Tech & Engineering Essay Examples and Topics. Page 9

4,409 samples

Evolution of Fire Protection Codes

With regards to the findings in this research paper, the following hypothesis seems relevant: despite the gradual improvements made to fire protection codes, noncompliance and the challenge of dynamic nature of fire disasters continue to [...]
  • Subjects: Accidents & Protection
  • Pages: 14
  • Words: 3864

The Popularity of Video Games and Their Benefits

Are the benefits of playing violent video games, on the one hand, and the benefits of playing pro-social video games, on the other, can be considered qualitatively different?
  • Subjects: Computer Science
  • Pages: 11
  • Words: 3122

Blackberry Smartphone Consumer Behavior

Description of Internal Variables Consumer Personality: the personality of the consumer especially that of the middle class has a significant influence on the purchase decisions. With the brand and the specific outlet in mind, a [...]
  • Subjects: Phones
  • Pages: 7
  • Words: 2249

The Environmental Responsibility of Engineers

Today, the problem of the environmental responsibility is actively discussed by the scientists and researchers in relation to the global environmental problems, and the most influential one of them is the climate changes, which are [...]
  • 3
  • Subjects: Engineering
  • Pages: 7
  • Words: 1902

Pilot’s mission in flying jet aircraft and spacecraft

The technical skills possessed by these pilots and their ability to fly sophisticated aircrafts both in space exploration missions and air combat has evolved since 1945 and undoubtedly continuous to play critical role in the [...]
  • Subjects: Aviation
  • Pages: 5
  • Words: 1514

Virtual Reality Technology

The third negative impact of virtual reality is that it causes human beings to start living in the world of fantasy.
  • 5
  • Subjects: Other Technology
  • Pages: 2
  • Words: 610

Smoke Alarm “Smart Smoke Detector”

Smart Smoke detectors will allow customers to evade the smoke detector and to reduce the annoyance of the alarm. This report examines extensively and pinpoints the expected process that Global Engineering will follow to achieve [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1092

Information Security of Information Technology

With the growth of information technology and its increased access, information security is a point of concern especially in regard to the transmission of the same.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2335

The Airbus Fly-By-Wire Control System

In fly-by-wire, the control of the aircraft is only achieved through the use of electrical signals. The fly-by-wire control systems have enabled automatic stability system to be included in the plane and act autonomously to [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1651

Globalization and Digitalization

The tools that are necessary in the technological exodus from the traditional mode to higher fashions have posed a challenge in the labor force in relation to the level of expertise.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 547

Technological Generations of Mobile Communications

Thus the use of this technology is dependent on the proximity to power supply. Thus, it is arguable to conclude that the development in the wireless communication cannot be optimum.
  • Subjects: Phones
  • Pages: 5
  • Words: 1333

Analysis of Sony PS3

As a gaming console the PS3 promised, and subsequently delivered, games which would literally astound gamers with the depth of the graphics and the greater degree of in-game features not present in the previous generation [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 592

System Administrators in Information Technology (IT)

As a technical IT officer you are the lowest level of the career and at this level you are in direct contact with the organizations computers and devices. There are a number of IT courses [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 893

The Internet Is a Powerful Force

In Nicholas Carr's book, What the internet is doing to our brains, he describes the impact the internet has brought to our capacity to concentrate and think deeply.
  • Subjects: Internet
  • Pages: 4
  • Words: 1142

How Business Sectors Benefit from Information Technology?

The industry is quite promising since in the past few years, more initiatives have been released to the market and in regards to that, future systems will be required to do more complex procedures requiring [...]
  • Subjects: Applications
  • Pages: 11
  • Words: 3003

Lockhart River Plane Crash

It is also clear that the radar squad did not continuously observe the position of the plane; furthermore, it was fathomed minutes later that the plane was absent Systems and Methods The cause of the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2761

Internal Combustion Engine

It is responsible for the transfer of power produced by the exploding gases in the combustion chamber, to the crankshaft through a connecting rod that is usually attached to it.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1868

Ethics in Computer Technology: Cybercrimes

The first one is the category of crimes that are executed using a computer as a weapon. The second type of crime is the one that uses a computer as an accessory to the crime.
  • 5
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1334

Creating a Strong Password

Users should create a password that contains secure relations to certain applications or tasks so that it will be easy to remember.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 605

Information Technology and Low-Cost Airlines

This is made possible by many factors but it can be said that the most significant component is the use of information technology specifically the utilization of the Intranet and Extranet networking system.
  • Subjects: Aviation
  • Pages: 6
  • Words: 1625

