Tech & Engineering Essay Examples and Topics. Page 8

4,726 samples

Data Visualization Review and Analysis

The use of color coding makes the data easier to interpret, while the interactivity allows the user to explore different aspects of the data and draw conclusions.
  • Subjects: Data
  • Pages: 2
  • Words: 642

Disruptive Innovation: Comparative Advantage

In summary, the greatest risk is that if the company commits to disruptive innovation, its customers might prefer the products of the organization's rivals that provide sustaining innovations.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 358

The Alcohol-Related Traffic Accidents

The court order to install a ride-sharing application falls under the category of "any other conditions of community control that it considers necessary" of paragraph 4511.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 400

Engineering: Technological Discipline

With software engineering, students are taught about computers and technology and how they can code programs and design applications, software and websites. The most popular and growing professions are electrical engineering.
  • Subjects: Engineering
  • Pages: 3
  • Words: 842

Artificial Intelligence as Technological Advancement

Automation and digitization of healthcare services, marketing, and financial systems through AI are beneficial. While AI is significant for social and economic growth, its application in education should be limited.
  • Subjects: AI
  • Pages: 1
  • Words: 292

Industrial Revolution in Agriculture

On the other hand, the industrial revolution in agriculture has led to the introduction of new safety challenges. In conclusion, as a result of the industrial revolution in agriculture, automation has become increasingly relied upon [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 677

Impacts on Human Beings in the 21st Century

Globalization, communication, and biotechnology are the phenomena that have had the largest impact on human beings in the 21st century because these factors have transformed traditional notions of distance between people, shaped new economic trends, [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 942

The Use of Technologies in the Classroom

However, the alternative assumption, in this case, would be that tutors decide to involve technology-related tasks or presentations because of the inability to teach the student due to the prior lack of preparation for the [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 552

Health-Focused Wearable Technology

For the medical system, such technologies are vital to transfer information in real time and deliver it directly to doctors or nurses.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 390

Information System and Its Various Dimensions

Therefore, the information system is a collection of data, facts, or knowledge integrated in an intentional manner for the purpose of collecting, processing, and storing.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 612

Artificial Intelligence and Machine Learning

There are both benefits and challenges to the use of AI and ML in the customer complaint resolution process. The ability of a company to provide a customer experience depends on that business's power to [...]
  • Subjects: AI
  • Pages: 2
  • Words: 707

The Seattle-Tacoma International Airport

Construction of the airport was funded in part by a $1 million grant from the Civil Aeronautics Administration and a $100,000 grant from the City of Tacoma.
  • Subjects: Aviation
  • Pages: 10
  • Words: 3165

The Smart Parking Space App and Its Functions

The median occupancy rate for the two days of the week, Monday and Friday, is exactly the same. There is a breakdown of the occupancy rates for each lot, broken down by day and hour.
  • Subjects: Applications
  • Pages: 5
  • Words: 908

Qualitative Coding with Hands or Software

Qualitative data is any type of unstructured information gathered from the fields in the form of pross. Modern QDA software is here to stay, and no single model suites all the data research requirements of [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 986

Aviation: F/A-18E Super Hornet

Due to the strengthening of chassis supports in particular and the design of the aircraft in general, the upgraded fighter bomber has a maximum landing weight of 4100 kg more than the F/A-18C/D.
  • Subjects: Aviation
  • Pages: 4
  • Words: 792

Virtual and Augmented Reality in Education

The novelty of this technology can be used by unscrupulous employees as an excuse to avoid preparing for lessons and working with students.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1153

Information Security Awareness

One of the significant human factors that influence ISA is the individuals' perception of security. Hence, individuals' perceptions of information leakage and security awareness play a significant role in the success of ISA programs.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 958

K-12 Learning and Technology in a Post-COVID-19 Era

Key aspects of K-12 learning that will be explored in the proposed study include an understanding of specific technologies that would have the greatest impact on young learners as well as the main areas of [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1197

Scaling and Success of DevOps for Military

HQDA Army G-4 is a special unit involved in the development and evaluation of logistics processes, programs, and policies for the national military sector.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 829

The Hybrid Robot Vacuum Cleaners

The EUFY series of hybrid vacuum cleaners is one of the most popular choices in the market, and the company offers products in various pricing ranges. In the context of hybrid robot vacuum cleaners, market [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2869

Artificial Intelligence: The Trend in the Evolution

Thus, the lens of history is a great way to consider knowledge and understanding of society and technology from a different angle in terms of comprehending the dynamics of society and the importance of technology [...]
  • Subjects: AI
  • Pages: 1
  • Words: 393

