Tech & Engineering Essay Examples and Topics. Page 8

4,316 samples

Is the Robotics Development Helpful or Harmful?

Robots remain the best option, as they will connect the children with the happenings in the school. They will dress the robot with their favorite clothes, communicate with the teacher using the robot, and swivel [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1172

Will Robots Ever Replace Humans?

It is quite peculiar that Bolonkin uses negation in order to stir the audience's delight; more impressively, the specified approach works the pathos is concealed not in the description of the possibilities, but the compliment [...]
  • 5
  • Subjects: Robotics
  • Pages: 8
  • Words: 2066

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

Skype: All you Need to Know

A number of features of Skype comprise Skype to Skype calls, SMS messaging, video calls, immediate messaging, and the capability to forward calls to cell phones of the users when the user is offline.
  • Subjects: Phones
  • Pages: 5
  • Words: 1390

How Computers Work: Components and Power

The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1077

Computers and Information Gathering

On the other hand, it would be correct to say that application of computers in gathering information has led to negative impacts in firms.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Voice Over Internet Protocol (VoIP)

For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2838

The Evolution of the Car Engine

France and the Great Britain reinforced the notion of the electric powered cars in the late 1800s. At the beginning of the century, a number of 33,842 electric vehicles in the United States became registered.
  • Subjects: Engineering
  • Pages: 8
  • Words: 2226

Bioinformatics and Biotechnology

The purpose of this study is to provide an overview of bioinformatics and to illustrate how bioinformatics can be utilised in the design of drugs and the enhancement of agricultural products.
  • Subjects: Engineering
  • Pages: 9
  • Words: 2598

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

Data Communication and Networking

So as to expound on this topic, this paper shall discuss: the term Internet; the three networks that were involved in the first test of TCP/IP protocol and conduction of the test; the standard used [...]
  • Subjects: Internet
  • Pages: 10
  • Words: 2821

Internet Key Exchange Protocol

On the other hand, a symmetric data encryption, also referred to as conventional data encryption, uses a common key to encrypt and decrypt data.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 828

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 4954

3D Printing Industry and Market

One can understand the industry of 3D technologies in terms of the software technology, the hardware and the nature of the products.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1672

NSPE Code of Ethics vs. Other Engineering Codes Essay

Similarities between NSPE code of ethics and AiChE Engineers should use their skills to ensure health, welfare and safety of the public as provided by the first principle. The goal is to enhance health and [...]
  • 2
  • Subjects: Engineering
  • Pages: 2
  • Words: 623

Technology Fails to Deliver Happiness

With the advancements in information technology and the massive use of the internet, communication has become quite effective as people can connect when they are in different countries around the world, at any time.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1359

Turbo Charged Engines

The working principle of the Turbo charged engine A turbo charger used by an automotive is made up of a turbine, a compressor and a couple of common shafts.
  • 3
  • Subjects: Engineering
  • Pages: 12
  • Words: 3226

Impact of the Digital Society

Electronic commerce has the following drives with respect to impact of digital society: Internet penetration Many individuals and organizations are capable of accessing internet services to check emerging and market trends Internet charge services have [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1589

Ethical Hacking: Bad in a Good Way

Introduction of personal computers led to the increase in the number of hackers as well as hacker targets were widened. Many hackers lack the skills to damage network systems in a major way.
  • 3
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1718

Effects of Internet Use in Society

Excessive use of the internet causes a person to feel lonely and depressed. The internet has provided the society with a lot of information both good and bad.
  • Subjects: Internet
  • Pages: 3
  • Words: 879

Emerging Technology in Wireless Networking

The volatile growth of wireless systems together with the proliferation of laptop and miniature computers points out a brighter future for wireless networks, both as independent systems and as part of the wider networking infrastructure.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2753

Communication Technologies in Egypt

Significant technologies as developed with respect to two Egyptian revolutions, one in the year 1952 and the other in the year 2011 are discussed in line with the roles that these communication technologies played in [...]
  • Subjects: Phones
  • Pages: 12
  • Words: 3349

Globalization and Digitalization

The tools that are necessary in the technological exodus from the traditional mode to higher fashions have posed a challenge in the labor force in relation to the level of expertise.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Computer System Electronic Components

The Random Access Memory commonly referred to as RAM is another fundamental component in a computer system that is responsible for storing files and information temporarily when the computer is running. The other storage component [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 526