Application of RFID Technology

The silicon chip in the transporter tag contains object such as the exact place of location, the date of manufacture, the color of the product, the price, or any other relevant information.
  • Subjects: Applications
  • Pages: 5
  • Words: 1595

Impact of Modern Technology on Human Communication

However, this paper has also illustrated that there may be hindrances to communication which can arise from the abuse of modern technology in communication efforts by individual.
  • Subjects: Internet
  • Pages: 3
  • Words: 808

Solutions to Computer Viruses

Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 562

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

Low-Code No-Code Platforms’ Cybersecurity Risks

In conclusion, the cyber security risks of using low-code no-code platforms can be significant. While users find it easy to design software without much skill in programming languages, they should understand the security implications of [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 590

Digital Certificate Management

The paper focuses on the process of issuing and managing digital certificates, discussing the weaknesses and vulnerabilities of different methods and the issues with revoking certificates, and possible remedies.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1223

The Histogram Concept Definition and Examples

For example, through the creation of a histogram with the frequency of purchases and the class interval of age that shows the range of age groups in comparison with the number of purchases, marketers receive [...]
  • Subjects: Data
  • Pages: 2
  • Words: 596

Electrical Multimeters: Overview and Application

It is a crucial tool for the electrical and electronics industries because it enables electricians and techs to identify electrical issues, analyze circuitry, and test electrical parts [1].
  • Subjects: Other Technology
  • Pages: 2
  • Words: 589

Internet and Smartphone Effect

In this essay, I analyze the arguments advanced by experts in five different publications in order to investigate the consequences of internet and smartphone use on human behavior and relationships during the COVID-19 epidemic.
  • Subjects: Internet
  • Pages: 4
  • Words: 1076

Powerful Impacts of the Use of Gadgets and the Internet

Overall, researchers highlight both the advantages and disadvantages of smartphones and the Internet, but most tend to focus on the bright side of the situation, and I support their view.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 836

Principles of Fire Prevention and Safety: An Overview

The public's knowledge of fire safety, the evaluation of building plans for both new and existing structures, and the investigation of fires are further grounds for carrying out fire inspections and fire safety enforcement activities.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1152

Data Visualization Review and Analysis

The use of color coding makes the data easier to interpret, while the interactivity allows the user to explore different aspects of the data and draw conclusions.
  • Subjects: Data
  • Pages: 2
  • Words: 642

The Department of Homeland Security’s Cybersecurity Mission

Cybersecurity is evolving rapidly, and DHS's cybersecurity mission is equipped with models adapting to the ever-changing security and information dynamics. The DHS cybersecurity mission is designed with models that adapt to changing dynamics and landscapes.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 357

Aspects of the Fire Prevention and Safety

According to the 2019 International Building Code, materials and features in buildings need to be structurally fire-resistant to safeguard against the spread of fire and smoke.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 613

Artificial Intelligence in Soil Health Monitoring

Therefore, the new value provided by AI technology is that it allows automation and algorithm-based predictions for more solid decision-making. AI in soil health monitoring is an unconventional application of the technology, albeit capable of [...]
  • Subjects: AI
  • Pages: 1
  • Words: 376

Cloud-Based Attendance Software

In the context of data storage and retrieval, a cloud-based database is designed to operate in a public or hybrid cloud environment.
  • Subjects: Programming
  • Pages: 8
  • Words: 2242

Linked Lists as a Data Structure

The linked list begins with a HEAD, which designates the beginning or the location in memory of the first node. The pointer to the list's first node is found in the circular linked list's last [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 591

Importance of Big Data Analytics in Sourcing

Thus, big data analytics has had an extraordinary impact on strategic sourcing due to the opportunities, lack of barriers, and options that managers are able to access currently.
  • Subjects: Data
  • Pages: 1
  • Words: 393

Drawing 3D Objects With Use of Robotic Arm

The hot end of the printer melts the material and embeds it onto the surface onto the intended surface. The research also utilized the Arduino development board to interface the programs written and the physical [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2759

Technology Skills in Professional Writing

Ultimately, it is up to each writer to decide whether or not they feel that age is a factor in their ability to pursue a successful career in writing.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 701

The Solar Powered Flashlight and Its Advantages

Once fully charged, the solar powered flashlight will play an important role of ensuring one is able to navigate all the challenges that might arise at night.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 556

