Tech & Engineering Essay Examples and Topics. Page 8

4,428 samples

College’s Database Purpose and Entities

The main purpose of a database is to collect and organize data. Also, it helps the college to keep track of students' activities and interests, and, thus, shows what is better for them and what [...]
  • Subjects: Data
  • Pages: 2
  • Words: 672

The Hacker Subculture Nature and Allure

The Internet connected people all around the globe and changed the face of the society forever. However, with the development of the computer networks, the meaning of the term started to change.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1697

Qualitative Data Analysis Recommendations

All a researcher should do is to open the file in the software itself, underline the piece to be coded and haul the code from the code administrator.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 923

Coding and Data Analysis Process

The concept of pre-coding in qualitative data analysis has been highly focused in recent days. It is worth noting that pre-coding in qualitative data analysis enables the use of computers for tabulating and analyzing data.
  • Subjects: Programming
  • Pages: 3
  • Words: 690

Fire Incident and Emergency Services Reflection

As for the matters of the analysis, the context and the details of the incident will be analyzed from the perspective of possible impacts and consequences, and the scales of these consequences.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2474

Analysis and Interpretation of Text and Image

Text analysis in this discourse will focus on critically examining and analyzing the language structure in the document to identify the communication function of the discourse.
  • Subjects: Applications
  • Pages: 12
  • Words: 3352

Flight Physiology and Human Factors Principles

In the situation where a pilot breathes in the air at high altitudes, there is usually insufficient oxygen pressure to allow ample quantities of oxygen into the casing of the lungs.
  • Subjects: Aviation
  • Pages: 9
  • Words: 2485

Macintosh vs. IBM for Personal Usage

The perpendicular incorporation technique is used in the manufacture of Mac into which the entire Apple hardware parts are integrated and also the personal operating system of the Mac is preinstalled.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1685

Sherry Turkle’s “Can You Hear Me Now”

In one of the conferences she attended in Japan, the author observed how engrossed the attendees of the conference were with their laptops and PDA's.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 1019

Computer Addiction: Side Effects and Possible Solutions

Since that time humanity started to speak of different signs of "computer addiction" the term stands to emphasize the seriousness of the problem and implies the possibility of drastic consequences that computer mania might have.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1534

Fluid Mechanics. Vortex Amplifier

In this way a flow of air is maintained in through the System under control, through the VXA, and out through the vent system.
  • Subjects: Engineering
  • Pages: 4
  • Words: 417

The Concept of 2-Factor Authentication

This article strikes a critical examination of the 2-Factor Authentication with a strong analytical exploration of the pros and cons accruing to this type of authentication.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 828

AutoCAD in Different Fields of Design Technology Study

In the engineering technology, CAD is overwhelmingly used from the conceptual layout and design, through a comprehensive engineering and analysis of constituents, to the definition of the various manufacturing methods used.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3092

Airplnane: Description of the Invention

The credit for the invention of the first powered airplane goes to the Wright brothers Orville and Wilbur. The worlds first powered, sustained and controlled flight in a heavier-than-air airplane was achieved by the Wright [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 587

Open Technology. Marshall Poe’s The Hive Article

For instance, in training their leaders and the staff, you find that these people are in a position to learn online through the use of the internet and this has helped these organizations to reduce [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1297

The UAE Telecommunication Sector

To understand how the country may strengthen the contribution of telecommunications to its economy, the present paper will mainly aim to analyze the sector from the perspective of the theories of competition and monopoly.
  • Subjects: Phones
  • Pages: 8
  • Words: 2267

Multiplayer Online Battle Arena Video Games and Technologies

Online games are consistently evolving and taking advantage of modern technologies to improve the competitive aspects, viewer entertainment, market share, and social benefits in the modern digital age as evident in the example of League [...]
  • Subjects: Technology Effect
  • Pages: 11
  • Words: 2906

Batch Processing and Real-Time Processing

To begin with, one should mention that the time lag is one of the essential characteristics used to distinguish between real-time and batch systems.
  • Subjects: Data
  • Pages: 2
  • Words: 557

Mobile Telephones and Social Life

The main purpose of the project is exploring the positive and negative aspects of mobile phone use in society since the technology is at the forefront of most interactions between modern people.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Software Architecture and Its Styles in Examples

The purpose of software architecture is to solve issues and design problems beyond the basic algorithms and data structures used in software instead of focusing on structural phenomena.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1244

Driverless Cars and Safety Concerns

However, in the future, the application of machine learning might as well make driverless cars safer and their systems "smarter" in a way that they would mimic human reactions to unpredicted events.
  • Subjects: AI
  • Pages: 1
  • Words: 441