Internet Files Sharing

The tutor and the student are now able to communicate and exchange file over the internet in form of lessons, instructions, and assignments online.
  • Subjects: Internet
  • Pages: 4
  • Words: 1079

DirecTV Organizational Technology Plan

In the contemporary world, technology has become an integral part of organizations; however, it has affected the society and the environment mainly due to the changes that come about with it, which people have to [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 967

Privacy and Safety on the Internet

The user should have knowledge of how his or her information is being collected, the purpose of collection and how the party is going to use the information. The final security measure to ensure safety [...]
  • 3
  • Subjects: Internet
  • Pages: 4
  • Words: 1126

Music Industry and Technology

The paper further describes some of the technological innovations and analyses how the innovations have contributed to the positive growth of the music industry.
  • Subjects: Other Technology
  • Pages: 14
  • Words: 3878

Technology and Negative Effects

The unfortunate part is that people do not pay attention to the growing concern and continue using the social networks. All of this is impossible to see and feel over the internet or texting.
  • 1.5
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1442

GPS Technology Pros and Cons

GPS Navigation technology Navigation technology uses a GPS receiver and internal road database, which provides the user with a clear view of the surrounding in real time.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 632

Internal Combustion Engine

It is responsible for the transfer of power produced by the exploding gases in the combustion chamber, to the crankshaft through a connecting rod that is usually attached to it.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1868

Ethics in Computer Technology: Cybercrimes

The first one is the category of crimes that are executed using a computer as a weapon. The second type of crime is the one that uses a computer as an accessory to the crime.
  • 5
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1334

Creating a Strong Password

Users should create a password that contains secure relations to certain applications or tasks so that it will be easy to remember.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 605

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1670

The iPhones Fourth Generation

It is the fourth generation of the iPhone, having succeeded the iPhone 3GS, the other two previous models are the original iPhone and the iPhone 3G.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Dangers of Texting while Driving

The research paper will present some statistics to prove that texting while driving is one of the biggest contributors of road accidents in American roads.
  • 5
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1123

Are Hybrid Cars Worth It?

First and foremost what must be understood is that hybrid vehicles on average cost more than their primarily gasoline based counterparts, while it may be true that the hybrid car industry focuses on the fact [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 2008

Insider Threats and Aviation Security: A Study Proposal

Employees in any industry pose security threats due to easy accessibility to the inside operations of the workplace. Like other industries, the aviation business is not exceptional as employees may have the motivation to harm [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 2467

Evaluation of Internet Sources

In the era of digitalization, much information is available online, and attention is paid to evaluating the appropriateness of the source and the quality of the offered material.
  • Subjects: Internet
  • Pages: 1
  • Words: 300

Machine Learning in Medical Imaging

Therefore, the clarification of the basic processes of the different topics of medical imaging, including X-rays, MRIs, and CT scans, will provide context for our investigation of machine learning in the next section.
  • Subjects: AI
  • Pages: 5
  • Words: 1250

In-House vs. Outsourced IT Solution

The components of the source, the vendors, and the origin of the software-intensive system are the key drivers of the outcomes of a component sourcing option.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

Forces on a Rotating System Laboratory

The mass appears to push outward due to its inertia in the case of a spinning system because the centripetal force pulls the mass inward to follow a curved path.
  • Subjects: Engineering
  • Pages: 2
  • Words: 576

The Need for Physical Security in the Modern World

The adoption and integration of Internet of Things and Industrial Internet of Things devices have produced a network of Cyber-Physical Systems that is more interconnected than before, increasing the attack surface and hiding features of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1183

Trends in the Cyber-Threat Landscape

This chapter reviews trends in the threat landscape, including human mistakes, crisis events, the growth of artificial intelligence and the Internet of Things, and the evolution of cyber-attacks in terms of purposes.
  • Subjects: Cyber Security
  • Pages: 9
  • Words: 2360

The Histogram Concept Definition and Examples

For example, through the creation of a histogram with the frequency of purchases and the class interval of age that shows the range of age groups in comparison with the number of purchases, marketers receive [...]
  • Subjects: Data
  • Pages: 2
  • Words: 596

