Tech & Engineering Essay Examples and Topics. Page 8

4,370 samples

Home Networks, Their Functions and Features

A home network is a small local area network that enables communication among two or more computing devices within a limited area of a home. Typical elements of a home network are a modem, a [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 552

Disruptive Technology and Its Implications

As a result, their extensive use of smartphones denies them the opportunity of understanding the way they relate with these groups of people.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 580

Advanced Propulsion Systems: Lockheed Martin F-35

The key to innovation in the aerospace industry has always been the evolution of propulsion systems and engines. The propulsion system on F-35 needed to be designed and tested to meet the requirements of all [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2256

Robotics. “Humans Need Not Apply” Video

Mechanical muscles are more strong and reliable than humans, and the replacement of people by mechanisms in physical work allows society to specialize in intellectual work, develop economics and raise the standards of living.
  • Subjects: Robotics
  • Pages: 1
  • Words: 304

Technology and Causes of Using It

In this way, to a large extent, information sharing supported by contemporary technologies helped change the view of the world and make it more integrated.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 565

Effective Power Transmission Systems

After accentuating the necessity of the new transmission system and the associated planning, the authors focused on the benefits of transmission systems in general.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1677

Powered Exoskeleton in Military & Space Industries

The use of exoskeletons by the military will lead to a reduction in the need for heavy-lift machinery on the battlefield since the soldiers will be able to lift heavy objects with the help of [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 587

Digital Temperature Controller

The effectiveness of the temperature controller improves the productivity and performance of the machine. The project demonstrates the functions and capabilities of the digital temperature controller.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1151

Technology in Education and Medicine

Also today, courtesy of technology, students with learning disabilities can participate fully in the learning process using assistive learning techniques and programs.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Nova Scotia’s Westray Mine Tragedy

The report of Richard Justice blamed the business firm that supervised the coal mine and different government superintendents who overlooked defiant stare of safety mistreatment. In addition, the Westray administration never conformed to protection guidelines [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1192

A Survey on Iphone and Blackberry

An internet survey to determine the number of people who liked the iPhone and those who liked BlackBerry was conducted. Participants were asked to name the phone they like most and the reasons.
  • Subjects: Phones
  • Pages: 3
  • Words: 167

Laptop Models and Their Specifications

The best feature of this laptop is that it has genuine Windows 7 which is suitable for a RAM of 2GB and hard drive of 320 GB.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 681

Workers’ Safety in Petrochemical Industry

It is noted that both the employer and the employee have a role to play in improving the health and safety of workers in the work place.
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 2017

Science and Technology Impact on Globalization

Globalization has by now laid down the phase for this epoch through making the world interrelated further and the tools of empowerment available to all."To start with, Globalization refers to the trend toward countries joining [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 826

Software Engineering Career Information

Software Engineering is a field in engineering that requires the practitioner to apply the principles of engineering in the design and development of software products.
  • Subjects: Engineering
  • Pages: 2
  • Words: 549

Computer Hardware Components and Functions

Hardware is the physical components of a computer, while the software is a collection of programs and related data to perform the computers desired function.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 251

Audio-Visual Media and World Wide Web in Education

Due to manifold effects of technological innovations, education has undergone positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide Web, one [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 785

Technology and Human Development

This paper discusses video games as learning tools to highlight the kind of knowledge that they present to learners and their effectiveness in enabling people to acquire the knowledge.
  • Subjects: Technology in Education
  • Pages: 9
  • Words: 2508

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1445

Etihad Airways’ Forecasting and Ticket Ordering

In the aircraft industry, productivity is not hard to measure due to the transparency of annual reports and a rather visible impact of the core variables on the success of the company.
  • Subjects: Aviation
  • Pages: 5
  • Words: 1427

Video Games as Learning Tools

There are at least three major ways to redeem the value of video games in the context of the development of cutting-edge learning tools based on the same format that developers use to provide violent [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1181

