Tech & Engineering Essay Examples and Topics. Page 8

4,449 samples

Health and Environment: The Impact of Technology

This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
  • Subjects: Technology Effect
  • Pages: 20
  • Words: 5816

Interactive Tools: Types and Its Benefits

In this modern day, it is important to remain competitive. Information technology and interactive tools are some methods which one can improve the online consulting process.
  • Subjects: Applications
  • Pages: 12
  • Words: 1586

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 974

Digital Control Systems: Digital Signal Processing

The second use of the digital filters is the "signal restoration" which is needed when there is distortion of a signal due to any reason like poor equipment quality or mishandling of devices etc.in this [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1459

Interoperability of Web Services

Interoperability is the felicity of a software interface working with diverse and varied software systems swiftly and at ease for providing special finesse and rhythm to web services' network and its operations.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2410

Compound Bows: Term Definition

Archery: this is the art shooting arrows using a compound bow Cam: this is the pulley of a compound bow The intention of this document is to offer archers with relevant information about compound [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1114

Computer Components in the Future

It must be noted though that liquid cooling systems utilize more electricity compared to traditional fan cooling systems due to the use of both a pump and a radiator in order to dissipate the heat [...]
  • Subjects: Computer Science
  • Pages: 24
  • Words: 6517

Aviation Industry: New Technologies

The reason behind this is due to the fact that the researcher believes that as a student attempting to attain a Bachelor of Science in Aeronautics with a Minor in Safety and Human Factors his [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1928

Hydraulic Pumps: Review

There are several types and a majority of them are adjustable in order to regulate the amount of pressure delivered by the pump few are not; depending on whether the pumps are hydrostatic or hydrodynamic.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1095

Types of Crime in Cyberspace

While there are numerous advantages that accrue from progress of the ICT like improving the speed at which information, news and ideas are transferred from one part of the globe to another and efficiency in [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2220

Doping Characteristics of Gallium Nitride (GaN)

The design of the device is done in a form that provides for diffusion in the emitter, is a quassi-neutral base with the doping densities in the emitter and the base.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 597

Engineering and Technology Management

Engineering and technology management group is aimed at encouraging the coordination of engineering and technology to management technicalities which has divisions for national and international conference participation.
  • Subjects: Engineering
  • Pages: 3
  • Words: 875

The Importance of System Engineering

For instance, three dimensional modeling and simulation was used in the manufacturing process and the product design of Boeing 777. During the process of product development for Boeing 777, the simulation process was used to [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 750

Network Design for Business

The physical and the logical layout structure of the network have to match the design and the business needs in that particular context.
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

How Solar Traffic Lights Works

One of the most serious challenges in the world today is the scarcity of energy resources. The Americans started using traffic lights in 1912."Salt Lake City is where the traffic lights were first used to [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1371

The Aviation Industry in France

The amalgamation of five private airlines in the year 1933 led to the formation of Air France, the national airline. In the early nineties, the airline was in the brinks of collapse due to heavy [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1908

Diesel Generator, Its History and Future

In a diesel engine fuel and gas are mixed in the cylinder before ignition while in a spark engine fuel is mixed external to the cylinder before ignition. The coupling of diesel engine and Maxwell's [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 706

Excel Spreadsheet Tools and Their Applications

Therefore, this paper provides a description of the Excel spreadsheet tool and the relevant applications of spreadsheets in finance, marketing, and accounting activities.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2006

Lighting Techniques in 3D Animation

In distinction with 2D animation where every frame should be painstakingly painted and filled in with the required tints, lights, and shadows, lighting in 3D animation is performed by pointing the source of light, while [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1122

Road Safety in the Middle East and Gulf Countries

In this paper, we will look at road safety in the Middle East and Gulf countries, global statistics, types of road crashes, causes of road accidents and solutions to road crashes.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2789

Human-Computer Interaction and Communication

As the person is interacting with the gadgets or the computers, he should be favored by the design in that the system should be in such a way that it supports human usability.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1372

