Tech & Engineering Essay Examples and Topics. Page 8

4,312 samples

Diesel and Gas Engines in Armored Vehicles

While diesel engines can establish in lighter armored vehicles that need to run a significant number of kilometers, gas turbine engines are suitable for heavy offensive tanks and infantry fighting vehicles.
  • Subjects: Engineering
  • Pages: 2
  • Words: 570

Addressing Information Technology Access Challenges for Students

The main purpose of the proposed study is to critically evaluate viable ways modern distance teaching universities can employ to deal with the challenge of lack of access to information and communication technologies that are [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2269

Cloud Computing Security Issues in Enterprise Organizations

This paper will set out to show that while there are significant security threats that an enterprise faces when it migrates to the cloud, there are solutions that can be implemented to mitigate these threats [...]
  • Subjects: Computer Security
  • Pages: 10
  • Words: 2908

Voice Over Internet Protocol (VoIP)

For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2838

Article Review on Technology in Education

Teachers have employed digital teaching and learning methods to meet the needs of the students; however, a lot of problems that come with the adoption of technology in education.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 590

Ethicality in Information Technology

To avoid these are designed significant frameworks that consider issues of morality as pertaining to privacy of information, environmental aspects; how agents should carry themselves in the info-sphere, information life-cycle; how information is created, distributed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 500

3D Printing Industry and Market

One can understand the industry of 3D technologies in terms of the software technology, the hardware and the nature of the products.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1672

Solar Furnace (Font Romeu – Odeillo, France)

The furnace stands as a demonstration of the potential of solar energy to the world and it remains amongst the world's greatest projects especially in the line of solar energy exploitation.
  • Subjects: Engineering
  • Pages: 12
  • Words: 3329

Negative Impacts of Computer Technology

For instance, they can erase human memory, enhance the ability of human memory, boost the effectiveness of the brain, utilize the human senses in computer systems, and also detect anomalies in the human body. The [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1103

A Review on Cloud Computing: Concepts and Benefits

According to Rodriguez, several organizations establish community cloud to have common requirements and need to share infrastructure to understand the benefits and aspires to assemble ideologies of a digital ecosystem with the use of a [...]
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2768

Information Technology Infrastructure Library

The major advocacy for ITIL is that the IT should be in line with the business needs. The last one, operate phase ensures efficiency in the operation by monitoring the services deployed to ensure effective [...]
  • Subjects: Data
  • Pages: 10
  • Words: 2767

New Technology Training in Hospitality Industry

The emergence of new technologies in the hospitality industry has made it possible to enhance training and learning among the employees and the management team.
  • 4.5
  • Subjects: Applications
  • Pages: 11
  • Words: 3016

Security of Your Computer and Ways of Protecting

Authentication is used to mean that the information in the computer is only available and accessible to the authorized parties. This method is more effective as it can include hardware using multiple versions of software [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 545

Cloud Computing and the Usage of the Internet

Without cloud computing, the usage of computers would be very difficult because the users would require the IT experts to help them to install the programs required to run the applications that are used in [...]
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2904

Artificial Intelligence: Pros and Cons

Artificial intelligence, or robots, one of the most scandalous and brilliant inventions of the XX century, causing people's concern for the world safety, has become one of the leading branches of the modern science, which [...]
  • 3
  • Subjects: Robotics
  • Pages: 4
  • Words: 1163

Recommendation for a relational database

The worst may happen in the case of loss of vital information of the business. This helps the users of the relational database system to visualize the information which is stored in the system.
  • Subjects: Data
  • Pages: 6
  • Words: 1623

Lockhart River Plane Crash

It is also clear that the radar squad did not continuously observe the position of the plane; furthermore, it was fathomed minutes later that the plane was absent Systems and Methods The cause of the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2761

Description of Global Positioning System Device

Image 1 shows the positions of the various satellites that constitute the GPS. It is done to establish satellite clock and orbits profiles in order to update the navigational information of individual satellite.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Process Description: 3D Printing

The material is the string-like strand of plastic coiled in the back of the printer. In turn, the movement of the print head is directed by the 3D file sent to the printer.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 539

Preparing a Computer Forensics Investigation Plan

However, if the information is thought to be contained in the permanent storage, then a computer has to be shut down before transporting it to a laboratory for forensic analysis. The first step in the [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

The Issue of Privacy

In the magazine article named 'Privacy and the Limits of Law', the author Ruth Gavison has pointed out that perfect privacy is impossible to be achieved most of the times with the emerging technologies in [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2208

