Tech & Engineering Essay Examples and Topics. Page 8

4,333 samples

Cell Phones Use in Public: Naturalistic Observation

Using the naturalistic observation, this study aims to provide the discussion of how Americans use cell phones in public places and react to the other people's use of technologies.
  • Subjects: Phones
  • Pages: 5
  • Words: 1315

The Use of Mobile Phones in Modern Society

The paper would discuss the emergence of mobile phones as the only tool for future needs. People can also open accounts through the phone and ask for loans through the same device.
  • Subjects: Phones
  • Pages: 2
  • Words: 577

Airport Security and Air Travel Safety

The study was based on an evaluation of the evolution of airport security with respect to the general safety of this mode of transport.
  • Subjects: Aviation
  • Pages: 12
  • Words: 3316

Pumps Concepts and History

The imbibing and suppuration nozzles in a single stage horizontal split centrifugal are integrally built in the lower half of the chamber and on the same horizontal centreline.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1344

Screwdriver – Mechanism Description

The fulcrum shank of a hex nut screwdriver is a metallic rod that is attached to the handle of the screwdriver and ends with a blade.
  • Subjects: Engineering
  • Pages: 2
  • Words: 579

Technologies: Holograms History and Types

The reference beam travels independently through a series of mirrors to the film plate while the object beam passes through a series of mirrors to the object and finally to the film plate.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1276

Recording Studio Equipment: Hardware and Software

The purpose of this report is to present the information on the necessary equipment to purchase; the justification of the equipment choices; the discussion of the equipment connectivity and the diagram; and the budget table [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1500

The Best Material for Making Toolbox

The shop believes that the short-termed life of the kits is attributed to the materials used in making the toolboxes. Similarly, it was noted that the cost of acquiring aluminum alloy was cheaper than the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 834

Reliable Communication in Distributed Applications

What happens in a client-server communication style is that, a client communicates a request to use the resources to the server, while at the same time the outcome of the request is communicated to the [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1660

Thermistor and Its Applications

This paper examines the working mechanism and applications of Thermistors Thermistors are special kind of variable resistors whose resistance changes with changing temperature i.e.a change in thermal temperature results in changes in its resistance value.
  • Subjects: Engineering
  • Pages: 2
  • Words: 668

How Tablets Changed Everything?

In spite of the fact that tablets allow people not to worry about their mistakes, weaken the analysis of the reading and worsen literacy abilities due to reading text with the help of a screen, [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1375

Remix Culture on the Internet

Thus, it is inevitable for a remix to face legal issues when a part of the original piece is copied, adapted, or reproduced without the agreement and permission of the copyright owner through a Creative [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2213

The NBA 2K Game as the Element of Popular Culture

Despite the original aim of producing the series of popular video games NBA 2K is a popularization of basketball among the representatives of the modern situation, the release of the series also focuses on advertising [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 555

Presentation Importance in the Business

In my future presentations, I will consider some of the techniques mentioned in this article that include creating client newsletters, marketing postcards and presentation folders to enhance efficiency and exhibit a level or organization.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 550

Computer Security and Computer Criminals

The main thing that people need to know is how this breach of security and information occurs and also the possible ways through which they can be able to prevent it, and that's why institutions [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 1026

Older Drivers: The Age Factor in Traffic Safety

The main points identified by the article are that older drivers make more mistakes as they age, as they cannot maintain the same reflexes they had in their youth.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 606

Technology and Personal Devices

It is obvious that many programs and applications greatly help collect, organize and store data and statistics, as well as manipulate information, represent it graphically and send it to a distant location, and this has [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 580

Singapore Airline

The main objective of the analysis is to have firsthand experience of the problems facing the company and gain knowledge concerning probable developments and potentials.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1596

Pros and Cons of Waterfall Model

When the engineer and the client identify all requirements and the design, then the model can enhance superiority and security of the product.
  • Subjects: Programming
  • Pages: 7
  • Words: 2008

The Impact of iPad on Children between 2-10 Years

The objective of this program is to bring out the negative effects of using iPads among the children. The program intends to enlighten the parents on the need to limit the number of hours their [...]
  • Subjects: Phones
  • Pages: 4
  • Words: 1024

