Tech & Engineering Essay Examples and Topics. Page 8

4,399 samples

Comparison Between two Operating Systems

Windows XP ensures that any free memory in the RAM is allocated to a certain process so as to help in improving the performance of the operating system.
  • Subjects: Computer Science
  • Pages: 19
  • Words: 5256

The Impact of Technology in Education

This essay addresses the issue of technology in education by summarizing a scholarly article on the subject and synthesizing the impact of technology in education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 582

The Improvement in Technology

The better technology the industry has, the greater the computing power and in effect the faster, persuasive and competitive the product becomes.
  • Subjects: Applications
  • Pages: 10
  • Words: 2824

Aircraft Maintenance Process

Effective aircraft evaluation results in the determination of its existing state and the probability of the failure of its body and engine parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 588

Negative Influence of Cell Towers

However, the vast majority of researchers claim that it is necessary to continue research in this field and at the same time it is important to limit people's exposure to cell towers.
  • Subjects: Phones
  • Pages: 2
  • Words: 581

Data Warehousing and Its Benefits for Organizations

The report defines what data warehousing is and explains in details the importance of data warehousing in an organization. The implementation of the SAP in Lenovo has brought more benefits to the Company.
  • Subjects: Data
  • Pages: 5
  • Words: 1372

The Formation of the TSA and the Effect on Air Travel

The famous terrorist attack on the Twin Towers on September 11 of the year 2001 in the US was a key event that heighted the security awareness concerning the susceptibility of the transport modes especially [...]
  • Subjects: Aviation
  • Pages: 15
  • Words: 4164

Evolution of Fire Protection Codes

With regards to the findings in this research paper, the following hypothesis seems relevant: despite the gradual improvements made to fire protection codes, noncompliance and the challenge of dynamic nature of fire disasters continue to [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3864

Technology Development In Asia

The science and technology in the Republic of India, for example, has employed advanced technologies in the manufacture of commercial vehicles.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1619

Technology Fails to Deliver Happiness

With the advancements in information technology and the massive use of the internet, communication has become quite effective as people can connect when they are in different countries around the world, at any time.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1359

Technological Access, Literacy and Fluency

However, not all members of the community surrounding the University are technologically literate. To improve access to digital technology in Michigan Technological University and the surrounding areas, various measures should be put in place.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 792

Impact of New Forms of Technology on Our Understanding of Pornography

This paper therefore shows that technology has completely changed concepts of the production of pornographic material, the distribution of pornographic material, access to pornographic material and our understanding of the concepts of privacy and identity.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2276

Pilot’s mission in flying jet aircraft and spacecraft

The technical skills possessed by these pilots and their ability to fly sophisticated aircrafts both in space exploration missions and air combat has evolved since 1945 and undoubtedly continuous to play critical role in the [...]
  • Subjects: Aviation
  • Pages: 5
  • Words: 1514

Ethics and Computer Security

The introduction of computers and the internet in the 1970s marked the end and the beginning of a new era where human labour was no longer required in the production of goods and services.
  • Subjects: Computer Security
  • Pages: 6
  • Words: 1549

The Airbus Fly-By-Wire Control System

In fly-by-wire, the control of the aircraft is only achieved through the use of electrical signals. The fly-by-wire control systems have enabled automatic stability system to be included in the plane and act autonomously to [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1651

Technological Generations of Mobile Communications

Thus the use of this technology is dependent on the proximity to power supply. Thus, it is arguable to conclude that the development in the wireless communication cannot be optimum.
  • Subjects: Phones
  • Pages: 5
  • Words: 1333

Analysis of Sony PS3

As a gaming console the PS3 promised, and subsequently delivered, games which would literally astound gamers with the depth of the graphics and the greater degree of in-game features not present in the previous generation [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 592

Microsoft Information System

The validity and reliability of the data is also analyzed by a variety of tools and techniques feeded in the system just to enhance total quality management and other related knowledge.
  • 5
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3007

Music Industry and Technology

The paper further describes some of the technological innovations and analyses how the innovations have contributed to the positive growth of the music industry.
  • Subjects: Other Technology
  • Pages: 14
  • Words: 3878

Information Retrieval Methods

The search mechanism is the system that allows for the searching of the database for the retrieval of the information stored in it.
  • 4
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2493

Drone Technology and the Future

The author focuses on individuals whose level of success goes beyond the imagination of most people and challenges the reader to analyze the interplay of factors such as family, culture and friendships in influencing the [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 825

Fibre Optic vs. Coaxial Cables: Advantages and Disadvantages

The cables are used mainly for the transmission of data from different terminal points, including computers and televisions. The cables are also immune to noise interferences that affect the quality of coaxial cables.
  • 2
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1111