Impact and Types of Networks

The demerit of this kind of network is that if the server is faulty the entire network will be brought to a halt.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 713

The Importance of Web Portals

In some organizations the company portal is used by employees and clients to access important services that are available virtually. Tender's portals are used by bidders to bid for bidding tenders electronically which is much [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 645

Using Robots in the Medical Industry

Third, the robot surgery further has been observed to increase comfort on the part of the patient as the surgery proceeds, and this results from ergonomic position that the robot assumes as the operation proceeds.
  • Subjects: Robotics
  • Pages: 3
  • Words: 990

Computer Control System in a Laboratory Setting

In this case the iControl system is designed to control and monitor temperature variables of a hazardous liquid within a laboratory environment as well as other parameters such as smoke and light.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 786

The Use of Computers in the Aviation Industry

The complicated nature of the software enables the Autopilot to capture all information related to an aircraft's current position and uses the information to guide the aircraft's control system.
  • Subjects: Aviation
  • Pages: 2
  • Words: 536

Open Search Standard in Windows

A standard definition for OpenSearch as given by its website, opensearch.org, says that "OpenSearch is a collection of simple formats for the sharing of search results".
  • Subjects: Data
  • Pages: 6
  • Words: 1432

Ampere-Hour Meter Overview

Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2440

Computer Problems

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1056

Automation of Accounting and Monitoring Procedures

Therefore, the integration of IT into auditing functions contributes to the promptness in transactions' ascertainment processes and the validation of the accounting and financial information prepared from relevant records.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 913

The Rise & Fall of the Concorde

An investigation into the cause of the 2000 Concorde crash was crucial not only to the aviation industry but also to the assurance of the safety of future users of the aircraft.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1157

Are Digital Natives a Myth or Reality?

The tremendous change with the appearance of progressive technology is believed to give birth to inherently new technological and cognitive skills in people born in the era of technology.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 634

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

Importance Data Science in Business

Veracity refers to the degree of accuracy and precision in the analysis and interpretation of results, which is critical to decision-making and business development.
  • Subjects: Data
  • Pages: 5
  • Words: 1434

Cellphones as an Education Tool

Mobility and connectivity of mobile phones has the potential of being integrated into the curriculum, and depending on the region and type of education, the device has significant flexibility on its place in the classroom [...]
  • 5
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1388

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Cisco Packet Tracer: A Simulation Tool

The administration usage of the computers is represented by A. 255 as the address range of F Administration = 176.16.1.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 1326

Cyber Preparedness in Emergency Management

Cyber security became one of the fundamental constituents of emergency management's preparedness, mitigation, response, and recovery stages, and quick restoration of IT systems and recovery of organizations were discovered as the major duties of FEMA [...]
  • Subjects: Cyber Security
  • Pages: 21
  • Words: 5750

The Effects of Technology on Our Life

First, to demonstrate how technology has taken up the role of directing people's actions, she uses the example of the balloon that appears at the right bottom side of the computer.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 874

Fire Incident and Emergency Services Reflection

As for the matters of the analysis, the context and the details of the incident will be analyzed from the perspective of possible impacts and consequences, and the scales of these consequences.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2474

The Different Sides of Hacking

In a general sense, computer hacking involves the intrusion of the computing privacy of other people, damage of the computing property of other people like files, software etc.or the theft of private information by unauthorized [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 575

Evaluation of Macbook Laptop

The level can be as high as 160 GB hard disk which is double the original in the case of the black Mac Book.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 644

Nintendo Gameboy: Technological Advancement

Nintendo has made lots of variation in the original game boy this includes the Game boy pocket which is 30% smaller than the original game boy with equal size screen, the Game boy color it [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1243

Routing Protocols: RIP, EIGRP, and OSPF

The scope of the current project entails the use of interior protocols such as RIP, EIGRP, and OSPF. One is Distance-vector routing and the other is Link-state routing.
  • Subjects: Internet
  • Pages: 2
  • Words: 601