Google Docs Challenges and Opportunities

In this paper, I will discuss the Google Docs as a one of the prominent tools for collaboration, and try to present the challenges that are faced in its implementation, and how they are overcome.
  • Subjects: Applications
  • Pages: 5
  • Words: 1483

Technology Evolution in The Modern Society

Service perspective - which holds that e-commerce constitute a tool that fulfills the needs and desires of companies, customers and management with aim of reducing the transaction costs while at the same time being able [...]
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4289

Computers and Information Gathering

On the other hand, it would be correct to say that application of computers in gathering information has led to negative impacts in firms.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

Cloud Computing Pros and Cons

In a computer system using cloud computing, the workload of running applications is shifted from the local computer to the cloud, which consists of network computers.
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2752

Construction Safety in Latino Community

The study seeks to: Examine the prevailing status of construction safety and accidents among male workers in the Latino community, especially in the construction industry.
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3914

Integrating Technology Into the Classroom

The types of quantitative information that would be helpful for evaluating the effectiveness of the imposed measures include the results of students' standardized tests and statistics data as to the rate of students' dropouts after [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 831

Solar Photovoltaic (PV)

Role of subsidiaries, in this case, would be to foresee the completion of grid-based rural electrification to off-grid areas that have poor and dispersed population.
  • Subjects: Engineering
  • Pages: 13
  • Words: 3763

Monopolistic Competition of Smart Phones

In the flurry of the responses that followed, there was concern whether the smart phone market was becoming monopolistic. This was a clear indication that the competition in the smart phone market was becoming monopolistic.
  • 4
  • Subjects: Phones
  • Pages: 3
  • Words: 863

Effects of the Internet

The dawn of the internet phenomenon has completely changed the way people conduct their daily activities. The above statements exemplify and amplify the benefits of the internet revolution.
  • Subjects: Phones
  • Pages: 3
  • Words: 746

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

Impact of Technology on Teaching

The demographics of the Department of Defense Education Activity schools highlight the nature of students and the expected challenges in both teaching and learning.
  • 5
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 2760

Data Communication and Networking

So as to expound on this topic, this paper shall discuss: the term Internet; the three networks that were involved in the first test of TCP/IP protocol and conduction of the test; the standard used [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2821

Internet Key Exchange Protocol

On the other hand, a symmetric data encryption, also referred to as conventional data encryption, uses a common key to encrypt and decrypt data.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 828

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 4954

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

The Internet Radio: A Critical Discussion

Through a critical examination of the concept of Internet Radio, the current paper will seek to extrapolate how users of the medium can create and place content over the internet and how users can use [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 982

Technological impact of the Samsung NC215S Netbook

While many netbooks and laptops have been launched with great technological features, the thing that sets this Netbook apart from others is that its lid carries a solar panel on the top that allows the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 601

3D Printing Industry and Market

One can understand the industry of 3D technologies in terms of the software technology, the hardware and the nature of the products.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1672

Threat to Civil Aviation-Hijacking

The 9/11 attacks on the United States' civil aviation industry demonstrated the extent to which terrorism can cause damage to the economy of a country and mass murder of innocent individuals. On the other hand, [...]
  • 1
  • Subjects: Aviation
  • Pages: 8
  • Words: 2192

Push Versus Pull Technology

Therefore, the number of business applications as well as the tools and protocols that guide the operations of the internet will keep on increasing.
  • Subjects: Internet
  • Pages: 6
  • Words: 1617

The Popularity of Video Games and Their Benefits

Are the benefits of playing violent video games, on the one hand, and the benefits of playing pro-social video games, on the other, can be considered qualitatively different?
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3122

Effects of Technology on Tertiary Education

By referring to the technology, they seek to ensure that their students have the necessary technological expertise required in the job market.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1415

Technology Fails to Deliver Happiness

With the advancements in information technology and the massive use of the internet, communication has become quite effective as people can connect when they are in different countries around the world, at any time.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1359

The Invention of Television

According to Street, Paul Nipkow developed the Nipkow disc in 1884, which was capable of transmitting pictures by use of a cable. In the earlier times, it was hard to send a message for its [...]
  • Subjects: Other Technology
  • Pages: 14
  • Words: 424

Online Gaming as a Technology Based Entertainment

The use of web-based games and simulations has raised a lot of concerns due to the impact it has had on the lives of the students and the lives of individuals at home and at [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 802