Administrative and Academic Software

This enhances the campus ecosystem which comprises of the student information system and mainly deals with the integration of departments as well as regulation of the flow of work within the respective departments.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 674

Types of Learning Environments

In addition, when the information is pre-recorded, it is possible to schedule the class according to the individual needs of a student.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 630

Computer Viruses, Their Types and Prevention

A memory-resident virus is one of the most resilient types of viruses out there since it resides in the RAM of the computer and comes out of stasis every time the computer's OS is activated.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1108

The Big Data Definition

It can be used in any field that requires operations with the big data sets, including the fact that there is a possibility of utilizing the Big Data techniques for the purposes of resolving various [...]
  • Subjects: Data
  • Pages: 6
  • Words: 1743

The Printing Technology: Principles and Applications

It has been established that the thickness of the dead zone is in the range of tens of micrometres, which calls for a judicious estimation of the correct parameters to be used as conceptualised in [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1687

The Impact of Technological Change on Business

While it is obvious that effective and diverse means of communication have been at the disposal of entrepreneurs for more than a century now, it is undeniable that the development of the informational technology, especially [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1735

Saudi Aramco Company’s Engineering Innovation and Ethics

The organization has been operating in the environment of the global market since 1933 and has gained a reputation of the company that promotes technological innovation as the foundational tool for attaining high-quality rates.
  • Subjects: Engineering
  • Pages: 14
  • Words: 3920

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

Sciences and Technology Role in History

Technology has played a key role in development of such inventions as gunpowder in 13th century, printing development in 15th century, steam engine invention in the 18th century, and development of various factories in the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 605

Legal Issues of the Multimedia Usage in Classrooms

To avoid any legal issues, the organization should make sure that all employees are aware of major regulations and laws associated with the use of intellectual property. Of course, it is important to remember that [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

Aviation: Security Risk Management

Moreover, the rise of terrorism and its spread throughout the globe has also contributed to the great importance of security measures that must be explored to guarantee the security and safety of passengers and personnel [...]
  • Subjects: Aviation
  • Pages: 11
  • Words: 3098

Education Technology Resources

However, it is not recommended to use it with elementary school students due to the complexity of the interface. It is possible to highlight some sections of the paper and leave a comment that will [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1725

Emergency Response Planning in the Airline Industry

The goal of this paper is to provide information about the concepts surrounding this issue and to look into the impact of emergency response on the reputation of an airline and legitimacy based on real-life [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 3558

Computer Based Learning in Elementary Schools

The main purpose of the research is to consider the background of the chosen sphere, the elementary education, and discuss current business issues in the computer technologies which may be used in the sphere and [...]
  • Subjects: Technology in Education
  • Pages: 8
  • Words: 2230

The Importance of Virtual Learning Communities

The learning communities enable the instructors and the students to volunteer their questions. The virtual learning communities enable online degree programs to give students autonomy over the learning process.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1679

Aviation Logistics Internship in the UAE

As a trainee in the department of aviation logistics, I was supposed to supervise the procurement and shipment of varied military resources.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3177

The Importance of Media in the Classroom

The theory is developed from the perspective of a teacher and aims at the analysis of the classroom media employment as well as the accommodation of the reviewed sources to the school conditions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 405

Agencies’ Cooperation in Airport Security

The airport personnel is the first agency that has the responsibility to ensure security in the airport. The first thing that the airport personnel have to do is to confirm the identity of the passengers.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1636

Supervisory Control and Data Acquisition System

Sensors and control relays transmit data to RTUs and PLCs deployed in specific locations of the managed system, and this is where data acquisition occurs. RTUs and PLCs send the acquired data to the master [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1137

Thermistor and Its Applications

This paper examines the working mechanism and applications of Thermistors Thermistors are special kind of variable resistors whose resistance changes with changing temperature i.e.a change in thermal temperature results in changes in its resistance value.
  • Subjects: Engineering
  • Pages: 2
  • Words: 668