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

The Artificial Intelligence Use in Solar Panels

The use of solar PV panels as sources of renewable energy has been gaining traction in the recent decades. This implies that the output of energy in PV solar panels is often unstable.
  • Subjects: AI
  • Pages: 5
  • Words: 1430

Combining Programming Languages C++ and Python

C++ and Python are not the only languages that can be combined in this way. By combining this functionality with Python's data-processing functionality, one can adjust the grocery-tracking program to work with a graphical interface, [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 281

Ethical Issues in the Artificial Intelligence Field

This study will analyze ethical bias and accountability issues arising from freedom of expression, copyright, and right to privacy and use the ethical frameworks of utilitarianism and deontology to propose a policy for addressing the [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1458

The Place of Humanity in the Robotic Future

The developers are trying to implement the brain, the human mind, in a digital environment. Paying attention to mechanical machines, commonly called "robots", can be seen that they are created in the image and likeness [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 401

The Age of Artificial Intelligence (AI)

The film "In the Age of AI" exhibits the importance of AI in transforming society. According to the documentary, AI integration in the transport sector has made it easier and safer for people to move [...]
  • Subjects: AI
  • Pages: 3
  • Words: 875

Defining Data, Information, and Knowledge

Thus, information can be defined as data that develops in one's cognitive system with the help of context and human intention. Knowledge is the process of understanding and explaining the information that happens in the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 852

The Airworthiness of Aircraft Analysis

The maximum coefficient of braking friction of the landing gear to the ground for the runway must be corrected for the effectiveness of the anti-skid system on the runway.
  • Subjects: Aviation
  • Pages: 3
  • Words: 867

Google Docs as a Tool for Collaborative Writing

The significance of the problem: the inability to adapt teaching practices to the needs of ELLs is likely to result in a continuing learning gap for all current and future students.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 688

Technology in Nursing Education

Such students have the right to receive the same learning opportunities, which is why textbooks, in-person assistance, and in-print information provision are some of the measures that can be applied.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

Internet Sources: An Evidence-Based Internet Source

Due to the evolution of the media, as well as the appearance of the Internet in people's lives, it is safe to say that the problem of information hunger for the average person as a [...]
  • Subjects: Internet
  • Pages: 1
  • Words: 283

Advantages and Disadvantages of Remote Work

With the transition of employees of different companies to the remote principle of work, there was an optimization and increase in the efficiency of electronic communications.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 300

Principles of Semiconductors and Emitters Testing

The test is based on the notion that a bipolar transistor may be thought of as two back-to-back diodes, and by checking the diode between the base and the collector of transistors.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4525

The Role of Big Data in Marketing

The accumulation of Big Data is the result of the new marketing environment, which was created by the digital world we now live in for marketing firms.
  • Subjects: Data
  • Pages: 2
  • Words: 560

Internet of Things for Home: Benefits and Challenges

The IoT can be characterized as the unification of the virtual and real worlds with the help of many devices and sensors connected to the same network and providing interaction between machines and people.
  • Subjects: Internet
  • Pages: 10
  • Words: 2771

Amazon’s AI-Powered Home Robots

The objective of the present plan is to provide a comprehensive analysis and evaluation of the introduction of AI-powered home robots as Amazon's next disruptive customer product.
  • Subjects: Robotics
  • Pages: 11
  • Words: 3033

Artificial Intelligence in Marketing

Artificial intelligence in marketing is a method of using customer data and AI concepts, including machine learning, to predict the next step of the consumer and meet his needs, even those that the consumer has [...]
  • Subjects: AI
  • Pages: 2
  • Words: 621

Ethical Issues of the Information Age

Accuracy refers to the accountability for errors in information and the subsequent choice of the person to blame. Property deals with the question of ownership of information and the means of its transmission.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 298

Synthetic Fabrics as Technological Development

Fabrics such as polyester, nylon, neoprene, and spandex were invented in the 30-the 40s of the 20th century and are still actively used in the production of not only clothing but also other goods.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 562

Aluminum vs. Mild Steel Comparison Experiment

In addition, to yield strength, percentage of elongation, and ultimate strength, the tensile test experiment may be used to assess additional mechanical properties of the specimen.
  • Subjects: Engineering
  • Pages: 10
  • Words: 687

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Government Restriction on the Internet

The restriction by the government has been enforced to promote the limitation of the content display that is only necessary for the user.
  • Subjects: Internet
  • Pages: 6
  • Words: 1737