Boot Process of a CISCO Router and Computer

An understanding of the processes that would help in setting up the configuration of a router and its various elements can lead to relating the booting process of the router to that of any other [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 581

Emerging Trends in Technology

Future advancements in mobile or wireless technology promise to be a hot subject for the future of the globe, especially about lifestyle and conduct of business.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 691

The Concept of Digital Divide in Society

The main issues that are discussed here is: The difference between the people who use internet and those who do not, the rights to computer, and the digital divide between men and women.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 1037

Development of Mobile Phones and the Future

The first commercial mobile phone network known as APA was launched in Finland in 1971 and in 1978, the Bell labs made an attempt to launch the first commercial cellular network.
  • Subjects: Phones
  • Pages: 3
  • Words: 906

Gimp vs. Photoshop: Comparison

When it comes to working in a commercial area where one is supposed to provide high-quality work in the field of images and the like, one tends to opt for Photoshop.
  • Subjects: Applications
  • Pages: 5
  • Words: 1405

Open Technology. Marshall Poe’s The Hive Article

For instance, in training their leaders and the staff, you find that these people are in a position to learn online through the use of the internet and this has helped these organizations to reduce [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1297

Mobile Phone Base Stations: Overview of Technology

Most current mobile phones connect to a cellar network of base stations, which is in turn interconnected to the public switched telephone network Mobile payment: This is the processing of goods or services with a [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2111

Information Technology in the Employment Field

Information technology is the branch of technology devoted to the study and application of data and the processing thereof. Moreover, the development and use of the hardware, software, firmware, and procedures associated with this processing [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 2155

Electricity Hazards for Human Body

The main points of this article are to offer the reader with an awareness of the generally dangers of electricity, and to provide some insight into the physiological effects of electrical shock on the human [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1641

Multiplayer Online Battle Arena Video Games and Technologies

Online games are consistently evolving and taking advantage of modern technologies to improve the competitive aspects, viewer entertainment, market share, and social benefits in the modern digital age as evident in the example of League [...]
  • Subjects: Technology Effect
  • Pages: 11
  • Words: 2906

Beech King Air 200 Crash and Human Factors

For instance, throughout the approach of the localizer runway, the aircraft was actually five miles ahead of what the first officer and captain believed they were.
  • Subjects: Aviation
  • Pages: 2
  • Words: 594

Advanced Propulsion Systems: Lockheed Martin F-35

The key to innovation in the aerospace industry has always been the evolution of propulsion systems and engines. The propulsion system on F-35 needed to be designed and tested to meet the requirements of all [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2256

What Progress Has Been Made With Artificial Intelligence?

According to Dunjko and Briegel, AI contains a variety of fields and concepts, including the necessity to understand human capacities, abstract all the aspects of work, and realize similar aptitudes in machines.
  • Subjects: AI
  • Pages: 4
  • Words: 1091

The History of Welding

Welding, which is "the fusion of material by the use of heat," dates back to the Middle Ages. Nevertheless, arc welding developed only after the invention of the electric generator in the middle of the [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 590

Types of Acoustical Materials

These diffusers are used in order to supply a uniform broadband scattering of the sound and lower the high-Q reflections of sound waves.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 931

Computer Forensics and Cyber Crime

Due to age characteristics, the insufficient educational activity of parents, the provision of unlimited opportunities in the online environment, and also due to the low media literacy of the population, people can become victims of [...]
  • Subjects: Computer Security
  • Pages: 3
  • Words: 832

DELL and HP Machines Comparison

The two brands are known to produce good quality machines, and consumers prefer these models over the rest of the models in the markets.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

The Detailed Network Design and Layout Implementation

The internal network is connected to the external network with a T-1 link from Verizon using a dynamic NAT router installed and tested and overloaded with PAT to support a higher number of clients with [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 827

