Tech & Engineering Essay Examples and Topics. Page 9

4,370 samples

What Are the Causes of the Increased Lack of Internet Privacy?

Although every individual has the right to accuse the government and internet service providing companies over their failure to protect their customers' privacy, individuals should recognize, they have a crucial duty to play as far [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 712

Relational Database Systems

This is a business report, personally addressed to the manager of the Easy Drive School of Motoring explaining why and how a relational database system will address the problems of the organization.
  • Subjects: Data
  • Pages: 6
  • Words: 1702

UNION-Based SQL Injection and Its Prevention

0x3a resolves to a ":", the concat function combines multiple string elements into one, and select database returns the current database's name.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 316

Aspects of the Home Phone

The main factor contributing to a similar decline in the home phone is the alternative of the mobile phone. The landline is an item that is not usually powered by electric circuits in the home [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 261

Transformative Learning Theory and Spirituality

In the 2013 article, "Transformative Learning Theory and Spirituality: A Whole-Person Approach," Piercy indicates that the learning process of adults can be understood by addressing the biblical understanding and the transformative approach to man's nature.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 323

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

Fixing a Pothole in the Road: Costs Calculation

Our team proposes to fix the pothole by using high-quality asphalt to fill and compact it. We estimate the project will take approximately 4 hours to complete, resulting in a total labor cost of $240.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 641

Ways that Robotics Can Transform Our Daily Lives

Robots will help to increase the labor force in the country in the future. Robots will be used to increase the productivity of human labor within the government sector and help in speeding up the [...]
  • Subjects: Robotics
  • Pages: 12
  • Words: 3265

Artificial Intelligence for Recruitment and Selection

As a result, the hiring process has changed considerably, and it is crucial to comprehend how social media and technology affect it. In conclusion, technology and social networking have had a big impact on both [...]
  • Subjects: AI
  • Pages: 1
  • Words: 360

Technology Strategy for Business Success

In conclusion, while technology strategy can be a challenging and uncertain field, the key takeaways from the success stories of companies like Genentech, Amazon, Microsoft, Google, and Facebook show that it is possible to navigate [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 409

Recovery of Airbus A380 From Failure

The demise of the A380 can be linked to various issues, including a change in the market as well as reduced demand for the craft, that is regarded among the largest airplanes.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2316

The Challenges of Controlling Speech in Cyberspace

In the chapter, the author discusses the concept of utilitarianism as a possible solution to the challenges of adapting to new technologies and resistance from established interests.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 775

Information Technology in Microsoft’s Business as a Project Topic

The weaknesses are the lack of implementation of innovative technologies at the moment and the business's vulnerability to cyber-attacks. Opportunities for the company lie in the expansion of business through the acquisition of successful companies [...]
  • Subjects: Data
  • Pages: 1
  • Words: 398

Problems in the Aviation Industry

Although the trend of airplane crashes has been on a downward trend since the 1980s, and statistics estimate that the probability of dying in such a crash is 1 in 3. However, the lack of [...]
  • Subjects: Aviation
  • Pages: 1
  • Words: 482

The Aspects of the Artificial Intelligence

The goal of artificial intelligence, a subfield of computer science and engineering, is to build intelligent machines that can think and learn similarly to people.
  • Subjects: AI
  • Pages: 2
  • Words: 572

The British Library: Big Data Management

The British Library needs the use of big data to keep track of user searches. Thus, the company uses big data to manage resources and meet searchers' needs.
  • Subjects: Data
  • Pages: 1
  • Words: 307

The Future Career in Cybersecurity

During the interview, it is necessary to highlight the knowledge of working as a graph as a mathematical theory and the simple use of spanning trees in cybersecurity.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 436

Artificial Intelligence in Soil Health Monitoring

Therefore, the new value provided by AI technology is that it allows automation and algorithm-based predictions for more solid decision-making. AI in soil health monitoring is an unconventional application of the technology, albeit capable of [...]
  • Subjects: AI
  • Pages: 1
  • Words: 376

How to Build a Gaming Computer

The first step to creating a custom build for a PC is making a list of all the necessary components. This explanation of how to build a custom gaming computer demonstrates that the process is [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 604

Information Security Threats: Malware Detection Approaches

Information systems are frequently vulnerable to a variety of dangers, and these risks have the possibility of resulting in a variety of harmful effects, including serious financial losses. In conclusion, information systems are vulnerable to [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 660