White Hat and Black Hat Hacking

On the other hand, White Hats work with companies and help them identify weaknesses in their systems and fix relevant vulnerabilities to ensure that attackers cannot illegally gain access to data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 608

Choosing a Server for a Company

A server is a computer that is used to share resources and manage processes across a network, and it frequently connects to the internet to assist remote users.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 288

The Cybersecurity Threat Landscape

The threats may come from different sources, and the criminals may focus on distinct vulnerabilities in the security of the system.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1367

Technological Development of Civilizations

The current stage in the development of human civilization is closely related to the use of technology. The fundamental thesis of his writings is that technology contributes to the development of human communities but that [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1214

Device Addiction: Consequences and Solutions

One of the essential traits of smartphone addiction is tolerance which is defined as "a gradual increase in the mobile phone use to obtain the same level of satisfaction".
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1204

Discord Server as Online Public Space

Interestingly, both types of relationships are natural to Discord because it has many functions, and there is possible to create many channels with the same people, so different parts of a project can be separated [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 324

Is the Internet Affecting People Negatively?

Opponents of the Internet tend to view and criticize it one-dimensionally as a source of mindless entertainment, whereas in reality, it is rich with potential uses that have their unique properties.
  • Subjects: Internet
  • Pages: 5
  • Words: 1306

“Artificial Intelligence and Its Role in Near Future”

The author's work is devoted to the role of artificial intelligence in human life: He writes about the development of AI, especially noting how computer technology has caused a renaissance of influence on processing data [...]
  • Subjects: AI
  • Pages: 4
  • Words: 1141

GG Freightways Mobile Marketing Application Project

The mobile marketing application intends to assist in tracking the whereabouts of the goods transported hence contributing to the timely delivery of the freight to the clients.
  • Subjects: Applications
  • Pages: 5
  • Words: 1379

Technoscience and Humanity in the Elysium Film

Moreover, the concepts of transhumanism and artificial intelligence are analyzed in the context of the corrupted social order to draw on the failure of humanism, ethical and moral decay, and prosperity of the wealthy.
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1993

Facial Recognition Technology Lab Report

The implantation of a chip in video cameras to identify the face of the shown participant is actively used for national security purposes of the state, in the agricultural sector, and in the front camera [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 588

Information Technology Code of Ethics & Responsibilities

According to the social contract theory, the government has the obligation of ensuring the security of individual and organizational information by instituting laws on the protection of their privacy.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 528

Database Systems & Open Sourcing

It is prudent to mention that although the open distribution offers the source cord of a product for access by the public.
  • Subjects: Data
  • Pages: 3
  • Words: 966

Identity Management for Systems in a DMZ

Connecting internal corporate services to the internet is a challenge because exposing these servers to external environments poses a massive risk in terms of security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 306

Boolean Search and How to Use It

The use of the created Boolean string yields 1726 results, which is a relatively large number of articles for manual selection of the most relevant sources.
  • Subjects: Programming
  • Pages: 6
  • Words: 449

Metadata: Organizing Cars Photos

In that regard, the present report takes the subject photos of cars and provides an investigation of suitable methods for metadata organization of such collection.
  • Subjects: Data
  • Pages: 14
  • Words: 2634

Positive Influence of AI on Business

The majority of use cases are related to business and manufacturing, making it much easier for organizations to make sure that their improvements are beneficial to business [1].
  • Subjects: AI
  • Pages: 1
  • Words: 362

Establishing a SOCC: The Best Practices to Follow

The role of the Security Operation Center is to prevent, detect, and respond to cybersecurity threats. The first practice that should be implemented at Sifers-Grayson is the establishment of a system for data extraction and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

Using Jing in Teaching

Jing is a free, screen casting and image capturing tool (TechSmith, 2013). It also grants marking up uses and wide sharing probabilities within a short time.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 210

The Importance of Trust in AI Adoption

Hengstler et al.suggest that the best approach to take in enhancing trust in the use of AI is viewing the relationship between the company and the technology from a human social interaction perspective.
  • Subjects: AI
  • Pages: 5
  • Words: 1456

Toyota Land Cruiser GXR: Model Description

The region and the use of the car will guide the owner on the required level of protection. The ballistic level of protection depends on the owner of the vehicle's requirements.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1118

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 50
  • Words: 14365

Tabletop Centrifuge Manual

The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 561

The Fourth Industrial Revolution

The First Industrial Revolution transformed the lives of people from the handicraft and agricultural economy to the one that was dominated by machines and industries.
  • Subjects: AI
  • Pages: 12
  • Words: 3362