Internet Censorship in Saudi Arabia

The censorship is charged to the ISU, which, manage the high-speed data links connecting the country to the rest of the world.
  • 1
  • Subjects: Internet
  • Pages: 5
  • Words: 1471

How to Use an Automatic Gas Cooker

Place the gas control knob on to the gas cock axis and push it inward firmly. Maintenance of your gas cooker Always clean the top of your gas cooker with soap and water and dry [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 623

Impact of Technology on Education

The history shows that technological progress and modernity are closely interconnected, arranging a tandem for the development of more sophisticated techniques for the cognition of the surrounding world.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1715

Hacking: Positive and Negative Perception

The possible advantage of cooperating with hackers for security systems mangers of international organizations and governmental organizations is the probability to recruit them and use their knowledge to empower different organizations to improve their security [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 538

Hardcopies Versus Softcopies

Today it is possible to have the electronic versions of the physical reading materials such as the encyclopaedias, dictionaries or bibles, which are easy to access at any time or location as opposed to carrying [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1119

Sample of Chart or Graph

While the stacked bar chart is very helpful in understanding the overall votes by respondents as well how many considered each focus area as critical or high, it does not give an idea of the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 559

Pros and Cons of Information Technology

Some of the disadvantages of the improved technology include new forms of pollution that are as a result of the gadgets used to access the resource.
  • Subjects: Internet
  • Pages: 2
  • Words: 609

Inventions That the World Would Do Without

For instance, the invention of communication technology has been of great help to the entire world because of the convenience and reliability it has come with.
  • 5
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 568

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Subjects: Internet
  • Pages: 3
  • Words: 832

Privacy Risks and Tech Use Among the Elderly

With the rise in popularity of smartphones and tablets, the elderly now make up a sizable portion of the population who utilize digital goods and services.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1611

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

Low-Code No-Code Platforms’ Cybersecurity Risks

In conclusion, the cyber security risks of using low-code no-code platforms can be significant. While users find it easy to design software without much skill in programming languages, they should understand the security implications of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

Quantum Computing and How It Will Change Society

The introduction of this paper presents the basic principles and ideas of Quantum Computing. It is a cornerstone of quantum theory and the basics of Quantum computing.
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4160

Digital Certificate Management

The paper focuses on the process of issuing and managing digital certificates, discussing the weaknesses and vulnerabilities of different methods and the issues with revoking certificates, and possible remedies.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1223

The Histogram Concept Definition and Examples

For example, through the creation of a histogram with the frequency of purchases and the class interval of age that shows the range of age groups in comparison with the number of purchases, marketers receive [...]
  • Subjects: Data
  • Pages: 2
  • Words: 596

Electrical Multimeters: Overview and Application

It is a crucial tool for the electrical and electronics industries because it enables electricians and techs to identify electrical issues, analyze circuitry, and test electrical parts [1].
  • Subjects: Other Technology
  • Pages: 2
  • Words: 589

The Home Internet and Network Security

In addition, system security should be considered as well in this case, the reliability of passwords, the latest firmware, and the availability of website filtering should be assessed.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 400

Coarse- and Fine-Grained Parallelism

Fine-grained parallelism uses smaller parts of the program for parallel processing and requires a large number of threads to perform tasks.
  • Subjects: Programming
  • Pages: 3
  • Words: 914

Powerful Impacts of the Use of Gadgets and the Internet

Overall, researchers highlight both the advantages and disadvantages of smartphones and the Internet, but most tend to focus on the bright side of the situation, and I support their view.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 836

Recovery of Airbus A380 From Failure

The demise of the A380 can be linked to various issues, including a change in the market as well as reduced demand for the craft, that is regarded among the largest airplanes.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2316

Principles of Fire Prevention and Safety: An Overview

The public's knowledge of fire safety, the evaluation of building plans for both new and existing structures, and the investigation of fires are further grounds for carrying out fire inspections and fire safety enforcement activities.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1152

The Department of Homeland Security’s Cybersecurity Mission

Cybersecurity is evolving rapidly, and DHS's cybersecurity mission is equipped with models adapting to the ever-changing security and information dynamics. The DHS cybersecurity mission is designed with models that adapt to changing dynamics and landscapes.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 357

Cargo Security Planning and Risk Assessment

Cargo security planning involves analyzing the risks and creating solutions that minimize the challenges during the movement of goods. This may include the use of technology to ensure that cargo is theft-proof.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 402

Aspects of the Fire Prevention and Safety

According to the 2019 International Building Code, materials and features in buildings need to be structurally fire-resistant to safeguard against the spread of fire and smoke.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 613