Technophobes and Their Fear of Technology

Technophobes assume that they will whether be laid off by the company or will have to commit to continuous learning, which to many people, is a big challenge on its own.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 432

Digital Temperature Controller

The effectiveness of the temperature controller improves the productivity and performance of the machine. The project demonstrates the functions and capabilities of the digital temperature controller.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1151

Electronic Reading Devices, Their Pros and Cons

Such devices may be expensive and unaffordable for some people. Overall, reading on electronic devices offers vast opportunities both for the publisher and for readers of all ages.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 281

ACL Fraud Detection Solution

A midway oversaw additional backing forms that make it simple to keep up the quality and respectability of the location investigation and investigative results.
  • Subjects: Data
  • Pages: 2
  • Words: 594

The Detailed Network Design and Layout Implementation

The internal network is connected to the external network with a T-1 link from Verizon using a dynamic NAT router installed and tested and overloaded with PAT to support a higher number of clients with [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 827

Science and Technology Impact on Globalization

Globalization has by now laid down the phase for this epoch through making the world interrelated further and the tools of empowerment available to all."To start with, Globalization refers to the trend toward countries joining [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 826

Road Accidents and Traffic in Abu Dhabi and Dubai

The proposal is aimed at pointing to the main reasons for the road incidents based on the reports and other literature sources with the purpose to allow the specialists to offer the solutions to reduce [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1400

Office Automation Software in the School

Teachers of course play the role of providing the content to be used in the application and then it becomes the duty of software developers to come up with the complete software that suits the [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 548

Audio-Visual Media and World Wide Web in Education

Due to manifold effects of technological innovations, education has undergone positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide Web, one [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 785

Cyber Attack on eBay Company: The Summer of 2014

Thus, one of the most famous cases in the world, which related to the hacking of important information, was the attack on the database of the world-famous online store eBay.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3081

Software Development Life Cycle

Nevertheless, software development is a process that involves certain risks, as the SDLC framework is prone to weaknesses from the start of the project and until the acceptance of the final product by the customer.
  • Subjects: Programming
  • Pages: 3
  • Words: 885

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1445

Regulatory Requirements for Flight Crew: US and UAE

Considering the volume of air traffic, airports, and operators in the US, the FAA has extensive rules and regulations. To a large extent, GCAA has followed the rules and regulations of the FAA on many [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2314

Human Factors in Aviation Accidents

This fatal accident led to the death of all the passengers and members of the crew. The second framework that can be used to analyze the role of human factors in aviation accidents is the [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1663

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
  • 5
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1413

Hacking: White, Black and Gray Hats

Living in the era of the Internet and online technology increases the vulnerability of the information stored online and on electronic devices.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1391

Mechanical Engineering Education and Profession

This paper is aimed to prove that even though two years of technical studies is enough to work in the sphere of Mechanical engineering as a technician, it is not enough to prepare an efficient [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1176

Turbine Engine and Its Development History

Arguably, the history of the turbine engine dates back to the era of the Old Testament of the Bible. The first engine to demonstrate the viability of the gas-turbine engine was made of a three-piston [...]
  • 5
  • Subjects: Aviation
  • Pages: 5
  • Words: 1268

The Importance of Strong Password

A password is what confirms to the computer or any other digital device that is protected by a secret code that the person accessing the information is who he/she claims to be. One of the [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 575

Fire Incident in India

Fire codes aimed to maintain and inspect the use of different fire protection items to sustain active fire safety measures. Fire codes provided effective measures that encouraged residents to minimize the chances of causing fire [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 633

Prescriptive Airport Security, Its Pros and Cons

It is also important to point out the fact that the current security procedures and protocols are based on a set of assumptions, one of which is that compliance with rules and regulations will allow [...]
  • Subjects: Aviation
  • Pages: 14
  • Words: 3856

Vibration Control in Rotating Equipment

Vibration in rotating machines occurs because the centre of rotation of a machine does not coincide with center of mass. Machine imbalance is the most common cause of vibration in rotating machines.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2170

Sliderocket Use in Education: Step-by-Step Guide

For instance, to add a picture, click on the 'Picture' icon and select the location of the picture. Select what to import, whether PDF or PowerPoint and click on the 'Next' button as shown below.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1638

Mobile Applications’ Benefits and Challenges

The other factor to consider is the number of handsets obtainable for a mobile platform and their characteristics. Additionally, it also determines the type of mobile devices that can use the applications.
  • Subjects: Applications
  • Pages: 6
  • Words: 1646