Technology Acceptance Model and Technology Readiness

Perceived usefulness is a value that reflects the degree of confidence of the user that the technology used will increase their productivity. Thus, the technology of readiness determines the level of readiness of customers to [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 656

Ways in Which NFTs Can Benefit Companies

Therefore, NFTs hold the promise to facilitate the collectibles phase and change the game in client loyalty. Companies can monitor trends and the market daily to maximize NFT investment.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 275

Hacking Prevention: Mobile Phone Anti-Virus

However, the less discussed and addressed subject is the cybersecurity of mobile phones, which are among the most used and vital devices for the majority of the population.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 589

Technology in Nursing Education

Such students have the right to receive the same learning opportunities, which is why textbooks, in-person assistance, and in-print information provision are some of the measures that can be applied.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

Computing and Digital Media in 2050

The automation technique is based on the polar opposite and is integrated and decentralist, similar to how the machine structure human interactions.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1110

Mounting Drives: Advantages and Disadvantages

Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 594

Cyber-Security Threats and Their Control

It requires advanced hackers to retrieve the information of an individual or an organization's password database. The creation of robust passwords is an appropriate way to prevent the concern.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 399

Cybersecurity and Corporations’ Role

First, it is worth indicating some of the key reasons for corporations to be in the center of cybersecurity discussion. In April, the company rejected the possibility of a data breach and apparently did not [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 675

Smartphone Technology and Its Brief History

One of the ways that prove smartphone technology has impacted the global economy is the dramatic increase in the capacity to communicate and collaborate.
  • Subjects: Applications
  • Pages: 8
  • Words: 2212

The Sydney Bridge Observed Using a Webcam

It shows the view on the Sydney Harbor Bridge and the Opera House, the places that have become symbols of this Australian city. The information about the financial sources of the company can be found [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 338

Cybersecurity Dangers and Their Analysis

The officer clicks the file, and the malware attacks the system stealing the data and bypassing some security measures. The cyber security framework under the NIST is helping organizations to understand and manage cybersecurity.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2960

Blockchain Technology and Potential Issues

The system of recording and overseeing contracts and transactions is the foundation of the regulatory, financial, and political frameworks which help the modern world function.
  • Subjects: Data
  • Pages: 24
  • Words: 5572

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

Sampling Resolution and Quantization

The spatial resolution of a digitized image is affected by the sampling rate, whereas the amount of grey levels in a digital snapshot is controlled by the quantization level.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 565

Maintaining the Temperatures for HFO Tank

There is the pump for supplying oil with the main function of enhancing the circulation of oil from the tank passing through a heater and back to the oil tank again; the temperature of the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1020

Top Microprocessors in Computational Biology

With the battle of which microprocessor is the best in the industry, the Intel Core i9-12900k and the AMD Ryzen 9 5900x stand out to take each other head-to-head.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 860

Trends in Embedded Systems

The area of embedded systems has received massive development because of emerging platforms dependent on computers and embedded systems for controlling and monitoring all matters autonomously. The evolution of IoT has occurred due to the [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1680

The Concept and Underlying Science of Hyperloop

The representatives of the two firms argued that there was a great possibility of implementing the Hyperloop in the Middle East or Asia because of the increased need for fast and efficient transport and reduced [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2035

Operations Security for the Test Range

In addition, evaluating flaws and indications and estimating the risk to the company are the third and fourth steps in OPSEC strategies.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 549

Phishing: Definition, Forms and Security Measures

A spear-phishing assault is when a hacker customizes an email using the victim's identity, role, organization, office phone number, and other details to fool the victim into thinking they are communicating with the actual sender. [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 617

Cyber Security Issue: RansomWare

Until the victim pays a specific amount of money to the attackers within a particular time, cybercriminals can use the virus mentioned above to access the user's sensitive personal or organizational information. The infection and [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1225

Windows Server Installation and Configuration

The fourth stage is the configuration of Remote Access and Service. The logs are used to monitor the server activities and troubleshoot problems in the system.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 401

Pros and Cons of Distance Education

On the one hand, modernization of education allows it to expand the usual boundaries of transmitting and receiving information in the educational process while retaining all the integral components.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 512

Device Addiction: Consequences and Solutions

One of the essential traits of smartphone addiction is tolerance which is defined as "a gradual increase in the mobile phone use to obtain the same level of satisfaction".
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1204

