Tech & Engineering Essay Examples and Topics. Page 8

4,310 samples

The Harry Potter Phenomenon Analysis

Since these groups sowed the seeds of the Potter phenomenon, the connectors and, later, the mavens were crucial to the publication of the first novel, Harry Potter and the Philosopher's Stone.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1770

The Smart Parking Space App and Its Functions

The median occupancy rate for the two days of the week, Monday and Friday, is exactly the same. There is a breakdown of the occupancy rates for each lot, broken down by day and hour.
  • Subjects: Applications
  • Pages: 5
  • Words: 908

Artificial Intelligence Transforming the World

The possible effects of any program on the community can then be planned for and measured by managers. To conclude, even though most people are unfamiliar with AI, the world is on the verge of [...]
  • 5
  • Subjects: AI
  • Pages: 2
  • Words: 557

Blockchain-Based Community Battery Storage System

The current moment provides a unique business opportunity to implement a community-level battery storage system based on blockchain technology that would provide sustainable electricity for the Egyptians and contribute to the development of new RES [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 607

Architectural Heritage: Digital Preservation

The main aims of digital preservations are; to enable the supply of heritage through digital outlets to large audiences, to guarantee that initial measurements and forms of natural heritage are not lost in case of [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2306

Using Technologies in Kindergarten Classrooms

Integrating modern technologies into the educational process in kindergartens helps educators transmit knowledge to the children and influence their emotions and perception of the materials.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1671

Cyber-Security Threats and Their Control

It requires advanced hackers to retrieve the information of an individual or an organization's password database. The creation of robust passwords is an appropriate way to prevent the concern.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 399

Technological Determinism and Society

This is due to the fact that if earlier the influence of technology was largely limited to the production of material goods, today this influence permeates the entire life of a person.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 761

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

Data Buses: Definition and Key Features

The significance of the address bus is to assist the CPU in locating specific information in the memory, while the control bus regulates data processing.
  • Subjects: Data
  • Pages: 1
  • Words: 286

Artificial Intelligence in Marketing

Artificial intelligence in marketing is a method of using customer data and AI concepts, including machine learning, to predict the next step of the consumer and meet his needs, even those that the consumer has [...]
  • Subjects: AI
  • Pages: 2
  • Words: 621

Technological Challenges in Business

There is a challenge for the organization's management to implement procedures and policies for effectively managing the private data of the organization.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 320

Windows Server Installation and Configuration

The fourth stage is the configuration of Remote Access and Service. The logs are used to monitor the server activities and troubleshoot problems in the system.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 401

Cryptographic Algorithms: The Use in Cyber Security

Cryptographic protection of a system depends on two factors, 1) the strength of the keys and effectiveness of associated protocols, and 2) protection of said keys via key management.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 638

Application Software Integration: Pros and Cons

The breakthroughs within the field of information technologies revolutionized the environment of software development. The integration often leads to the improvement of the reporting process.
  • Subjects: Applications
  • Pages: 1
  • Words: 294

Survey Monkey: The Online Assessment Tool

We also give the reader the findings of a survey conducted with this tool and an assessment of its usefulness and potential for use in future usability studies. Survey Monkey is a web-based tool and [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 955

Artificial Intelligence in Cybersecurity

The use of AI is regulated by a large amount of documentation, which should take into account the current legislation in the country of use and ethical issues related to AI, many of which have [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 585

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Cybersecurity Strategy and Plan of Action

Padgett-Beale's primary intention of merging the company was to relocate the call epicenter to a property owned by the company roughly 10 miles from the company's previous location and opposite the newly released Padgett-Beale resort.
  • Subjects: Cyber Security
  • Pages: 26
  • Words: 7197

Technoscience and Humanity in the Elysium Film

Moreover, the concepts of transhumanism and artificial intelligence are analyzed in the context of the corrupted social order to draw on the failure of humanism, ethical and moral decay, and prosperity of the wealthy.
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1993

Big Data and Distributed Databases

Big data refers to a type of set of information that requires memory beyond the capacity of the conventional relational databases.
  • Subjects: Data
  • Pages: 1
  • Words: 336

Technology in Education: Benefits and Challenges

To succeed in this learning environment, students need to develop organizational and clinical skills and strategies to achieve academic success; challenges may be associated with the quality of received information and consequences of using devices.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 634

How Do Hybrid Cars Work

The branch supports hybrid cars because they help to protect the environment through the reduction of emissions to the atmosphere and use of less fuel.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 50
  • Words: 14365