Virtual Reality Technology

The third negative impact of virtual reality is that it causes human beings to start living in the world of fantasy.
  • 5
  • Subjects: Other Technology
  • Pages: 2
  • Words: 610

New Technology Training in Hospitality Industry

The emergence of new technologies in the hospitality industry has made it possible to enhance training and learning among the employees and the management team.
  • 4.5
  • Subjects: Applications
  • Pages: 11
  • Words: 3016

Globalization and Digitalization

The tools that are necessary in the technological exodus from the traditional mode to higher fashions have posed a challenge in the labor force in relation to the level of expertise.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Brief History of the Boeing 787

The above information on the Boeing 787 is crucial as it has given the quest to explore the power behind the success of the aircraft in the market.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Computer Safety: Types and Technologies

The OS of a computer is a set of instructions communicating directly to the hardware of the computer and this enable it to process information given to it.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2917

Airports Electronic Gate (E-Gate)

The invention and innovation of computer applications has resulted in the development of electronic gate used in airports; the innovative electronic passport control system is used to boost security and facilitate the flow of people [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1621

Privacy and Safety on the Internet

The user should have knowledge of how his or her information is being collected, the purpose of collection and how the party is going to use the information. The final security measure to ensure safety [...]
  • 3
  • Subjects: Internet
  • Pages: 4
  • Words: 1126

Aspects of Internet Censorship by the Government

When one try to access a website the uniform resource locator is checked if it consists of the restricting keyword, if the keyword is found in the URL the site become unavailable.
  • Subjects: Internet
  • Pages: 8
  • Words: 2145

The Evolution of the Personal Computer and the Internet

Due to the complexity of the subject matter it is necessary to digress once more and discuss briefly the history of the World-Wide-Web so that there is a clearer understanding of what it is all [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2435

Lockhart River Plane Crash

It is also clear that the radar squad did not continuously observe the position of the plane; furthermore, it was fathomed minutes later that the plane was absent Systems and Methods The cause of the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2761

Description of Global Positioning System Device

Image 1 shows the positions of the various satellites that constitute the GPS. It is done to establish satellite clock and orbits profiles in order to update the navigational information of individual satellite.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Technology and Negative Effects

The unfortunate part is that people do not pay attention to the growing concern and continue using the social networks. All of this is impossible to see and feel over the internet or texting.
  • 1.5
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1442

Prezi vs. PowerPoint

In making presentations, the choice of presentation software to be used will be dictated by the amount of information the presenter wishes to pass to the audience, as well as the format of data the [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1702

Fibre Reinforced Plastic

Secondly, it is important to consider the change in the stiffness of the member to be strengthened. This requires the use of FRP composite, which is bonded to the tension face.
  • Subjects: Engineering
  • Pages: 2
  • Words: 370

Network Technology NA 4

This network is usable in the Local Area Network and the Internet. A directory service is the type of software that keeps, arranges and avails information in a directory; it is an information store as [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 808

The Issue of Privacy

In the magazine article named 'Privacy and the Limits of Law', the author Ruth Gavison has pointed out that perfect privacy is impossible to be achieved most of the times with the emerging technologies in [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2208

The Computer Microchip Industry

For instance, the company can decide to focus on durability and by doing so, the company will have a competitive advantage in the market.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 938

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

Wind Turbines Manufacturers Overview

Sinovel has been a leader of the Chinese market in producing innovative turbine equipments in the sense that; it is the first to introduce an advanced wind turbine in the world, it was the first [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2729

The Internet’s Good and Bad Sides

On the other hand, the internet is the root of some of the bad evils that have befallen many people, true and the internet is the beginning of what Gibson described as a place to [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1632

Smart Classroom and Its Effect on Student Learning

In the event of a need for some practical experience, there was some assembly of some equipment in a separate room such as a laboratory and the teachers together with the students engaged in the [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1628

Design a helper

Therefore, personal robots in addition to making life easier should be able to perceive and understand the surroundings. However, robots are a source of worry in the future as they can be risky to humans.
  • Subjects: Robotics
  • Pages: 4
  • Words: 1091