Academic Writing Under Impact of Technology

A study of the impact of technology on academic writing will determine the potential future development of different types of academic writing.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1264

Cloud-Based Attendance Software

In the context of data storage and retrieval, a cloud-based database is designed to operate in a public or hybrid cloud environment.
  • Subjects: Programming
  • Pages: 8
  • Words: 2242

Linked Lists as a Data Structure

The linked list begins with a HEAD, which designates the beginning or the location in memory of the first node. The pointer to the list's first node is found in the circular linked list's last [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 591

Big Data and Python Tools for Data Analysis

Volume describes the amount of data, variety refers to the complexity of the data types in the set, and velocity defines the rate at which new data is generated.
  • Subjects: Data
  • Pages: 2
  • Words: 565

Data Presentation and Visualization

I would use a graphical method to present the data in the report. On the other hand, data presented in a column of numbers is difficult to understand and draw insights for decision-making.
  • Subjects: Data
  • Pages: 2
  • Words: 618

Technology Skills in Professional Writing

Ultimately, it is up to each writer to decide whether or not they feel that age is a factor in their ability to pursue a successful career in writing.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 701

Experiences of Beginner in Python Programming

Difficulty in working with Python for me is understanding what and how to include in the code. Thus, Python is in high demand in IT and, at the same time, is known as a programming [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 570

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

The Artificial Intelligence Use in Solar Panels

The use of solar PV panels as sources of renewable energy has been gaining traction in the recent decades. This implies that the output of energy in PV solar panels is often unstable.
  • Subjects: AI
  • Pages: 5
  • Words: 1430

The Airworthiness of Aircraft Analysis

The maximum coefficient of braking friction of the landing gear to the ground for the runway must be corrected for the effectiveness of the anti-skid system on the runway.
  • Subjects: Aviation
  • Pages: 3
  • Words: 867

Google Docs as a Tool for Collaborative Writing

The significance of the problem: the inability to adapt teaching practices to the needs of ELLs is likely to result in a continuing learning gap for all current and future students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 688

Artificial Intelligence in the Transportation Industry

Following that, key achievements in the transportation business included the introduction of bicycles in the early nineteenth century, automobiles in the 1890s, railroads in the nineteenth century, and airplanes in the twentieth century.
  • Subjects: AI
  • Pages: 5
  • Words: 1402

Aspects of Business in the Digital Era

The purpose of this research proposal is to explore how businesses are operating in the digital era, specifically the prevalence of fraudulent activity and intrusions by hackers in commercial enterprises in the digital era.
  • Subjects: Accidents & Protection
  • Pages: 11
  • Words: 3125

Technology in Nursing Education

Such students have the right to receive the same learning opportunities, which is why textbooks, in-person assistance, and in-print information provision are some of the measures that can be applied.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

The Role of Databases in Organizations

In the contemporary technology-driven world of business, the use of information technologies is essential for the efficient and competitive implementation of business practices.
  • Subjects: Data
  • Pages: 1
  • Words: 291

Internet Sources: An Evidence-Based Internet Source

Due to the evolution of the media, as well as the appearance of the Internet in people's lives, it is safe to say that the problem of information hunger for the average person as a [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 283

The Autopilot Systems: Examples of Devices

The Pixhawk 4 and MP21283X autopilots with different characteristics to redundancy are analyzed, as well as the NASA Swift UAV using off-the-shelf autopilot solutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 702

Technical Evolution of Automobiles

In 1888, the practically of Benz's car would come to test when his wife, Bertha, and their two sons embarked on a journey using a better version of the car.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2235

Principles of Semiconductors and Emitters Testing

The test is based on the notion that a bipolar transistor may be thought of as two back-to-back diodes, and by checking the diode between the base and the collector of transistors.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4525

Using Technologies in Kindergarten Classrooms

Integrating modern technologies into the educational process in kindergartens helps educators transmit knowledge to the children and influence their emotions and perception of the materials.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1671

The Role of Big Data in Marketing

The accumulation of Big Data is the result of the new marketing environment, which was created by the digital world we now live in for marketing firms.
  • Subjects: Data
  • Pages: 2
  • Words: 560

Smartphone Technology and Its Brief History

One of the ways that prove smartphone technology has impacted the global economy is the dramatic increase in the capacity to communicate and collaborate.
  • Subjects: Applications
  • Pages: 8
  • Words: 2212

Artificial Intelligence in Marketing

Artificial intelligence in marketing is a method of using customer data and AI concepts, including machine learning, to predict the next step of the consumer and meet his needs, even those that the consumer has [...]
  • Subjects: AI
  • Pages: 2
  • Words: 621