Electronic News Gathering

The Characteristics involve the Utilization of electrical video to gather information, the Incorporation of Audio technologies in gathering news, and the Utilization of portable equipment in the newsgathering process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1366

Malé International Airport: The Landside

The Male International Airport is the main international airport of the Republic of Maldives. This island can be found in the North Male Atoll, not far from the isle of Male, the city on which [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1165

Usability Testing and Pact Analysis Report

The PACT analysis is conducted to find the utility of the tool in the optimum resource management at a call center. The usefulness of the Call Center Traffic Monitoring System is to be measured by [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3200

Process Virtualization Theory Overview

Therefore, the author found it appropriate to address the theoretical underpinning of IT in virtualization processes to account for the gap in the field.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1420

Network Reconnaissance Using Command Line

The command enters works through the interactive mode when no arguments are stated, or when the in itial argument is a - and the following argument is the server's internet address name or the host [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2247

E-bazaar Implementing Virtual Private Networks

With increase in the popularity of the internet, many businesses turned to the internet in order to cut on running costs and expand their network which has eventually paved way for the evolution of virtual [...]
  • Subjects: Internet
  • Pages: 12
  • Words: 1855

Condenser Operation and Maintenance

The design of the surface condenser is such that steam is made to get its way into the condenser system through an opening at the top section of the condenser system after which distribution takes [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2202

Stress-Strain Relation of Stainless Steel After Exposure to Fire

To study the behavior of stainless steel at elevated temperatures, the material data of the steel obtained through testing is important.ca Steady-state tensile tests and transient-state procedures determine the stress-strain relationships of stainless steel at [...]
  • Subjects: Engineering
  • Pages: 15
  • Words: 4453

Association of Computing Machinery (ACM)

This is mainly because the field is wide and hosts millions of professionals, researchers, as well as educators that strive to improve scientific computing. The main aim of this association is to promote computing as [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 990

Definition and Use of Satellite Communications

The emergence of the satellite communications technology has the roots in the missiles and the microwaves technology which expanded greatly following the stimulation of the Second World War.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2462

Noise Cancelling Headphones Technology

However, the actual electronic circuitry is located in the plane's hand rest where it takes the sound signal from the microphone which is behind the headphones then inverts it sums it up together with the [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1072

Network Design for Business

The physical and the logical layout structure of the network have to match the design and the business needs in that particular context.
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1077

Simply Accounting vs. QuickBooks: Comparison of Programs

This paper makes a comparison of the accounting software, Simply Accounting with QuickBooks and Both Simply Accounting and QuickBooks share many common features; but for the selection of a particular accounting software program, it is [...]
  • Subjects: Applications
  • Pages: 5
  • Words: 1461

Data Integrity in Relational Databases

To ensure that there is validity and accuracy of data, a database designer should be able to select the correct primary key that reflects the requirements of the database in regard to information search, updating, [...]
  • Subjects: Data
  • Pages: 2
  • Words: 740

Membrane Filtration Technology

The paper is organized into subsections including how the technology works, alternative technologies, effectiveness of the technology, management of the technology, and application of the technology.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1896

Low-Cost Carriers and Secondary Airports

LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
  • Subjects: Aviation
  • Pages: 2
  • Words: 929

Fixed-Base Operators in the Aviation Industry

Most of the business conducted within the airdrome environs as well as those that require a straight linkage to an airdrome in order to subsist yet their chief commerce is not associated to aviation.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2216

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1686

Control Philosophy. Variable Speed Drives

The second one is the management and provision of adequate and stable pressure connected to all the identified stakeholders in the project.
  • Subjects: Engineering
  • Pages: 1
  • Words: 396

The Influence of Memes on Our Lives

After the third grade, I went to my grandparents on vacation in the village, and I planned to have fun with my friends and spend time in the fresh air in the countryside.
  • Subjects: Internet
  • Pages: 6
  • Words: 1683

The Role of Digital Technologies in Education

The interactive Mother's Day card and the story of a 13-year-old boy convey the idea of the importance of technology for an individual's development.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 937

Cisco Packet Tracer: A Simulation Tool

The administration usage of the computers is represented by A. 255 as the address range of F Administration = 176.16.1.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 1326

Using Free Antivirus Programs: Pros and Cons

So, you should always remember that it is of great importance to keep your computer and personal data safe by installing an antivirus program.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 534