The iPhone Usage for Educational Purposes

The artifact demonstrates how technologies can be used to meet different students' needs, assess their level of knowledge, and plan for the management of technology resources to organize the learning of parts of speech.
  • 5
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 892

Database Management System Process

In this process, the participation of end-users is critical in helping to minimize resistance to change that is brought about by the system in the rollout phase.
  • 5
  • Subjects: Data
  • Pages: 2
  • Words: 628

Thomas Friedman on Globalization and Information Technology

Freidman explains that the convergence of technological innovations especially information technology tools such as the internet and the mobile phone, and political occurrences such as the fall of the Berlin wall as well as the [...]
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1447

Gas Station Fires, Their Causes and Effects

The final part of this essay will be to state the possible causes of fires that occur in gas stations. Direct fire will be the main cause of gas station fire that the essay will [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 583

Power Backups as a Solution to Outage Problem

Unless there is a solution to the situation, the project will be late. A technician will not be able to handle the outages alone, and thus, the problem will not be solved.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 848

Audio Conferencing for Smart Phones: Project Management

Inasmuch as variety of products exist in the market, a few of the products have the capability of offering audio conferencing services via the smart phones. The aim will be to generate a blueprint that [...]
  • Subjects: Phones
  • Pages: 10
  • Words: 2571

Internet Replacing Books as Learning Tool

The Internet is an opportunity to save time, find the required information, and use global connections, as well a threat of being isolated, misunderstood, and mislead; therefore, such factors as fashion, the role of parents, [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1735

How to Improve Student Presentations with Technology?

Also, having created a book dedicated just to the creation of presentations at school, the author pointed out the importance of this skill, as well as its complex nature and a variety of components that [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 912

Regulatory Requirements for Flight Crew: US and UAE

Considering the volume of air traffic, airports, and operators in the US, the FAA has extensive rules and regulations. To a large extent, GCAA has followed the rules and regulations of the FAA on many [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2314

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Aircraft Navigation History

First, people had to use the tactics they utilized moving on the land, but the use of radio, radar, and, finally, satellites enabled people to improve navigation significantly.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1097

Human Factors in Aviation Accidents

This fatal accident led to the death of all the passengers and members of the crew. The second framework that can be used to analyze the role of human factors in aviation accidents is the [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1663

TransAsia Airways Flight 235 Accident

The purpose of this paper is to review the Flight 235 accident, as well as to analyze the causes of its origin and the importance of the human factor, which made a critical contribution to [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2171

Digital Citizenship Definition and Problems

In this connection, the paper is devoted to the proposal of the digital citizenship necessity and its safe implementation including such integral aspects as digital literacy, etiquette, tolerance to other digital citizens, appropriate referencing, and [...]
  • Subjects: Technology Effect
  • Pages: 12
  • Words: 3341

Problems of the Software Piracy

This paper examines the modes of software piracy, the reasons behind it, who are the offenders, the cost of such actions, and how and who to control them.
  • Subjects: Programming
  • Pages: 6
  • Words: 1776

Using Cohesive Devices During the Course of Lectures

While the research objectives are relevant and the answers to questions put by Ali would benefit the investigation of discourse, the author's article incorporates a number of limitations connected with the flow of research as [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1137

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

SAP Software and Axios Assyst Integration

The organization makes enterprise software that is used in the management of business operations and customer relations. The firm is able to manage the delivery of new systems and products.
  • Subjects: Applications
  • Pages: 8
  • Words: 2259

The Process of Arc Welding: Main Aspects

The welding process is so broad that mechanical engineering as a discipline is part and parcel of it. Within the process of arc welding are other types which are described below: In this process, the [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1155

Cybercrime Dilemma and International Cyberwar

This paper studies the issue of cybercrime in relation to ethical concerns, the cybercrime dilemma, and the international involvement in the fight against cybercrime with a special focus on global interconnectedness.
  • Subjects: Cyber Security
  • Pages: 6
  • Words: 1768