Improvement of the Hp Touchpad and WebOS

Due to the poor performance of the Hp touchpad, many people started speculating the reasons for the poor sales performance of the gadget with some experts observing that the lack of Apps and the failure [...]
  • 5
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2148

Technology: Being Digital

This has been achieved by the fact that the world is a global village thus transmitting information does not have to rely on time and money. A click of the mouse is enough to have [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 716

Impact of Modern Technology on Human Communication

However, this paper has also illustrated that there may be hindrances to communication which can arise from the abuse of modern technology in communication efforts by individual.
  • Subjects: Internet
  • Pages: 3
  • Words: 808

Sample of Chart or Graph

While the stacked bar chart is very helpful in understanding the overall votes by respondents as well how many considered each focus area as critical or high, it does not give an idea of the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 559

Concept and Types of the Computer Networks

As revealed by Tamara, authenticity is one of the most important elements of network security, which reinforces the security of the information relayed within the network system.
  • Subjects: Internet
  • Pages: 3
  • Words: 832

Solutions to Computer Viruses

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 562

Metaverse and Its Influence on Society

The metaverse has the potential to revolutionize entertainment, improve communication and collaboration, and increase equality. The possibility of using the metaverse as a tool for monitoring and management is a serious concern.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 824

Efficient Windows 10 Implementation Guide

The firm needs to upgrade and use the Windows 10 Enterprise operating system once it decides to upgrade. The first part will show the upgrade matrix and the security features of Windows 10.
  • Subjects: Applications
  • Pages: 5
  • Words: 1287

Sony Pictures: The Cyber Attack

The incident also highlighted the vulnerability of large companies to cyberattacks and the need for better security measures."Guardians of Peace" was the hacker organization that breached the computer networks of Sony Pictures Entertainment, a prominent [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 858

Problems in the Aviation Industry

Although the trend of airplane crashes has been on a downward trend since the 1980s, and statistics estimate that the probability of dying in such a crash is 1 in 3. However, the lack of [...]
  • Subjects: Aviation
  • Pages: 1
  • Words: 482

Aspects of the Fire Prevention and Safety

According to the 2019 International Building Code, materials and features in buildings need to be structurally fire-resistant to safeguard against the spread of fire and smoke.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 613

How to Build a Gaming Computer

The first step to creating a custom build for a PC is making a list of all the necessary components. This explanation of how to build a custom gaming computer demonstrates that the process is [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 604

The Alcohol-Related Traffic Accidents

The court order to install a ride-sharing application falls under the category of "any other conditions of community control that it considers necessary" of paragraph 4511.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 400

Pipeline Hazards in Computer Architecture

Therefore, branch instructions are the primary reasons for these types of pipeline hazards to emerge. In conclusion, it is important to be able to distinguish between different pipeline types and their hazards in order to [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 306

Reading and Writing with Use of Technology

Concerning the proposal, when undertaking research from a library in the context of a particular paper, the librarian may provide insight on the best reference one who is creatively inclined needs to look into from [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 738

The Harry Potter Phenomenon Analysis

Since these groups sowed the seeds of the Potter phenomenon, the connectors and, later, the mavens were crucial to the publication of the first novel, Harry Potter and the Philosopher's Stone.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1770

Seattle-Tacoma International Airport’s Financial Situation

The financial propositions fairly present the net positions of the Organization Investments and the Warehousemen's Retirement Charitable Trust of Seattle-Tacoma International Airport as of December 31, 2021, and 2020, as well as the adjustments in [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1211

The Smart Parking Space App and Its Functions

The median occupancy rate for the two days of the week, Monday and Friday, is exactly the same. There is a breakdown of the occupancy rates for each lot, broken down by day and hour.
  • Subjects: Applications
  • Pages: 5
  • Words: 908

Aviation: F/A-18E Super Hornet

Due to the strengthening of chassis supports in particular and the design of the aircraft in general, the upgraded fighter bomber has a maximum landing weight of 4100 kg more than the F/A-18C/D.
  • Subjects: Aviation
  • Pages: 4
  • Words: 792

Artificial Intelligence Transforming the World

The possible effects of any program on the community can then be planned for and measured by managers. To conclude, even though most people are unfamiliar with AI, the world is on the verge of [...]
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 557

Blockchain-Based Community Battery Storage System

The current moment provides a unique business opportunity to implement a community-level battery storage system based on blockchain technology that would provide sustainable electricity for the Egyptians and contribute to the development of new RES [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 607

Architectural Heritage: Digital Preservation

The main aims of digital preservations are; to enable the supply of heritage through digital outlets to large audiences, to guarantee that initial measurements and forms of natural heritage are not lost in case of [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2306