Relationship with Cell Phones

Cell phones are people's new relationship because people use them to execute many of their daily activities. They have encouraged multitasking and solitude because people spend a lot of time interacting with information and communication [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 598

Technological Development and Dependency

With rapid technological developments, many people are today concerned with the impact of technology in the life of the modern man.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 622

Ethical Behaviour in the Engineering Workplace

In the engineering environment, the general quality of any role execution matrix is dependent of the culture of such organization since it drives the morale and action of those participating in the production function.
  • 5
  • Subjects: Engineering
  • Pages: 12
  • Words: 3300

System and Application Software Difference

Both system software and application software are programs for the computers, but system software includes the programs that are provided together with the installation of the operating system for the computer.
  • Subjects: Internet
  • Pages: 2
  • Words: 581

American Airlines 1420: Accident Overview

Because of the thunderstorm and heavy rain on the way, the pilot did not manage to land the plane safely, and it crashed after the overrunning the end of the runway.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1385

Computer Hardware: Past, Present, and Future

Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1123

The Systems Development Life Cycle

The Systems Development Life Cycle is a conceptual model for IT specialists to institutionalize system development through the conventional phases of planning for defining system development resource requirements, analysis for determining end user requirements, and [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 483

Surveillance Cameras and Information Technologies

Certainly, the use of surveillance cameras presents those responsible for the management of information technology systems with data and information that would otherwise be difficult to come by.
  • Subjects: Internet
  • Pages: 5
  • Words: 1467

Fire Hazards Related to Fireworks

In the period of the Song Dynasty that lasted from 960 to 1279, a majority of the ordinary persons could buy a variety of forms of fireworks from market sellers, and splendid exhibits of fireworks [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2798

Online Research and Web Based Survey Methods

They are well-constructed surveys that take to account most of the requirements that credible research entails. These surveys are conducted over the internet and they involve samples of the exact population of interest.
  • Subjects: Internet
  • Pages: 4
  • Words: 1124

General Aviation Security Liabilities

Presently, the increase in the number of attacks on airports and airlines due to poor maintenance and negligence is a serious concern to a number of stakeholders.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2310

Globalization Influence on the Computer Technologies

In spite of the fact that globalization may be defined as a serious problem in different spheres of life, it is wrong to believe that the future of IT may undergo negative effects; it seems [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1119

Engineers and Ethical Dilemmas

Recently in the Kenyan media there was a situation in which a road engineer had been approached by the government to aid in the design and construction of a road in the Langata area.
  • Subjects: Engineering
  • Pages: 2
  • Words: 585

“It’s a Flat World, After All” by Thomas Friedman

Information technology was and has remained critical in the realization of a global virtual village, which is marked by the ease of access to information from all corners of the world and the ability to [...]
  • 1
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2214

Using Smartphones in Learning

The other purpose of the study is to understand the recent developments that have been made to the smartphones and how people are able to adopt the changes.
  • 4.3
  • Subjects: Technology in Education
  • Pages: 22
  • Words: 6084

Metadata and Tools in American Express

The ETL tool is used in the data integration section of the master data management implementation to alternate, standardize and transfer data to the master data management hub. Another factor that companies should consider in [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1478

Twitter Discussion Application Programming Interface

Part of the reason for the limited usage is the inadequate amount of documentation and research on the subject of Geo-location using Twitter and mining of online health information using Twitter.
  • Subjects: Phones
  • Pages: 10
  • Words: 2825

Spatial Data Division of Abu Dhabi Municipality

First the customer goes to the customer service to fill up the request form and inform the office of the request's rationale and the coverage area of the project or study.
  • Subjects: Data
  • Pages: 14
  • Words: 3603

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Subjects: Computer Science
  • Pages: 35
  • Words: 2834

Attribute-Based Encryption Overview and Benefits

The features of the public-key encryption include cryptography, public, and private key. As a result, the user can secure and authenticate data integrity using the private key.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 831