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 919

Disney Resort Crisis Communication Plan

When dealing with an emergency, the head of crisis communication has to carefully follow a crisis communication plan. He or she will compile a list of key publics that have to be notified of the [...]
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1987

Engineering Ethics and Legal Standards

Patenting an improved version of a program that belongs to a company an engineer is working for is unethical. This is because the original version of the program was registered in the name of the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 986

The Importance of Media in the Classroom

The theory is developed from the perspective of a teacher and aims at the analysis of the classroom media employment as well as the accommodation of the reviewed sources to the school conditions.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 405

“IT Doesn’t Matter” by Nicholas Carr

And it is impossible to disagree with Nicholas Carr when he claims that IT experiences the phase of commoditization. For example, it is possible to adopt the proprietary technologies that would provoke the diversification of [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 835

Safety Culture in the Maritime Industry

The company's concerns over the potential damage or loss of the three vessels and the cargo they carried at the time are thus valid, which forms the basis for the analysis of the company's current [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3684

Thermistor and Its Applications

This paper examines the working mechanism and applications of Thermistors Thermistors are special kind of variable resistors whose resistance changes with changing temperature i.e.a change in thermal temperature results in changes in its resistance value.
  • Subjects: Engineering
  • Pages: 2
  • Words: 668

Ways to Stop Cell Phones Hacking

Although it is in the view of many that their phones cannot be hacked as they only protect their computers from hacking, mobile phone operators are more predisposed to being hacked since a mobile operator [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 662

System and Application Software Difference

Both system software and application software are programs for the computers, but system software includes the programs that are provided together with the installation of the operating system for the computer.
  • Subjects: Internet
  • Pages: 2
  • Words: 581

Welding Underwater – Engineering

On the other hand, wet welding uses a system that allows a welder to weld an area that is in a wet environment. The use of under-sea robots is an emerging approach in under-sea welding.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1098

Smart Home Network Design

Specifically, Smartphone, a desktop computer, cable, home theater, whole home audio, and phone intercom system will be considered for use in the button key fob and Smartphone based network. The use of Smartphone and proximity [...]
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1115

Computer Hardware: Past, Present, and Future

Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1123

Accidents and Ramp Damage – Aviation

In order to prevent substantial expenses described afore, it is undoubtedly worthwhile for airlines and aviation companies to invest in ground operations safety and train all the staff working in the ramp and gate areas.
  • Subjects: Aviation
  • Pages: 2
  • Words: 560

Online Research and Web Based Survey Methods

They are well-constructed surveys that take to account most of the requirements that credible research entails. These surveys are conducted over the internet and they involve samples of the exact population of interest.
  • Subjects: Internet
  • Pages: 4
  • Words: 1124

The Ideal HPC Programming Language

In the course of the study, a correspondence of the rewritten programming systems to the original models of computing was inspected.
  • Subjects: Programming
  • Pages: 3
  • Words: 834

How to Build a Computer?

Preparation and Materials In order to build a personal computer, it is necessary to choose the performance that you want by considering the aspects such as the desired processor speed, the memory, and storage capacity. [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1114

General Aviation Security Liabilities

Presently, the increase in the number of attacks on airports and airlines due to poor maintenance and negligence is a serious concern to a number of stakeholders.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2310

“The Most Human Human” by Brian Christian

In the introduction, the author outlines the genesis of his choice of the book's title by discussing the origin of the term, 'the most human.' Therefore, the introductory chapter gives the reader a strong base [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 843

Internet Censorship: Blocking and Filtering

It is the obligation of the government to protect the innocence of the children through internet censorship. In some nations, the government uses internet blocking and filtering as a method to hide information from the [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1097

An Argument Against Technological Advancement

Summaries Eggers's description of the book's title as The Circle is similar to that of the company. In addition, the familiarity of the author with modern technological advancement is convincing to the audience.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1428