Cyber-Security Threats and Their Control

It requires advanced hackers to retrieve the information of an individual or an organization's password database. The creation of robust passwords is an appropriate way to prevent the concern.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 399

Technological Determinism and Society

This is due to the fact that if earlier the influence of technology was largely limited to the production of material goods, today this influence permeates the entire life of a person.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 761

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

Data Buses: Definition and Key Features

The significance of the address bus is to assist the CPU in locating specific information in the memory, while the control bus regulates data processing.
  • Subjects: Data
  • Pages: 1
  • Words: 286

Artificial Intelligence in Marketing

Artificial intelligence in marketing is a method of using customer data and AI concepts, including machine learning, to predict the next step of the consumer and meet his needs, even those that the consumer has [...]
  • Subjects: AI
  • Pages: 2
  • Words: 621

Technological Challenges in Business

There is a challenge for the organization's management to implement procedures and policies for effectively managing the private data of the organization.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 320

Windows Server Installation and Configuration

The fourth stage is the configuration of Remote Access and Service. The logs are used to monitor the server activities and troubleshoot problems in the system.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 401

Discussion: How Does AI Improves Manufacturing?

The lean standards of manufacturing are the activities and techniques applied in the production process to identify the bottlenecks and streamline the efficiency of the process while ensuring high productivity.
  • Subjects: AI
  • Pages: 7
  • Words: 1937

Cryptographic Algorithms: The Use in Cyber Security

Cryptographic protection of a system depends on two factors, 1) the strength of the keys and effectiveness of associated protocols, and 2) protection of said keys via key management.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 638

Survey Monkey: The Online Assessment Tool

We also give the reader the findings of a survey conducted with this tool and an assessment of its usefulness and potential for use in future usability studies. Survey Monkey is a web-based tool and [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 955

The Aircraft Accidents and Incidents

The organizational culture of a workplace is powerful, and when new employees join the institution, they are trained to have the culture of the place, as is the case in NASA.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3032

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Cybersecurity Strategy and Plan of Action

Padgett-Beale's primary intention of merging the company was to relocate the call epicenter to a property owned by the company roughly 10 miles from the company's previous location and opposite the newly released Padgett-Beale resort.
  • Subjects: Cyber Security
  • Pages: 26
  • Words: 7197

Technoscience and Humanity in the Elysium Film

Moreover, the concepts of transhumanism and artificial intelligence are analyzed in the context of the corrupted social order to draw on the failure of humanism, ethical and moral decay, and prosperity of the wealthy.
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1993

Big Data and Distributed Databases

Big data refers to a type of set of information that requires memory beyond the capacity of the conventional relational databases.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Data Mining and Its Major Advantages

Thus, it is possible to conclude that data mining is a convenient and effective way of processing information, which has many advantages.
  • Subjects: Data
  • Pages: 1
  • Words: 290

AppMaker: Threat Agents of Web Attacks

These factors are the capability of the agent, the motivating factor, and the opportunity to attack. This is the main reason most security agents are consistent in exploring web applications with hopes of identifying complicated [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 854

How Do Hybrid Cars Work

The branch supports hybrid cars because they help to protect the environment through the reduction of emissions to the atmosphere and use of less fuel.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Effect of Sea Water and Corrosion on Concrete

On the other hand, substantial tautness, for instance due to meandering will shatter the tiny firm pattern, ending up in fracturing and disjointing of the concrete.
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4001

Sifers-Grayson Company: The Cybersecurity Breach

Finally, the recommendations, as per the improvement of the incident response capability, are introduced to ensure the elimination of the identified drawbacks and the compliance of the engineering company with the security requirements presented by [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1380

Management Information Systems (MIS)

The advances in the evolution of devices and the achievement of a new stage of development critically impacts MIS and creates the basis for the emergence of multiple changes towards the achievement of better outcomes [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 573

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 50
  • Words: 14365

Electronic News Gathering

The Characteristics involve the Utilization of electrical video to gather information, the Incorporation of Audio technologies in gathering news, and the Utilization of portable equipment in the newsgathering process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1366

Implementation of the Boston’s Smart City Concept

Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 608

Particle Swarm Optimization: Definition

Particle swarm optimization (PSO) is an artificial intelligence (AI) or a computational method for getting solutions to problems through maximization and minimization of numeric.
  • Subjects: AI
  • Pages: 10
  • Words: 349

Usability Testing and Pact Analysis Report

The PACT analysis is conducted to find the utility of the tool in the optimum resource management at a call center. The usefulness of the Call Center Traffic Monitoring System is to be measured by [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3200

