area as critical or high, it does not give an idea of the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 559

Industrial Engineering

This is to facilitate development of appropriate construction designs, allocation of resources, and crafting of superior strategic plan to enhance effectiveness.
  • 4
  • Subjects: Engineering
  • Pages: 4
  • Words: 1094

Pros and Cons of Information Technology

Some of the disadvantages of the improved technology include new forms of pollution that are as a result of the gadgets used to access the resource.
  • Subjects: Internet
  • Pages: 2
  • Words: 609

Are Hybrid Cars Worth It?

First and foremost what must be understood is that hybrid vehicles on average cost more than their primarily gasoline based counterparts, while it may be true that the hybrid car industry focuses on the fact [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2008

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Subjects: Internet
  • Pages: 3
  • Words: 832

Solutions to Computer Viruses

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 562

Privacy Risks in Social Media and Modern Technology

The exploitation of more than fifty million Facebook users to influence the 2016 presidential election highlights the grave consequences that social media and modern technology expose the public to.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1993

Enhancing Education Through Technology Integration

The sense-making use of digital instruments, the ability to solve complex learning problems, and the value of feedback opportunities are important effects of the adoption of technological solutions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 555

Metaverse and Its Influence on Society

The metaverse has the potential to revolutionize entertainment, improve communication and collaboration, and increase equality. The possibility of using the metaverse as a tool for monitoring and management is a serious concern.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 824

Forces on a Rotating System Laboratory

The mass appears to push outward due to its inertia in the case of a spinning system because the centripetal force pulls the mass inward to follow a curved path.
  • Subjects: Engineering
  • Pages: 2
  • Words: 576

Negative Impacts of Emerging Mobile Technologies

It will lead to more hours spent in games and, thus, increase the probability and strength of addiction. In the case of online games, social and game addictions are combined.
  • Subjects: Phones
  • Pages: 10
  • Words: 2783

Sony Pictures: The Cyber Attack

The incident also highlighted the vulnerability of large companies to cyberattacks and the need for better security measures."Guardians of Peace" was the hacker organization that breached the computer networks of Sony Pictures Entertainment, a prominent [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 858

The Home Internet and Network Security

In addition, system security should be considered as well in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 400

Artificial Intelligence for Recruitment and Selection

As a result, the hiring process has changed considerably, and it is crucial to comprehend how social media and technology affect it. In conclusion, technology and social networking have had a big impact on both [...]
  • Subjects: AI
  • Pages: 1
  • Words: 360

Case Study on Ethical Issues: Cyberbullying

The child may be in a state of shock and upset because of the psychological pressure associated with experiencing cyberbullying and reporting it to the teacher.
  • Subjects: Cyber Security
  • Pages: 9
  • Words: 2587

Aspects of the Fire Prevention and Safety

According to the 2019 International Building Code, materials and features in buildings need to be structurally fire-resistant to safeguard against the spread of fire and smoke.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 613

How to Build a Gaming Computer

The first step to creating a custom build for a PC is making a list of all the necessary components. This explanation of how to build a custom gaming computer demonstrates that the process is [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 604

Developing Design Solutions for Smart Home

The researchers offer insights into how parents' perceptions of the hazards smart home technologies bring to children's physical and digital safety developed and altered over the course of three phases. User needs in smart homes: [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1394

Big Data and Python Tools for Data Analysis

Volume describes the amount of data, variety refers to the complexity of the data types in the set, and velocity defines the rate at which new data is generated.
  • Subjects: Data
  • Pages: 2
  • Words: 565

Artificial Intelligence and Machine Learning

There are both benefits and challenges to the use of AI and ML in the customer complaint resolution process. The ability of a company to provide a customer experience depends on that business's power to [...]
  • Subjects: AI
  • Pages: 2
  • Words: 707

Data Breach Management in Business

The second step is working to identify the extent and source of the breach, and this will be done through a forensic team that will investigate the issue and gives us answers.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 282

Graph Analytics in the Aviation Industry

In response to this significance, several frameworks have been designed to deal with big numbers, given the availability of data and the complex agent interactions. Data extraction and analysis have been in the face of [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2968