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Cryptology and Data Protection

The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 955

Internet Filtering Positives and Negatives

The issue of keeping of information by governments does not hold because as the government leaves the internet open to no filtering, it only protects the rights of a few individuals.
  • Subjects: Internet
  • Pages: 4
  • Words: 1042

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1864

Voice Over Internet Protocol (VoIP)

For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2838

The Infrastructure of Cloud Computing as a Service

Typically, the entire system of cloud computing drawing from its definition provides the infrastructure for organizations to offer clients services dynamically responding to their needs based on the pay-as-use basis, and the economic benefits which [...]
  • 5
  • Subjects: Cloud Computing
  • Pages: 15
  • Words: 4383

Phone Manufacturing Industry

In the next five years, the industry is expected to be affected by macro-economic factors as follows: With increase in population, the industry is likely to have an increased number of people with varying needs [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 631

Miniaturization Process Associated Risks

Miniaturisation is the process of continued minimisation of the sizes of devices and products. Privacy The reduction of the size of technological devices has made stalking and invasion of privacy an easy process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1539

Lean Burn Engine Technology

First, the excess air used in lean burn technology reduces the temperature of the combustion process and this lowers the amount of oxides of nitrogen produced by nearly half, compared to a conventional gasoline engine.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2773

The Advantages and Disadvantages of PMA

The difference between the licensed and independent PMA is in the character of the cooperation between the companies and the features of producing the PMA parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 553

Influence of Information Systems

The smooth flow of information in a business enterprise is essential for the survival of the business. Due to the limited scope of the traditional information systems, there was little functionality in the management of [...]
  • Subjects: Data
  • Pages: 7
  • Words: 2056

The Improvement in Technology

The better technology the industry has, the greater the computing power and in effect the faster, persuasive and competitive the product becomes.
  • Subjects: Applications
  • Pages: 10
  • Words: 2824

Threat to Civil Aviation-Hijacking

The 9/11 attacks on the United States' civil aviation industry demonstrated the extent to which terrorism can cause damage to the economy of a country and mass murder of innocent individuals. On the other hand, [...]
  • 1
  • Subjects: Aviation
  • Pages: 8
  • Words: 2192

Technology Development In Asia

The science and technology in the Republic of India, for example, has employed advanced technologies in the manufacture of commercial vehicles.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1619

Extranet and B2B E-Commerce for Business

The risks to be considered by the Top Breadz team studying the solution are the following: Retail partners might not possess the proper or compatible Information Technology background to gain advantage of Top Breadz's new [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 1842

A Review on Cloud Computing: Concepts and Benefits

According to Rodriguez, several organizations establish community cloud to have common requirements and need to share infrastructure to understand the benefits and aspires to assemble ideologies of a digital ecosystem with the use of a [...]
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2768

Impact of Information Technology on Customers

Most businesses in the globe have adopted the digital way and businesses are sacrificing their time and finances to bring in advanced technologies to tackle and manage their processes within the business effectively and efficiently.
  • Subjects: Applications
  • Pages: 6
  • Words: 1642

Cheating in the Internet

The presence of ecommerce has increased the number of fraudulent deals in the internet. However, with the increasing number of transactions in the internet, fraudsters are taking advantage of the situation.
  • 1
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Solar Energy in the United Arab Emirates

The success of the solar power initiatives in the UAE is largely attributed to the wide range of financial incentives that the UAE government has offered to the companies that are prepared to advance the [...]
  • 5
  • Subjects: Engineering
  • Pages: 5
  • Words: 1352

Ethics and Nanotechnology

Although the development of nanotechnology is significant for the general technological progress of the contemporary science and it can meet the people's needs, from the perspective of their impact on humans, the achievements in nanotechnology [...]
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1884

Installing a Power Supply Back Up System

This is because, power required to run the oven and freezers for long should be available and if a power supply cannot produce that equivalent of power the tests will be invalid.
  • Subjects: Engineering
  • Pages: 3
  • Words: 811