Expo 2020: Connecting Minds, Creating the Future

The London World Expo marked a watershed moment in the evolution of commodity derivatives to the abundance of new industrial technology and hence is considered the first World Exhibition in the contemporary sense.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1429

Electric Coffee Maker: The Use of Pseudocode

Program Name: Coffee Maker Functions Code for Coffee Maker Functions: Apply PresetTime to begin brewing while the coffee maker is OFF IF want to set CoffeeMakerTime Press ON x 2 Apply input HH:MM Press ON [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 327

Internet Technology and Impact on Human Behavior

It was the Internet that allowed the phenomenon of cyberbullying to emerge, the essence of which is the harassment of someone on the Internet by large groups of users.
  • Subjects: Internet
  • Pages: 1
  • Words: 312

Artificial Intelligence in Cybersecurity

The use of AI is regulated by a large amount of documentation, which should take into account the current legislation in the country of use and ethical issues related to AI, many of which have [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 585

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

Guidelines for Evaluating Research Articles

The title is a topical heading that captures the focus of the research paper. It highlights the purpose of the paper, the key concepts discussed in the paper, or the outcomes of an experiment/study.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 2120

Children Protection from Fire-Related Accidents

The city has an altitude of fifteen meters above the level of the sea and depends on lakes; Houston, Livingstone, and Conroe as the main sources of water.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1145

Boolean Search and How to Use It

The use of the created Boolean string yields 1726 results, which is a relatively large number of articles for manual selection of the most relevant sources.
  • Subjects: Programming
  • Pages: 6
  • Words: 449

Professional Issues in Computing & Education

It is not permissible to presume that computer can act as substitute to a teacher; on the contrary, this device is just a tool that can facilitate both instructors and learners.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 2009

Metadata: Organizing Cars Photos

In that regard, the present report takes the subject photos of cars and provides an investigation of suitable methods for metadata organization of such collection.
  • Subjects: Data
  • Pages: 14
  • Words: 2634

Technological Advancement: Automatic Vehicles

In the past decades, people complained of the quality of vehicles that used to be produced. Advancement in technology has led to most of the operations being mechanized.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2251

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

Automated Catering Management System

It is a key part of future improvement as this information can be stored in the system and processed to promote positive change.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1104

The Importance of Database Design

It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
  • Subjects: Data
  • Pages: 2
  • Words: 649

Interactive Tools: Types and Its Benefits

In this modern day, it is important to remain competitive. Information technology and interactive tools are some methods which one can improve the online consulting process.
  • Subjects: Applications
  • Pages: 12
  • Words: 1586

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1175

Proxy Fights: Definition, Factors and Implications

In a way, the phenomenon of a proxy fight can be viewed as the tool for reinforcing the strengths of the organization by creating a very strong and well-coordinated team of shareholders, who are willing [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 962

Geotechnical Engineering: The Finite Element Software

The use of FEA in geotechnical engineering requires an engineer to have a wide range of skills including a proper background of soil mechanics and finite element theory, a thorough comprehension of various constitutive soil [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2194

Steganography in Current Digital Media

When the hair grew, the slave went to the recipient of the message who shaved the head to expose the hidden message. In these methods, the hidden information within files may be known to the [...]
  • Subjects: Computer Security
  • Pages: 13
  • Words: 3674

Energy and Nanotechnologies: Australia’s Future

Given the concerns about the sustainability and the security of the energy supply, the fast pace of economic development, the connection between global warming and fossil fuels, the author seeks to investigate alternative energy efficient [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 599

Computer Technology: Databases

Databases are components of Information Systems that are used when the Information Systems have large amounts of a, especially when the interfaces in the Information System are interactive, and when users can access the system [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 576

Object Oriented Programming Concepts

It summarizes the relationship between structures, classes and unions, and OOP, and mentions the concepts of inheritance, objects, and polymorphism in OOP. Actually, the declaration of a union is similar to that of a structure.
  • Subjects: Programming
  • Pages: 3
  • Words: 861

Preliminaries: Context and Project Background

The total budget of the implementation of this project will affect the communication plan since the communication plan will greatly depend upon the budget drawn so as to communicate to the stakeholders and the client [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1092

Machine Learning and Bagging Predictors

The aggregate uses the average of the single predictors, to improve the accuracy of prediction especially for unstable procedures such as neural sets, regression trees and classification trees.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 558

Definition and Use of Satellite Communications

The emergence of the satellite communications technology has the roots in the missiles and the microwaves technology which expanded greatly following the stimulation of the Second World War.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2462