Rescue Operation for Trapped Chilean Miners

This helped the rescuers in knowing the conditions inside the mine, more importantly; the holes were used to send food, water and medication to the miners.
  • 1
  • Subjects: Engineering
  • Pages: 4
  • Words: 543

The Cloning Controversy

Considering the fact that most of the controversy about cloning arises from misinformation or ignorance about the matter, this study shall set out to conclusively research on cloning and its merits so as to attest [...]
  • 3.5
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1207

Computer Fraud and Contracting

The law does not provide the consumers with measures to enforcing the online contracts because the argument is that, it is impossible to tell the intention and the consent of the consumer when they signed [...]
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 1836

Machinery and Modern Industry

The main thrust of the essay though was not to point out how effective machines are in increasing the means of production, rather, it was the intention of Marx to reveal how the use of [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1737

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

Technological Inventions: The Adverse Effects

The whole issue necessitates concerted efforts from all humans and the acceptance that people's knowledge is limited for the realization of a real solution.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 601

Efficient Windows 10 Implementation Guide

The firm needs to upgrade and use the Windows 10 Enterprise operating system once it decides to upgrade. The first part will show the upgrade matrix and the security features of Windows 10.
  • Subjects: Applications
  • Pages: 5
  • Words: 1287

Education: Impact of Technology

As the use of technology in the classroom increases, people have to be more mindful of ethical issues that arise from it. It is important to remember that there are also legal issues connected to [...]
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 399

The Yankee Stadium: Impact of Technology

Chiefly, the new stadium was founded in order to accommodate the technological advancements needed for the stadium and events held there to thrive.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 321

Trends in the Cyber-Threat Landscape

This chapter reviews trends in the threat landscape, including human mistakes, crisis events, the growth of artificial intelligence and the Internet of Things, and the evolution of cyber-attacks in terms of purposes.
  • Subjects: Cyber Security
  • Pages: 9
  • Words: 2360

Aspects of the Cybersecurity Theories

Constructivism indicates that states' beliefs of the significance of cybersecurity and the norms around cybersecurity are crucial elements in shaping their conduct in cybersecurity. The use of coercion and intimidation to achieve political aims is [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 669

The Home Internet and Network Security

In addition, system security should be considered as well in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 400

Queuing Theory at Heathrow Airport

The arrival time, service and departure processes, the waiting regulation, the lineup size, and the customers being serviced are the six components that make up a line as it is studied employing queuing theory.
  • Subjects: Aviation
  • Pages: 3
  • Words: 946

Engineering: Technological Discipline

With software engineering, students are taught about computers and technology and how they can code programs and design applications, software and websites. The most popular and growing professions are electrical engineering.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Cybersecurity in the Financial Services Industry

In reaction to ransomware attacks, a business such as a bank may have to spend a substantial amount of money, which may cause customers to lose faith in the safety of their funds.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1133

Information System and Its Various Dimensions

Therefore, the information system is a collection of data, facts, or knowledge integrated in an intentional manner for the purpose of collecting, processing, and storing.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 612

Discussion: “Prisoners of the Wired World”

The article resonates with my personal belief that it is upon human beings to control the use of technology. Having been born in the age of technology, I can relate to Lightman's argument on technology [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 394

Virtual and Augmented Reality in Education

The novelty of this technology can be used by unscrupulous employees as an excuse to avoid preparing for lessons and working with students.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1153

Cybersecurity Contingency & Incident Review Process

Next, it is necessary to implement various stages of digital transformation of cybersecurity, which include improving the maturity of enterprises in cybersecurity issues and the use of new solutions.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1416

Discussion: Reliability and Maintainability

The implications of the potential for failure in production can be minimized if all participants follow a specific plan and share their knowledge and experiences.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 313

The Hybrid Robot Vacuum Cleaners

The EUFY series of hybrid vacuum cleaners is one of the most popular choices in the market, and the company offers products in various pricing ranges. In the context of hybrid robot vacuum cleaners, market [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2869

Researching of Waterfall Model

The Agile SDLC paradigm is a blend of iterative and incremental modeling techniques that emphasizes process scalability and service quality through the fast turnaround of a functional software package.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 697

The Digital Transformation and Innovation Nexus

The practical orientation of the study ensures its applicability in the current economic environment characterized by the increasing complexity of the organizational landscape.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2128