The Role of Social Media in Aviation Crisis Management

Therefore, this paper considers the general role that social media might play in a crisis or emergency in the airline industry and describes methods that could be used to deal with the potential adverse outcomes [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 3603

Computer Based Learning in Elementary Schools

The main purpose of the research is to consider the background of the chosen sphere, the elementary education, and discuss current business issues in the computer technologies which may be used in the sphere and [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2230

“IT Doesn’t Matter” by Nicholas Carr

And it is impossible to disagree with Nicholas Carr when he claims that IT experiences the phase of commoditization. For example, it is possible to adopt the proprietary technologies that would provoke the diversification of [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 835

Twitter Usage in Education: Advantages and Disadvantages

Students use twitter for class discussions, which involve discussing questions and other issues that are learned in class by using a username account, it is also used to promote writing, editing skills and it improves [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1539

Underwater Welding and Safety Measures

In the past decades, the safety of the underwater welding practice has been put into question, thus prompting the need to address the issue. The purpose of this paper is to provide a detailed report [...]
  • Subjects: Engineering
  • Pages: 10
  • Words: 2773

Overview of the Texas City Disaster, 1947

The severity of the disaster was primarily attributed to the captain, who ordered the crew to close hatches in order to preserve the ammonium nitrate.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2534

Safety Management at Construction Sites in the UAE

Safety management is the process that helps to define the principles of work and measure the processes to prevent different types of accidents and injuries that can lead to the negative outcomes for an organisation [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 549

Profiling and Maintaining Passenger’s Travel Experience

Governments and passengers are required to comply with international aviation standards and legal requirements that have further strengthened the need for more stringent rules to profile customers, leading to the accusations that profiling is intrusive, [...]
  • Subjects: Accidents & Protection
  • Pages: 24
  • Words: 5081

Mobile Device Attacks, Security and Defence

Mobile devices are secured through the installation of security programs, use of passwords that are difficult to guess, and data encryption.
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1710

Remix Culture on the Internet

Thus, it is inevitable for a remix to face legal issues when a part of the original piece is copied, adapted, or reproduced without the agreement and permission of the copyright owner through a Creative [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2213

System and Application Software Difference

Both system software and application software are programs for the computers, but system software includes the programs that are provided together with the installation of the operating system for the computer.
  • Subjects: Internet
  • Pages: 2
  • Words: 581

Watching TV Makes You Smarter?

Although it is true that watching TV and playing video games can be mentally stimulating activities, it is important to remember the value of selecting shows and video games that can help children accomplish the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 891

Components and Aspects of Whistleblowing in Engineering

The purpose of this paper is to explore components of whistleblowing in engineering through case studies of notable cases in various fields and professions, including cases of Michael DeKort, Franz Gayl, and Diane Hartley.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4292

How Does Technology Affect the Economy?

The net effect of this phenomenon is the creation of jobs in developed countries and the loss of jobs in developing nations.
  • 5
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 887

Integrating Educational Technology into Teaching

Educational technology is a process that consists of researching and practicing things which can make the process of learning easier, and the performance of students better.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 712

Automation in the Aviation Industry

Even though automated systems increase the efficiency of operations in the aviation industry, automating the roles of first officers is a bad idea.
  • Subjects: Aviation
  • Pages: 2
  • Words: 627

Technology and Personal Devices

It is obvious that many programs and applications greatly help collect, organize and store data and statistics, as well as manipulate information, represent it graphically and send it to a distant location, and this has [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 580

Skype: All you Need to Know

A number of features of Skype comprise Skype to Skype calls, SMS messaging, video calls, immediate messaging, and the capability to forward calls to cell phones of the users when the user is offline.
  • Subjects: Phones
  • Pages: 5
  • Words: 1390

Computer Technology in the Last 100 Years of Human History

These communication tools are based on computer technology, and are the foundation of younger generations' living. Computer technology is detrimental to the lives of younger generations because it fails.
  • 5
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1113

Google Docs Challenges and Opportunities

In this paper, I will discuss the Google Docs as a one of the prominent tools for collaboration, and try to present the challenges that are faced in its implementation, and how they are overcome.
  • Subjects: Applications
  • Pages: 5
  • Words: 1483

Spatial Data Division of Abu Dhabi Municipality

First the customer goes to the customer service to fill up the request form and inform the office of the request's rationale and the coverage area of the project or study.
  • Subjects: Data
  • Pages: 14
  • Words: 3603

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Subjects: Computer Science
  • Pages: 35
  • Words: 2834