Information System and Its Various Dimensions

Therefore, the information system is a collection of data, facts, or knowledge integrated in an intentional manner for the purpose of collecting, processing, and storing.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 612

The Harry Potter Phenomenon Analysis

Since these groups sowed the seeds of the Potter phenomenon, the connectors and, later, the mavens were crucial to the publication of the first novel, Harry Potter and the Philosopher's Stone.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1770

Artificial Intelligence and Machine Learning

There are both benefits and challenges to the use of AI and ML in the customer complaint resolution process. The ability of a company to provide a customer experience depends on that business's power to [...]
  • Subjects: AI
  • Pages: 2
  • Words: 707

Regularization Techniques in Machine Learning

In another example, when predicting the payback of a business product, the system can use indicators of the area's population and the presence of competitors in the district, ignoring the age or gender aspects of [...]
  • Subjects: AI
  • Pages: 2
  • Words: 478

Experiences of Beginner in Python Programming

Difficulty in working with Python for me is understanding what and how to include in the code. Thus, Python is in high demand in IT and, at the same time, is known as a programming [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 570

Means of Destruction & Atomic Bomb Use Politics

This information relates to the slide concerning atomic energy, which also advocates for the participation of the Manhattan Project's researchers and policy-makers in the decision to atomic bombing during World War II.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 529

Introduction to the Engineering Design Process

NASA's Best Engineering Design Process course demonstrates how presenting the audience with the idea of bringing a satellite to the Moon can lead to introducing deeper problems associated with the engineering side of the idea.
  • Subjects: Engineering
  • Pages: 1
  • Words: 323

Technological Impact on Circadian Rhythm Disruption

The deviation of circadian rhythm and thus, sleep from the physiological norm in children leads to a decrease in the amount of communication between brain neurons in the frontal and temporal lobes of the brain.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1697

The Grand Canyon University Library Databases

A significant factor in selecting sources for research papers is a rational evaluation of the database that hosts the material. To conclude, peer review is a significant factor in selecting appropriate sources, as it indicates [...]
  • Subjects: Data
  • Pages: 1
  • Words: 303

The Fighter Cockpit Automation Functions

The evolution of the pilot's position is linked to that of the cockpit aircraft as they go hand in hand. The information provided in the article is of great value; the author identifies the solutions [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1164

Identification of Identity Theft and Prevention Techniques

The globalization of the economy, the rapid development of financial markets and instruments traded on them, the complication of relations between economic entities and their business operations at the present stage create favorable conditions for [...]
  • Subjects: Cyber Security
  • Pages: 50
  • Words: 14865

Robotics and Related Social & Political Problems

The combination of engineering and computer science has aided people in developing the field of robotics. The social impact of robotics lies in the problems that robots are designed to solve.
  • Subjects: Robotics
  • Pages: 2
  • Words: 581

Entrepreneur Employing Mobile Enterprise Apps

The accounting functionality that is needed for a small business that was not discussed in the case is balance sheet automation to track assets and liabilities.
  • Subjects: Applications
  • Pages: 1
  • Words: 463

The Airworthiness of Aircraft Analysis

The maximum coefficient of braking friction of the landing gear to the ground for the runway must be corrected for the effectiveness of the anti-skid system on the runway.
  • Subjects: Aviation
  • Pages: 3
  • Words: 867

The Java and C++ Languages Comparison

On the other hand, C++ is more advanced programming that evolved from the C programming language to improve the designs available and allow for a high degree of memory in computer resources.
  • Subjects: Programming
  • Pages: 3
  • Words: 886

Technology in Nursing Education

Such students have the right to receive the same learning opportunities, which is why textbooks, in-person assistance, and in-print information provision are some of the measures that can be applied.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

Modern Communication Impacted by Technology

The purpose of this writing is to examine how communications have evolved as a result of technological advancement. The glorious thing about all of these choices is that people may select the one that best [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 317

Analysis of Software Integrity Strategies

The key advantages of such a solution are the independence and innovation of the product, to which unauthorized persons will not have access.
  • Subjects: Programming
  • Pages: 2
  • Words: 680

The Autopilot Systems: Examples of Devices

The Pixhawk 4 and MP21283X autopilots with different characteristics to redundancy are analyzed, as well as the NASA Swift UAV using off-the-shelf autopilot solutions.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 702