Ethical Hacking: Bad in a Good Way

Introduction of personal computers led to the increase in the number of hackers as well as hacker targets were widened. Many hackers lack the skills to damage network systems in a major way.
  • 3
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1718

Smoke Alarm “Smart Smoke Detector”

Smart Smoke detectors will allow customers to evade the smoke detector and to reduce the annoyance of the alarm. This report examines extensively and pinpoints the expected process that Global Engineering will follow to achieve [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1092

Analysis of Dubai’s Aviation Model

This paper not only sheds light on the factors contributing to the success of the sector but also analyzes the contributions of the aviation sector to Dubai's economy. The success of the partnership is attributed [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1574

Security of Your Computer and Ways of Protecting

Authentication is used to mean that the information in the computer is only available and accessible to the authorized parties. This method is more effective as it can include hardware using multiple versions of software [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 545

Video Games Impact on Peoples Lives

These games have had a great influence in the minds of people, especially the children who have stopped playing the usual games on the fields to sticking on the computer and television screens playing video [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3703

Technology and Music Industry

The impact of file sharing technology in the music industry has been a major obstacle to its advancement. In a clearer way, the future purchase and sale of music is anticipated to be easier.
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1720

History and Development of X-Rays

Professor Roentgen's discovery of X-Ray in 1895 was a very big step in the field of medicine since it was the beginning of a long and interesting journey in the study of radiation.
  • 5
  • Subjects: Engineering
  • Pages: 6
  • Words: 1644

Description of Global Positioning System Device

Image 1 shows the positions of the various satellites that constitute the GPS. It is done to establish satellite clock and orbits profiles in order to update the navigational information of individual satellite.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

GPS Technology Pros and Cons

GPS Navigation technology Navigation technology uses a GPS receiver and internal road database, which provides the user with a clear view of the surrounding in real time.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 632

Java is the best programming language

It is so simple to use, with a user friendly language vocabulary and so fast in compilation these have made it the widely used language in programming.
  • Subjects: Programming
  • Pages: 2
  • Words: 586

Technology Impact on Human Civilization

Despite the large amount of information that the internet provides to people, research shows that the internet may have a negative effect on the intellectual ability of an individual. The use of technological devices may [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 816

Network Topology Design Process

The network design used the allocated company address space of 150.10.0. PART OF NETWORK NETWORK USED New York subnet 150.10.0.
  • Subjects: Internet
  • Pages: 5
  • Words: 962

BlackBerry: Customer Behavior Analysis

Also, Blackberry has cut a market niche as a business device, enabling the company to get hold of the corporate users and distinguishing itself from the rest of the market.[1] Consumer behavior attempts to evaluate [...]
  • Subjects: Phones
  • Pages: 5
  • Words: 1378

The History of Relational Database Technology

In 1980's the disadvantages associated with relational database systems and the need to increase capacity of manageable objects led to the invention of commercial object-oriented database systems.
  • 5
  • Subjects: Data
  • Pages: 8
  • Words: 2179

The Issue of Privacy

In the magazine article named 'Privacy and the Limits of Law', the author Ruth Gavison has pointed out that perfect privacy is impossible to be achieved most of the times with the emerging technologies in [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2208

The Engineering Challenges of the 21st Century

The experiences in terms of the effects and the response measures used in the Chernobyl nuclear power plant accident can be considered by Japan to help it address the consequences of the Fukushima nuclear disaster.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1958

Smart Classroom and Its Effect on Student Learning

In the event of a need for some practical experience, there was some assembly of some equipment in a separate room such as a laboratory and the teachers together with the students engaged in the [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1628

Impact of Modern Technology on Human Communication

However, this paper has also illustrated that there may be hindrances to communication which can arise from the abuse of modern technology in communication efforts by individual.
  • Subjects: Internet
  • Pages: 3
  • Words: 808