Ways that Robotics Can Transform Our Daily Lives

Robots will help to increase the labor force in the country in the future. Robots will be used to increase the productivity of human labor within the government sector and help in speeding up the [...]
  • Subjects: Robotics
  • Pages: 12
  • Words: 3265

Cargo Security Planning and Risk Assessment

Cargo security planning involves analyzing the risks and creating solutions that minimize the challenges during the movement of goods. This may include the use of technology to ensure that cargo is theft-proof.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 402

Artificial Intelligence in Soil Health Monitoring

Therefore, the new value provided by AI technology is that it allows automation and algorithm-based predictions for more solid decision-making. AI in soil health monitoring is an unconventional application of the technology, albeit capable of [...]
  • Subjects: AI
  • Pages: 1
  • Words: 376

Industrial Revolution in Agriculture

On the other hand, the industrial revolution in agriculture has led to the introduction of new safety challenges. In conclusion, as a result of the industrial revolution in agriculture, automation has become increasingly relied upon [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 677

Data Presentation and Visualization

I would use a graphical method to present the data in the report. On the other hand, data presented in a column of numbers is difficult to understand and draw insights for decision-making.
  • Subjects: Data
  • Pages: 2
  • Words: 618

AR and VR for Maritime Industry Training

The first advantage of AR and VR for maritime training is that it is expected to provide trainees with a high level of practical experience in dealing with different scenarios.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2805

Experiences of Beginner in Python Programming

Difficulty in working with Python for me is understanding what and how to include in the code. Thus, Python is in high demand in IT and, at the same time, is known as a programming [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 570

Technology in Education and Business

The best forms of inspiration incorporate the thoughts and feelings of the whole team and encourage them to try something new.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 913

Personal Computer: The Tool for Technical Report

In addition to this, computers, via the use of reification, make it feasible to reconfigure a process representation so that first-time users can examine and comprehend many facets of the procedures.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1651

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

Operating Systems iOS vs. Android: Pros and Cons

Android and IOS are the biggest phone operating systems in the world and household names around the world. The user is able to change their settings, the visual presentation of the screens, or adjust the [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 602

Artificial Intelligence Transforming the World

The possible effects of any program on the community can then be planned for and measured by managers. To conclude, even though most people are unfamiliar with AI, the world is on the verge of [...]
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 557

Risks and Opportunities of “Platformization”

The growth of the sharing economy, which has been witnessed through the success of multinational companies, such as Airbnb and Uber, has also elevated the importance of "platformization" in the global economy.
  • Subjects: Programming
  • Pages: 9
  • Words: 2558

Forensic Accounting and Cyber Security

The recent trend of increased exposure due to the access of extended financial and fraud concerns by social media and the internet has necessitated the need to curb the tendency.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1399

K-12 Learning and Technology in a Post-COVID-19 Era

Key aspects of K-12 learning that will be explored in the proposed study include an understanding of specific technologies that would have the greatest impact on young learners as well as the main areas of [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1197

Researching of Waterfall Model

The Agile SDLC paradigm is a blend of iterative and incremental modeling techniques that emphasizes process scalability and service quality through the fast turnaround of a functional software package.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 697

The Invento Robotics Products Analysis

The 5 C's of brand management has grown in popularity since it thoroughly evaluates all the important aspects of a company and allows for approach adjustments depending on what is and is not effective.
  • Subjects: Robotics
  • Pages: 6
  • Words: 1665

The Effects of Cyberbullying on Health

Even though education facilities frequently organize the assessment of cyberbullying prevalence, in the case of an adolescent patient's visit, a questionnaire with additional questions related to his family, peers, and self-esteem should be provided.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 636

The Place of Humanity in the Robotic Future

The developers are trying to implement the brain, the human mind, in a digital environment. Paying attention to mechanical machines, commonly called "robots", can be seen that they are created in the image and likeness [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 401

Google’s Vendor Lock-In and Cloud Computing

The need to migrate from one cloud service to another and the risks involved therein have been studied to reveal the existence of vendor lock-in and unveil the potential solutions therein.
  • Subjects: Cloud Computing
  • Pages: 7
  • Words: 1975

Introducing Solana to the Cashapp Company

The topic of this study is the introduction of Solana technology into the Cash App mobile payment service. The study covers the benefits for the users; it is necessary for a visual understanding of the [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 399