Network Reconnaissance Using Command Line

The command enters works through the interactive mode when no arguments are stated, or when the in itial argument is a - and the following argument is the server's internet address name or the host [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2247

E-bazaar Implementing Virtual Private Networks

With increase in the popularity of the internet, many businesses turned to the internet in order to cut on running costs and expand their network which has eventually paved way for the evolution of virtual [...]
  • Subjects: Internet
  • Pages: 12
  • Words: 1855

Condenser Operation and Maintenance

The design of the surface condenser is such that steam is made to get its way into the condenser system through an opening at the top section of the condenser system after which distribution takes [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2202

Social Needs: Inventions and Innovations

The Pony Express was birthed in 1861 in the US with the primary goal of delivering mail and in the same breath, Coleman Sellers invented a Kinematoscope.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1342

Networking Concepts for Computer Science Students

The firewall, on the other hand, is a hardware or software that secures a network against external threats. Based on these a single subnet mask is sufficient for the whole network.
  • Subjects: Computer Science
  • Pages: 25
  • Words: 6911

Overview on 4G Technologies

The major plan of 4G technology is to ensure that users can access and have a faster and more reliable internet access on their mobile phones and the mobile broadband services and combine all other [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 921

Association of Computing Machinery (ACM)

This is mainly because the field is wide and hosts millions of professionals, researchers, as well as educators that strive to improve scientific computing. The main aim of this association is to promote computing as [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 990

Software Development Effect on Media

The history of media technology starts with the invention of the phonograph in 1877. The effect of the separate developments was a turf war of which is better between the two technologies.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2461

Definition and Use of Satellite Communications

The emergence of the satellite communications technology has the roots in the missiles and the microwaves technology which expanded greatly following the stimulation of the Second World War.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2462

Noise Cancelling Headphones Technology

However, the actual electronic circuitry is located in the plane's hand rest where it takes the sound signal from the microphone which is behind the headphones then inverts it sums it up together with the [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1072

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1077

The Terms in Online Communication Tools

E-mail client: this is a computer application that helps users to organize their e-mail since it can access the mailbox. It has rich functionality as compared to POP, since users can track the status of [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 810

Simply Accounting vs. QuickBooks: Comparison of Programs

This paper makes a comparison of the accounting software, Simply Accounting with QuickBooks and Both Simply Accounting and QuickBooks share many common features; but for the selection of a particular accounting software program, it is [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 1461

Data Integrity in Relational Databases

To ensure that there is validity and accuracy of data, a database designer should be able to select the correct primary key that reflects the requirements of the database in regard to information search, updating, [...]
  • Subjects: Data
  • Pages: 2
  • Words: 740

Eastern Flight 401 Tragedy: Lessons in Aviation Safety

This shows that communication in the cockpit was practically absent, that the crew resource management was not successful at a,ll and that the members of the crew were not sufficiently trained before the flight.
  • Subjects: Aviation
  • Pages: 2
  • Words: 608

Cyber Crimes: Court – United States vs. Ancheta

Reasoning: The jury argued that the defendant conspired to violate the Computer Fraud Abuse Act as well as the CAN-SPAM Act, caused havoc to computer networks of the national defense department of the federal government, [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 548

Membrane Filtration Technology

The paper is organized into subsections including how the technology works, alternative technologies, effectiveness of the technology, management of the technology, and application of the technology.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1896

WorkShop Report: Client-Server Technology Bco-5502

However, on the framework of TCP/IP configuration, it is possible to locate the IP name resolution under the parameters of the NetBIOS resolution and with the use of the Windows NT 4.0.
  • Subjects: Programming
  • Pages: 8
  • Words: 2212

Fixed-Base Operators in the Aviation Industry

Most of the business conducted within the airdrome environs as well as those that require a straight linkage to an airdrome in order to subsist yet their chief commerce is not associated to aviation.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2216

Hot-Mix Asphalt and Portland Cement Concrete

The purpose of this paper is to compare and contrast the two materials based on their properties, requirements, production, and the use in road construction.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 639

Control Philosophy. Variable Speed Drives

The second one is the management and provision of adequate and stable pressure connected to all the identified stakeholders in the project.
  • Subjects: Engineering
  • Pages: 1
  • Words: 396

The Influence of Memes on Our Lives

After the third grade, I went to my grandparents on vacation in the village, and I planned to have fun with my friends and spend time in the fresh air in the countryside.
  • Subjects: Internet
  • Pages: 6
  • Words: 1683

The Role of Digital Technologies in Education

The interactive Mother's Day card and the story of a 13-year-old boy convey the idea of the importance of technology for an individual's development.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 937