IBM SPSS Software Analysis

IBM SPSS is one of the statistical packages used for analyzing and interpreting data. Validity has two distinct sections namely the research section and the degree to which a test measures some data.
  • Subjects: Programming
  • Pages: 2
  • Words: 568

Competitor Companies: YouTube vs. Google Video

The restriction of user-generated content to the use of a downloadable plug-in from VideoLAN had an irreversible effect on the growth of the site since it troubled many users in its operation and hence necessitated [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 900

The Compact Disc Technology

Compact disc players are physical equipments that retrieve encoded information from the CDs using a decoder section of the player, producing the output in form of sound, motion pictures, and other data forms to the [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1242

Technological Facilities: Computers in Education

The researcher chooses the students who study in the high school stage to investigate the issue of computer usage in high schools Physics classrooms in Saudi Arabia because different computer software is highly beneficial for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 842

Animation: Social, Economic and Technological Aspects

It was following the advent of motion picture films, that the field of animation was generated as films became popular. George Melies was one of the pioneers in the field of animation.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 842

Technology and Type of Powers on the Workplace

Surfing the internet can also be said to reduce stress as it offers a form of interaction with people in the outside world On the other hand, technology can be said to increase stress due [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 774

Seat Belts And Seat Belt Laws

Some factors that may affect fatality regardless of the use of the seat belts or not include the speed of collisions, the number of passengers in the vehicles that are involved in an accident, the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2967

Incident Command System in a Disaster Situation

The silver is the one who devises the tactics to be deployed in the operations of the team while the bronze roles are to control and ensure the resources at hand are distributed equitably to [...]
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2565

“The Real Transformers” by Robin Marantz Henig

The addition of "Real" in the title clearly indicates the theme of the article, in which the gap between the progress in the fields of robots and science fiction predictions casts doubt on whether we [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 572

Computers: The History of Invention and Development

It is treated as a reliable machine able to process and store a large amount of data and help out in any situation."The storage, retrieval, and use of information are more important than ever" since [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1660

Resource Description and Access (RDA) in Library

It is printed together by the Canadian Library, The American Library Association, Association as well as the Information Professionals along with the Chartered Institute of Library within the UK.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2396

The Increasing Human Dependence on Computers

Large amounts of information can be stored in the computer that is instantly available with the click of the mouse, which enables the ordering and tracking of resources in a very convenient and fast manner.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1443

Warehouse Safety and Occupational Health

Materials/goods should be well placed on the forks and lifted correctly to avoid slipping and falling on people. Forklift should be driven slowly and both the fork and the loads should be kept low while [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1174

Hardware and Software Development Analysis

The 90-s was a real breakthrough in software development and it was mainly connected with the development of the Internet. The dominant software policy of IBM for a long period was standardized and open mainly [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Batch Processing and Real-Time Processing

To begin with, one should mention that the time lag is one of the essential characteristics used to distinguish between real-time and batch systems.
  • Subjects: Data
  • Pages: 2
  • Words: 557

Operating Systems and Their Development History

The emergence of the scientific discipline of program design, the creation of compatible systems, the creation of emulators, the beginning of OS specialization.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 645

Occupational Health and Safety and Workplace Accidents

A Hazard refers to an unknown and unpredictable phenomenon within the workplace that is a source of danger and can cause an event to result in one way or another. One of the nightmares that [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1510

Pressure Drop and Full Models in Filtration Technology

Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2599

Software Development Life Cycle

Nevertheless, software development is a process that involves certain risks, as the SDLC framework is prone to weaknesses from the start of the project and until the acceptance of the final product by the customer.
  • Subjects: Programming
  • Pages: 3
  • Words: 885

The Three Types of Hackers

The article "They are attacking you: learn the three types of hackers' was written by Jonathan Nichols and explores the three main types of hackers that attack organizations and their clients, and the factors that [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

Incident Command Models in the US, the UK, Qatar

The current paper will consider the basic features and the structure of the three incident command models or systems: the National Incident Management System, the Joint Decision Making Model, and The National Command Centre.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1903

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1111

The Impact of Technological Change on Business

While it is obvious that effective and diverse means of communication have been at the disposal of entrepreneurs for more than a century now, it is undeniable that the development of the informational technology, especially [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1735

Airlines’ Practical Guidelines in Procurement Process

This paper examines how airlines can maximize the usefulness of practical guidelines that can be used to implement a performance-based contracting approach in their procurement process and the value the aviation industry will acquire in [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1981

Frequency Modulation, Its Applications and Future

The main reason the review of frequency modulation is the focus of the research is the rise in popularity of the digital media, which requires the novel approach and means of operation.
  • Subjects: Other Technology
  • Pages: 12
  • Words: 3371