How to Make APA Format Tables and Figures Using Microsoft Word

Both for figures and tables, there are two basic options for their placement they may be mentioned and subsequently embedded in the text or placed after references on a separate page. The creation and placement [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 328

The Sydney Bridge Observed Using a Webcam

It shows the view on the Sydney Harbor Bridge and the Opera House, the places that have become symbols of this Australian city. The information about the financial sources of the company can be found [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 338

Cybercrime Effects on UAE Educational Institutions

The research aims to examine the effects of cybercrime in the UAE educational institutions. The research will propose guidelines that can be adopted by project managers to minimize the effects of cybercrime in the UAE [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 1294

Artificial Intelligence in Marketing

Artificial intelligence in marketing is a method of using customer data and AI concepts, including machine learning, to predict the next step of the consumer and meet his needs, even those that the consumer has [...]
  • Subjects: AI
  • Pages: 2
  • Words: 621

Sony’s Response to North Korea’s Cyberattack

Therefore, while the terrorists used cyberattacks to steal the company's information and destroy their equipment, Sony switched the release to on-demand platforms and streaming services, allowing a speedy and widespread release of the film.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 574

Recursion Explained With the Mirror Analogy

Binary search through the integers or dictionary is conducted through the recursive binary search function that includes the array and the target information. Base case in recursion is a special case where the solution is [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 559

Reviewing Meaning and Benefits of Routers and Switches

In this paper offers a simple definitive view of routers and switches, their advantages, and the classifications of a switch. Overall, a router and a switch exhibits fundamental functional differences; while the former suits a [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 594

Avionics and the Future of Aircraft Systems

Avionics are the set of electronic types of equipment and systems designed to use in aviation. The first such device to be used on aircraft was the communication and navigation systems based on analog and [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 586

EBay: Cloud Computing SAAS Model

Software-as-a-Service is a cloud computing model that suits eBay's needs outlined in the previous slide. As anyone can access the service without specialized hardware, software, or knowledge, it can be brought to a large audience [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 617

The Benefits and Growth of IPv6

The current type is the most recent and most advanced internet protocol that can determine the location of the computer systems across a given network and routing.
  • Subjects: Internet
  • Pages: 1
  • Words: 303

Cyber Security Issue: RansomWare

Until the victim pays a specific amount of money to the attackers within a particular time, cybercriminals can use the virus mentioned above to access the user's sensitive personal or organizational information. The infection and [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1225

Pros and Cons of Distance Education

On the one hand, modernization of education allows it to expand the usual boundaries of transmitting and receiving information in the educational process while retaining all the integral components.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 512

The Digital Workplace Transformation Issues

In this research, it is important to emphasize the significance of the digitalization of the present workspace and all the consequences, challenges, and obstacles that are associated with them.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1172

Should the Internet Be Regulated?

The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
  • Subjects: Internet
  • Pages: 2
  • Words: 661

Internet Technology and Impact on Human Behavior

It was the Internet that allowed the phenomenon of cyberbullying to emerge, the essence of which is the harassment of someone on the Internet by large groups of users.
  • Subjects: Internet
  • Pages: 1
  • Words: 312

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

How Smartphones Changed Society and the World

Introduction of the smartphone to mass public Driven by iPhone created by Apple and Steve Jobs in 2007 Revolutionized the world of communications and information exchange Smartphone went from being a tool to the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 430

Cybersecurity Strategy and Plan of Action

Padgett-Beale's primary intention of merging the company was to relocate the call epicenter to a property owned by the company roughly 10 miles from the company's previous location and opposite the newly released Padgett-Beale resort.
  • Subjects: Cyber Security
  • Pages: 26
  • Words: 7197

M-PESA: Critical Success Factors

Generally, consumers preferred mobile payments on paying for services and transfer of money wherein most of them enjoy the convenience of the technology and this was the initial value point considered by the consumers. The [...]
  • Subjects: Phones
  • Pages: 6
  • Words: 1058

Artificial Intelligence Investments in the UAE

One of the components of the strategy is to support the heritage of the country's founding fathers, which means the UAE has to remain among the most advanced nations.
  • Subjects: AI
  • Pages: 7
  • Words: 1962

Technology in Education: Benefits and Challenges

To succeed in this learning environment, students need to develop organizational and clinical skills and strategies to achieve academic success; challenges may be associated with the quality of received information and consequences of using devices.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 634