Synthetic Fabrics as Technological Development

Fabrics such as polyester, nylon, neoprene, and spandex were invented in the 30-the 40s of the 20th century and are still actively used in the production of not only clothing but also other goods.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 562

Why Linux Is Better Operating System Than Windows

The second reason why Linux is better is the relative reliability of the system and its resistance to hacker attacks, which is also due to the branched principle of individual encoding of each particular OS. [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 284

The Concept and Underlying Science of Hyperloop

The representatives of the two firms argued that there was a great possibility of implementing the Hyperloop in the Middle East or Asia because of the increased need for fast and efficient transport and reduced [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2035

Aluminum vs. Mild Steel Comparison Experiment

In addition, to yield strength, percentage of elongation, and ultimate strength, the tensile test experiment may be used to assess additional mechanical properties of the specimen.
  • Subjects: Engineering
  • Pages: 10
  • Words: 687

Email Scams and Auction Fraud and How to Avoid Becoming a Victim

This paper aims to explore cybercrimes such as email or website scams and auction frauds to identify available protections and measures to avoid becoming a victim. Email or website scams and auction fraud are cybercrimes [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 715

Software Recommendation Memo for LinkedIn

In this regard, the optimization of the accounting procedures is required to enable the efficient distribution of the company's budget. The reorganization of the internal accounting procedures implies a variety of approaches to developing and [...]
  • Subjects: Programming
  • Pages: 4
  • Words: 1218

White Hat and Black Hat Hacking

On the other hand, White Hats work with companies and help them identify weaknesses in their systems and fix relevant vulnerabilities to ensure that attackers cannot illegally gain access to data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 608

Hackers: The Good, the Bad and the Gray

They are the most familiar with the latest methods of Black Hat hacking, thus making it possible to prevent attempts and reinforce security.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1146

Cyber Security Issue: RansomWare

Until the victim pays a specific amount of money to the attackers within a particular time, cybercriminals can use the virus mentioned above to access the user's sensitive personal or organizational information. The infection and [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1225

Choosing a Server for a Company

A server is a computer that is used to share resources and manage processes across a network, and it frequently connects to the internet to assist remote users.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 288

Digital Technology Impact on Study of Languages

In addition, the authors emphasize the need for teachers to acquire relevant knowledge and skills to survive and impart the best of knowledge to the students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Aspects of Databases in Hospitals

Nevertheless, it is also valid that a large number of external sources might slow down the speed of data processing and reduce the overall accessibility.
  • Subjects: Data
  • Pages: 2
  • Words: 546

How to Become a Videogame Designer

Having interest, love and involvement in the video games themselves from the user's point of view already endows such a person with a number of qualifications that allow him to participate in the creation of [...]
  • Subjects: Programming
  • Pages: 1
  • Words: 363

The Cybersecurity Threat Landscape

The threats may come from different sources, and the criminals may focus on distinct vulnerabilities in the security of the system.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1367

Technology Influence on Problems of Modern Society

In the globalized and digitalized era, it is vital to preserving the balance and control physical activity, food habits, and relationship patterns to avoid suffering from the negative aspects of technologies and their dominance in [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 620

Technological Development of Civilizations

The current stage in the development of human civilization is closely related to the use of technology. The fundamental thesis of his writings is that technology contributes to the development of human communities but that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1214

The Digital Workplace Transformation Issues

In this research, it is important to emphasize the significance of the digitalization of the present workspace and all the consequences, challenges, and obstacles that are associated with them.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1172

Is the Internet Affecting People Negatively?

Opponents of the Internet tend to view and criticize it one-dimensionally as a source of mindless entertainment, whereas in reality, it is rich with potential uses that have their unique properties.
  • Subjects: Internet
  • Pages: 5
  • Words: 1306

GG Freightways Mobile Marketing Application Project

The mobile marketing application intends to assist in tracking the whereabouts of the goods transported hence contributing to the timely delivery of the freight to the clients.
  • Subjects: Applications
  • Pages: 5
  • Words: 1379

Technoscience and Humanity in the Elysium Film

Moreover, the concepts of transhumanism and artificial intelligence are analyzed in the context of the corrupted social order to draw on the failure of humanism, ethical and moral decay, and prosperity of the wealthy.
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1993

Information Technology Code of Ethics & Responsibilities

According to the social contract theory, the government has the obligation of ensuring the security of individual and organizational information by instituting laws on the protection of their privacy.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 528

The Delta Airlines Flight 191 Crash

When the pilot successfully flies through to the other end of the microburst, the direction of the wind changes and becomes a tailwind because it is now behind the plane.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2849

Identity Management for Systems in a DMZ

Connecting internal corporate services to the internet is a challenge because exposing these servers to external environments poses a massive risk in terms of security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 306