Aspects of Malware: Detection and Analysis

The host of malware is software that the virus itself has infected. Even if a system is rebooted, the majority of malware will continue to operate.
  • Subjects: Computer Security
  • Pages: 27
  • Words: 7535

Experiences of Beginner in Python Programming

Difficulty in working with Python for me is understanding what and how to include in the code. Thus, Python is in high demand in IT and, at the same time, is known as a programming [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 570

The Solar Powered Flashlight and Its Advantages

Once fully charged, the solar powered flashlight will play an important role of ensuring one is able to navigate all the challenges that might arise at night.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 556

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

Impact of Cyber Crime on Internet Banking

The paper evaluates a con article on 'The impact of cybercrime on e-banking' [1]. H2: Identity theft will have a negative impact on the adoption of electronic banking.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 882

The Ron Engineering vs. Construction Ltd. Lawsuit

The lawsuit between Ron Engineering and Construction Ltd.and the Government of Ontario can be considered one of the most consequential and prominent quarrels in Canada.
  • Subjects: Engineering
  • Pages: 2
  • Words: 604

Wearable Exoskeletons for Industry Use

Even though most of the work in the field of exoskeletons is still experimental, there are significant challenges hindering the implementation of exoskeletons in the industry including safety and discomfort.
  • Subjects: Other Technology
  • Pages: 27
  • Words: 7411

How Publishing Industry Has Adapted to the Digital Era

The emergence of the smartphone, internet and e-reader due to digital technology has altered how people read and acquire books. On the other hand, they have only recently begun negotiations with the Digital Public Library [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 391

Single and Double Buffering Analysis

The concepts of single buffering and double buffering are essential to understanding how animation is being displayed. Hence, single buffering and double buffering are particularly useful in animation and address the issue of display and [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 283

Defining Data, Information, and Knowledge

Thus, information can be defined as data that develops in one's cognitive system with the help of context and human intention. Knowledge is the process of understanding and explaining the information that happens in the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 852

TechnologyOne: Offering SAAS Around the World

When it comes to giving a piece of advice to a potential client regarding a support plan, I would recommend basing the decision on the consistency of need for the service.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 284

The Java and C++ Languages Comparison

On the other hand, C++ is more advanced programming that evolved from the C programming language to improve the designs available and allow for a high degree of memory in computer resources.
  • Subjects: Programming
  • Pages: 3
  • Words: 886

The Autopilot Systems: Examples of Devices

The Pixhawk 4 and MP21283X autopilots with different characteristics to redundancy are analyzed, as well as the NASA Swift UAV using off-the-shelf autopilot solutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 702

Technical Evolution of Automobiles

In 1888, the practically of Benz's car would come to test when his wife, Bertha, and their two sons embarked on a journey using a better version of the car.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2235

Mounting Drives: Advantages and Disadvantages

Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 594

Google’s Vendor Lock-In and Cloud Computing

The need to migrate from one cloud service to another and the risks involved therein have been studied to reveal the existence of vendor lock-in and unveil the potential solutions therein.
  • Subjects: Cloud Computing
  • Pages: 7
  • Words: 1975

Cybersecurity Dangers and Their Analysis

The officer clicks the file, and the malware attacks the system stealing the data and bypassing some security measures. The cyber security framework under the NIST is helping organizations to understand and manage cybersecurity.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2960

Integrating Technology in Curriculum

Integrating technology into the education system refers to; the application of technological advancements to foster learning among the students in the classroom thus, promoting a good learning experience.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 890

Analyzing the iPhone as an Artifact

At the time of the release of the first iPhone, it was a challenge for thinking and action for the whole world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1140

Microsoft Power BI Software’s Features

Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Why Linux Is Better Operating System Than Windows

The second reason why Linux is better is the relative reliability of the system and its resistance to hacker attacks, which is also due to the branched principle of individual encoding of each particular OS. [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 284

Failure of Airbus A380 Production

This paper looks at the review of the problems facing the airline industry as a whole, the methodology used in the research, findings on the failure of A380 production and the analysis.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2846