The Digital Divide Term Description

Currently, the wouldigital divide' is increasingly used to refer to differences not only in access, but also in skill and proficiency level in the field of computers, the net, telecommunications, and information and communication technologies [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1319

Aircraft Crash and Emergency Management: Flight UA232

There was no indication of any type of problem that could have warned the pilots of the impending disaster that would force them to crash-land the DC-10 that carried 285 passengers and eleven crew members.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2038

Lighting Techniques in 3D Animation

In distinction with 2D animation where every frame should be painstakingly painted and filled in with the required tints, lights, and shadows, lighting in 3D animation is performed by pointing the source of light, while [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1122

The Mechanics of Hydro Power Plant

Hydroelectricity is the type of electricity which is basically generated by the use of water. Therefore, the more the volume of the water, the higher the amount of electricity can be harnessed from the water.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2464

Dependability of Computer Systems

In the dependability on computer systems, reliability architects rely a great deal on statistics, probability and the theory of reliability. The purpose of reliability in computer dependability is to come up with a reliability requirement [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3384

Computer Control System in a Laboratory Setting

In this case the iControl system is designed to control and monitor temperature variables of a hazardous liquid within a laboratory environment as well as other parameters such as smoke and light.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 786

Concepts of Technology: Good or Bad

Since the advent of industrial revolution, technological innovations have been the primary determinant of the quality of life, a fact that every individuals can attest, because of the human dependence on technology in everything they [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1182

Information Security and Privacy

At the dawn of the new technology and especially in this information age, protecting the same information is very crucial to it.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2546

Viruses and Worms in Computers

To prevent the spread of viruses and worms, there are certain precautionary measures that can be taken. With the correct measures and prevention, the spread of online viruses and worms can be controlled to a [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 521

Open Search Standard in Windows

A standard definition for OpenSearch as given by its website, opensearch.org, says that "OpenSearch is a collection of simple formats for the sharing of search results".
  • Subjects: Data
  • Pages: 6
  • Words: 1432

Life, Achievement, and Legacy to Computer Systems of Alan Turing

Turing was quite influential in computer science development, in addition to setting the framework for the formalization of the algorithm concept, in addition to the use of the Turing machine that he developed, for computation.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 536

SAP Software Solutions Systems

The role of a Basis Administrator in an organization implementing an R/3 system is crucial as it is the Basis Administrator who runs the system, introduces it to the organization and all its employees, provides [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2318

Reverse Engineering for Software Maintenance

To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences.
  • Subjects: Computer Science
  • Pages: 14
  • Words: 4361

Engineering: Engineering Disaster Analysis

The collapse of Schoharie Creek Bridge in 1987 was as a result of error in the engineering design, and one of the major causes of the collapse of the Schoharie Creek Bridge was the excessive [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2454

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1686

Technologies and Barriers in Higher Education

This paper uses the relevant scholarship and argues that the high interactivity offered by digital technology has the opportunity to enhance the quality of higher education for students regardless of their age or technological prowess.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1592

Whats Mean Robotics Welding

Epping and Zhang define robotic welding as the utilization of programmable systems and tools that mechanize and automate the way welding is done.
  • Subjects: Robotics
  • Pages: 2
  • Words: 601

History of Radio and Guglielmo Marconi

Marconi demonstrated the usability of the radio for military and naval purposes and launched the company to develop and distribute radio communication services and equipment.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 336

Radio Technology Invention and Development

In 1906 he broadcasted a Christmas concert, including his voice and violin play with the help of 400-foot towers to the ships of the United Fruit Company, which were equipped with Marconi's radios. In 1922 [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 397

Libra by Facebook Analysis

The simplicity of the mechanism is a valuable aspect that explains the intention of Facebook management to include this system as a single platform for paying for goods and services via the social network.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2211

An Analysis of Statistics on Cybercrime and Fraud

The statistical data analysis can provide insights on the trends in the occurrence of the electronic crimes, the frequency of the incidents depending on the region, and help to classify the offences.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2020

The Concept of Artificial Neural Networks

The concept of artificial neural networks as a method of imitating the functioning of the human brain is currently defined as "a tool for predicting and modeling the phenomena that is inspired by the human [...]
  • Subjects: AI
  • Pages: 1
  • Words: 292

The Influence of Robots and AI on Work Relationships

In the early 20th century, Taylor's work focused on production management and labor efficiency, which led to the attention of managers to the problems of selection, the motivation of employees, and their training.
  • Subjects: AI
  • Pages: 3
  • Words: 903