Remote Working: Impact of Technological Development

Remote working is a form of arrangement where the employee does not have to commute to the workplace. The number of telecommuters increased to 2,000 in 1983, and the figure continued to grow in the [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 919

Tech News on Samsung Galaxy S22 Ultra

In his recent review of the Samsung Galaxy S22 Ultra, Amadeo specifies that the device features several innovative solutions to minor issues, yet the general impression of the phone is that it represents continuity in [...]
  • Subjects: Phones
  • Pages: 1
  • Words: 286

Integrating Technology in Curriculum

Integrating technology into the education system refers to; the application of technological advancements to foster learning among the students in the classroom thus, promoting a good learning experience.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 890

Data Management and Cybersecurity

Namely, the principal standard of the HIPAA, as well as the concept of cybersecurity, have proven to factor into some of the key aspects of my professional and personal life.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 562

Ethics in Engineering: Goodrich A7D Brake Case

The optimal involvement of the relevant stakeholders in the engineering sector is an essential initiative cause of the profound articulation of the apt operative standards.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1078

End-to-End Encryption: Hash, Passwords, and Security

The rapid growth of the Internet, its availability, and the enormous opportunities it provides to the user have led to the emergence of entire industries in business, science, and education.
  • Subjects: Internet
  • Pages: 7
  • Words: 1942

Microsoft Power BI Software’s Features

Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 669

Software Piracy and Its Impact on Society

Two, the absence of warranties with the pirated software means they are exposed to increased security risks with the software containing viruses and associated malware that affect computers.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 283

Uber App-Based Technologies in Supply Chain

This paper will look at the pros and cons of web-based applications such as Uber freight, how the apps will continue to reduce the cycle time within the supply chain and how they will continue [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 587

Recursion Explained With the Mirror Analogy

Binary search through the integers or dictionary is conducted through the recursive binary search function that includes the array and the target information. Base case in recursion is a special case where the solution is [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 559

Failure of Airbus A380 Production

This paper looks at the review of the problems facing the airline industry as a whole, the methodology used in the research, findings on the failure of A380 production and the analysis.
  • Subjects: Aviation
  • Pages: 10
  • Words: 2846

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Common Security Models

In the Clark-Wilson model, users do not access the object directly, as an intermediary serves to ensure the integrity of the data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 614

Data Visualization: Aims and Effectiveness

The aim is to make the information clear and effective to the readers and viewers. According to Alnjar, data visualization improves the narrative form of information and data.
  • Subjects: Data
  • Pages: 2
  • Words: 576

The Cyber Kill Chain and Weaponization Stage

The paper provides an in-depth discussion of the software used by attackers during the weaponization step and the appropriate countermeasures for this activity.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 674

Avionics and the Future of Aircraft Systems

Avionics are the set of electronic types of equipment and systems designed to use in aviation. The first such device to be used on aircraft was the communication and navigation systems based on analog and [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 586

Sifers-Grayson Company’s Security Strategies

The best security recommendation for the facility is the use of a layered security interface. Sifers-Grayson will also require a Cisco framework to complement the routers and firewall for an intrusion detection and prevention system.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 969

White Hat and Black Hat Hacking

On the other hand, White Hats work with companies and help them identify weaknesses in their systems and fix relevant vulnerabilities to ensure that attackers cannot illegally gain access to data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 608

Aviation Industry Affected by COVID-19 Pandemic

As the weeks progressed, the truth of the epidemic became apparent, and traveling was prohibited in an attempt to halt the further spread of COVID-19. The changes in the aviation industry due to the coronavirus [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1339

Cryptographic Algorithms: The Use in Cyber Security

Cryptographic protection of a system depends on two factors, 1) the strength of the keys and effectiveness of associated protocols, and 2) protection of said keys via key management.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 638

JMeter and Locust Load Tests for Websites

Within this paper, a literature review of a number of articles will be utilized to determine the ways in which JMeter and Locust interact with load tests for small or medium-sized web client applications through [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1129

Analog and Digital Telecommunication Networks

Data conveyed from the sender to the recipient using analog signals is referred to as analog communication. Digitalization communication refers to the transmission of data between a producer and a recipient via digital signals.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 394

Should the Internet Be Regulated?