Internet Filtering Positives and Negatives

The issue of keeping of information by governments does not hold because as the government leaves the internet open to no filtering, it only protects the rights of a few individuals.
  • Subjects: Internet
  • Pages: 4
  • Words: 1042

Information and Communication Technologies in Education

Although the representatives of various age groups perceive the information presented with the help of ICT in a different way, the levels of the students' performance and motivation can be discussed as high, and this [...]
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 1969

The Samsung Galaxy Tab

It should be noted that the Galaxy Tab is based on the successes of the Galaxy S.whereas Apple's iPad was the first of such gadgets into the market; Samsung already had Galaxy S in the [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 868

Voice Over Internet Protocol (VoIP)

For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2838

Legal and Ethical Issues in IT

The fact that technology keeps changing adds to the complexity of the ethical and legal issues surrounding information technology. One of the most significant ethical issues in information technology is that of appropriate use.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Article Review on Technology in Education

Teachers have employed digital teaching and learning methods to meet the needs of the students; however, a lot of problems that come with the adoption of technology in education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 590

Internal and External Issues in the Airline Industry

The skills and training that the airline staff get is necessary to ensure security and effectiveness of the flight and thus make the operation and management of the airline easier. The preferences and the needs [...]
  • Subjects: Aviation
  • Pages: 11
  • Words: 3036

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2970

Concepts of HP Laptops

The quality of HP laptops is not a selfish guarantee of aggressiveness in the market, but rather market protectionism and increased sales.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 665

Data Warehousing at REI

The second reason is that the company wants to increase the accuracy of the information in its hands regarding the outdoor activities of its members.
  • Subjects: Data
  • Pages: 5
  • Words: 1417

Impact of Information Technology on Customers

Most businesses in the globe have adopted the digital way and businesses are sacrificing their time and finances to bring in advanced technologies to tackle and manage their processes within the business effectively and efficiently.
  • Subjects: Applications
  • Pages: 6
  • Words: 1642

Highlighting the Intricacies of Cloud Computing

After that, we will delve into the characteristics of cloud computing which will then be closely followed by cloud computing services, how to manage a cloud, cloud organization standard, the benefits of cloud computing as [...]
  • Subjects: Cloud Computing
  • Pages: 15
  • Words: 4006

Cloud Computing and the Usage of the Internet

Without cloud computing, the usage of computers would be very difficult because the users would require the IT experts to help them to install the programs required to run the applications that are used in [...]
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2904

Concept of Industrial Accident

For example in the transportation industries, about 70% of the accidents are caused by negligence of the drivers[2]. Most of the accidents are caused by the poor conditions of the working environment and to minimize [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 470

The Impact of Technology on Global Business

The growth of the internet in the period between the early 1990s and today has seen the area of network for businesses spread to cover the entire world.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 797

Recommendation for a relational database

The worst may happen in the case of loss of vital information of the business. This helps the users of the relational database system to visualize the information which is stored in the system.
  • Subjects: Data
  • Pages: 6
  • Words: 1623

Information System

Office automation systems in this type of information system, tools or electronics improve on the efficiency of the employees and reduce the amount of work in an organisations office.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 660

The Mobile Phone as an Electronic Wallet

Based on this it is possible to conclude that the penetration of mobile phones within the Abu Dhabi area is very widespread given that it is the largest of the emirates.
  • Subjects: Phones
  • Pages: 6
  • Words: 1772

Java is the best programming language

It is so simple to use, with a user friendly language vocabulary and so fast in compilation these have made it the widely used language in programming.
  • Subjects: Programming
  • Pages: 2
  • Words: 586

Overview of the Internet Age

Although the young tech-savvy generation has been closely associated with the fast growth of digital crime through the internet, it is understood that individuals who are above 35 years account for nearly 45% of all [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 598

Ethics in Computer Hacking

Hacking by no means follows ethics; the infiltration is to the benefit of hacker and loss of users of computer system, network or website.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 655

Managing Pilot Fatigue

This is so because the duties performed by the pilot in the cockpit require a lot of vigilance, care as well as mental and physical well being.
  • Subjects: Aviation
  • Pages: 3
  • Words: 779

Digital Technology in Modern Society

From the above analysis, it is more evident that digital technology has a wide range of effects to our culture and to the young generation.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1091

Analysis of Boeing and Airbus

The strategy to meet the needs of the global market done by Airbus and Boeing companies has been on the basis of organizing its local Genuine Assets to work better than other companies, confronting the [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 1075

The Use of Robots in Warfare

The military advancement in the use of robots in warfare will at long last essentially drastically reduce the role of human beings in war. The increased use of robots in the battlefield needs countries to [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 615