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1162

Google Android OS: Strategic Plan

One of the plans for the company is to be the choice company for smartphone manufacturers in the choice of software required for the manufacture of the phones.
  • Subjects: Applications
  • Pages: 4
  • Words: 1233

State Farm: Dangerous Intersections Study

The Dangerous Intersection gives a report of the accidents caused by intersections and makes an effort to prevent further loss through improvement of safety intersection in the United States. Gross misconduct of the driver and [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 457

Technology-Based Learning and Learning Outcomes

But even though the stakeholders in the education sector consider technology-based learning as the solution to challenges experienced in traditional learning, the efficacy of technology-based learning continues to be questioned.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1128

Manufacturing Industry Accidents: Causes and Protection

The first direct cause of the accident was the inexperience of the crane operator and the injured worker. The second direct cause of the accident was irresponsibility by the employees involved in the accident.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 617

New Technology and Its Harm to Society

Owing to the huge significance of technology, new technology is constantly being developed and implemented with the aim of improving human life even further.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1425

Voice Recognition Technology: Definition and Usage

It is against this backdrop that this report explores the concept of voice recognition technology in terms of disadvantages and domain of its use, impacts of this technology on individuals and organizations as well as [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1826

Thermistor and Its Applications

This paper examines the working mechanism and applications of Thermistors Thermistors are special kind of variable resistors whose resistance changes with changing temperature i.e.a change in thermal temperature results in changes in its resistance value.
  • Subjects: Engineering
  • Pages: 2
  • Words: 668

Artificial Intelligence and the Associated Threats

Artificial Intelligence, commonly referred to as AI refers to a branch of computer science that deals with the establishment of computer software and programs aimed at the change of the way many people carry out [...]
  • Subjects: AI
  • Pages: 14
  • Words: 3704

Internet Evolution and Structure

The creation of the network was meant to be a security measure to ensure that data and information belonging to ARPA remained within the system.
  • Subjects: Internet
  • Pages: 5
  • Words: 1406

Engineers and Ethical Dilemmas

Recently in the Kenyan media there was a situation in which a road engineer had been approached by the government to aid in the design and construction of a road in the Langata area.
  • Subjects: Engineering
  • Pages: 2
  • Words: 585

Technologies: History of Telephone

First, it is necessary to note that the telephone is a device used to communicate. When a speaker picks up the handset, switch hook is closed, and a direct current is sent to the line [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 571

Skype: All you Need to Know

A number of features of Skype comprise Skype to Skype calls, SMS messaging, video calls, immediate messaging, and the capability to forward calls to cell phones of the users when the user is offline.
  • Subjects: Phones
  • Pages: 5
  • Words: 1390

Using Smartphones in Learning

The other purpose of the study is to understand the recent developments that have been made to the smartphones and how people are able to adopt the changes.
  • 4.3
  • Subjects: Technology in Education
  • Pages: 22
  • Words: 6084

Technology Evolution in The Modern Society

Service perspective - which holds that e-commerce constitute a tool that fulfills the needs and desires of companies, customers and management with aim of reducing the transaction costs while at the same time being able [...]
  • Subjects: Other Technology
  • Pages: 15
  • Words: 4289

The Usefulness of Computer Networks for Students

The network has enabled us to make computer simulations in various projects we are undertaking and which are tested by other learners who act as users of the constructed simulations.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 718

Wireless charging

The application and constant development of mobile phone technology in the modern era is experiencing a boom, as innovators in the technology sector look forward to a future of introducing wireless charging technology for the [...]
  • 1
  • Subjects: Engineering
  • Pages: 4
  • Words: 1194

Application of Technology in Education

Therefore, it is vital for educators to use the above spheres of learning in the application of technology in education. However, the spheres of learning are in constant conflict with each other in the lives [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1107

Negative Impacts of Computer Technology

For instance, they can erase human memory, enhance the ability of human memory, boost the effectiveness of the brain, utilize the human senses in computer systems, and also detect anomalies in the human body. The [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1103

Technology Fails to Deliver Happiness

With the advancements in information technology and the massive use of the internet, communication has become quite effective as people can connect when they are in different countries around the world, at any time.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1359

Extranet and B2B E-Commerce for Business

The risks to be considered by the Top Breadz team studying the solution are the following: Retail partners might not possess the proper or compatible Information Technology background to gain advantage of Top Breadz's new [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 1842