Aviation Industry Affected by COVID-19 Pandemic

As the weeks progressed, the truth of the epidemic became apparent, and traveling was prohibited in an attempt to halt the further spread of COVID-19. The changes in the aviation industry due to the coronavirus [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1339

Cyber Security Issue: RansomWare

Until the victim pays a specific amount of money to the attackers within a particular time, cybercriminals can use the virus mentioned above to access the user's sensitive personal or organizational information. The infection and [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1225

Pros and Cons of Distance Education

On the one hand, modernization of education allows it to expand the usual boundaries of transmitting and receiving information in the educational process while retaining all the integral components.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 512

Survey Monkey: The Online Assessment Tool

We also give the reader the findings of a survey conducted with this tool and an assessment of its usefulness and potential for use in future usability studies. Survey Monkey is a web-based tool and [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 955

Internet Technology and Impact on Human Behavior

It was the Internet that allowed the phenomenon of cyberbullying to emerge, the essence of which is the harassment of someone on the Internet by large groups of users.
  • Subjects: Internet
  • Pages: 1
  • Words: 312

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

How Smartphones Changed Society and the World

Introduction of the smartphone to mass public Driven by iPhone created by Apple and Steve Jobs in 2007 Revolutionized the world of communications and information exchange Smartphone went from being a tool to the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 430

Importance of Army Cybersecurity

This includes bringing awareness to the cybersecurity issue, involving more people to combat the problem of cyberattacks, and organizing the information based on specialty and tasks that must be completed.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1114

Big Data and Distributed Databases

Big data refers to a type of set of information that requires memory beyond the capacity of the conventional relational databases.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Airport Planning and Management

This paper discusses the issues of airport capacity and delay and the related causes. Lack of capacity is a term commonly used to refer to the cause of the airport delay.
  • Subjects: Aviation
  • Pages: 3
  • Words: 920

Chaos Theory. Visual Representation in Video Games

Currently, only rough concept designs of levels are available, and we plan to polish them up further and work on the visuals to create a dark and gloomy atmosphere. Novel puzzles will be designed and [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 295

Notepad++ as a Free Editor for HTML Files

They should locate the HTML file that they want to view, click on it with the right button, choose "Open with," and select a preferred browser.
  • Subjects: Programming
  • Pages: 1
  • Words: 297

Logic and Design: Flowcharts and Pseudocode

The basic understanding of logic and design is that processes should be presented in a way that demonstrates certain algorithms, i.e.the description of a process should be precise and should contain detailed instructions on what [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 590

Reproductive Technologies: Ways of Regulation

For instance, through the use of in-vitro fertilisation IVF, assistance has now been given to those who have problems in conception; also the use of PDGs prevents conception of severely abnormal children.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1572

Management Information Systems (MIS)

The advances in the evolution of devices and the achievement of a new stage of development critically impacts MIS and creates the basis for the emergence of multiple changes towards the achievement of better outcomes [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 573

Airport Operations and Cargo Transportation

Considering the significant number of employees in an airport, and the importance of areas restricted for security reasons, staff identification is a crucial part of an airport's landside security.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Information and Communications Technology in Education

Moreover, many research projects started to investigate the benefits of MALL in learning the language. The research revealed women to be, on average more inclined towards mobile learning in perception and attitude.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1511

Automated Catering Management System

It is a key part of future improvement as this information can be stored in the system and processed to promote positive change.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1104

Hunting Netiquette Violations

This is a message attached to people's mails without their consent. An example of this violation is a word-for-word plagiarism.
  • Subjects: Internet
  • Pages: 2
  • Words: 430

AirAsia: Crisis Management Case Study

The crash was the first to be recorded in the eighteen years of operation of AirAsia. It was described as the third worst plane crash in the year 2014.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 1098

Artificial Intelligence in Self Driving Cars

The field of Artificial intelligence is one of the newest areas in science and engineering. When explained in terms of thinking critically, AI is the desired outcome of human effort to make computers think, portrayed [...]
  • Subjects: AI
  • Pages: 11
  • Words: 3114