The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
  • Subjects: Internet
  • Pages: 2
  • Words: 661

The Aircraft Accidents and Incidents

The organizational culture of a workplace is powerful, and when new employees join the institution, they are trained to have the culture of the place, as is the case in NASA.
  • Subjects: Aviation
  • Pages: 11
  • Words: 3032

Artificial Intelligence in Cybersecurity

The use of AI is regulated by a large amount of documentation, which should take into account the current legislation in the country of use and ethical issues related to AI, many of which have [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 585

Social Media: Risks and Opportunities

National Institutes of Health is a medical website for organizing social interactions within the medical community. Meanwhile, the principal goal is to study public health to improve it.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 643

GG Freightways Mobile Marketing Application Project

The mobile marketing application intends to assist in tracking the whereabouts of the goods transported hence contributing to the timely delivery of the freight to the clients.
  • Subjects: Applications
  • Pages: 5
  • Words: 1379

How Smartphones Changed Society and the World

Introduction of the smartphone to mass public Driven by iPhone created by Apple and Steve Jobs in 2007 Revolutionized the world of communications and information exchange Smartphone went from being a tool to the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 430

Importance of Army Cybersecurity

This includes bringing awareness to the cybersecurity issue, involving more people to combat the problem of cyberattacks, and organizing the information based on specialty and tasks that must be completed.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1114

Guidelines for Evaluating Research Articles

The title is a topical heading that captures the focus of the research paper. It highlights the purpose of the paper, the key concepts discussed in the paper, or the outcomes of an experiment/study.
  • Subjects: Technology in Education
  • Pages: 7
  • Words: 2120

Microsoft Excel 2019 Experience

The program offers modern tools for creating simple and pivot tables, importing information, performing calculations using complex mathematical formulas, analyzing statistics, and visualizing it in graphs and charts.
  • Subjects: Applications
  • Pages: 1
  • Words: 279

Sifers-Grayson Company: The Cybersecurity Breach

Finally, the recommendations, as per the improvement of the incident response capability, are introduced to ensure the elimination of the identified drawbacks and the compliance of the engineering company with the security requirements presented by [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1380

Technological Innovation Effect on Urbanization

By the 20th century, as large-scale industrial production became effective, the idea of urbanization appeared, leading to the further growth of the world's leading cities. As such, the idea of urbanization is the cornerstone of [...]
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2475

The Impacts of Internet Telephony (VoIP)

Internet telephony has impacted many lives and has led to ethical, social, and political issues in the contemporary world. In a nutshell, internet telephony has impacted many lives in the ethical, social, and political facets [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 711

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

Submerged Arc Welding

But in the case of welding, the by-products of the welding process can be hazardous to the health of the workers.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2010

How Animation Can Teach Children History

The development of interest in the subject will be greatly enhanced if there is a close partnership between the animators and teachers in designing the desired syllabus with the acquaintance of the tools of animation.
  • Subjects: Technology in Education
  • Pages: 23
  • Words: 6441

Health and Environment: The Impact of Technology

This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
  • Subjects: Technology Effect
  • Pages: 20
  • Words: 5816

AI and Job Security Aspects

The biggest fear in the economy's digitalization is the loss of jobs, but this will only be in the short term and only if there is the uncontrolled use of artificial intelligence.
  • Subjects: AI
  • Pages: 4
  • Words: 1132

Interactive Tools: Types and Its Benefits

In this modern day, it is important to remain competitive. Information technology and interactive tools are some methods which one can improve the online consulting process.
  • Subjects: Applications
  • Pages: 12
  • Words: 1586

Analysis of The Veteran Affairs Data Breach

The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 589

Computer Network: Data Flow and Protocol Layering

The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

Power Source for Rovers

When choosing suitable types of power sources for a rover, it is necessary to define environmental conditions where it is expected to operate.
  • Subjects: Engineering
  • Pages: 5
  • Words: 679

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791

Digital Control Systems: Digital Signal Processing

The second use of the digital filters is the "signal restoration" which is needed when there is distortion of a signal due to any reason like poor equipment quality or mishandling of devices etc.in this [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1459

Recovering from Computer System Crashes

In the event of a crash, the first step is to identify the type of crash and then determine the best way to recover from the crash.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1442

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

Steganography in Current Digital Media

When the hair grew, the slave went to the recipient of the message who shaved the head to expose the hidden message. In these methods, the hidden information within files may be known to the [...]
  • Subjects: Computer Security
  • Pages: 13
  • Words: 3674

Aviation Industry: New Technologies

The reason behind this is due to the fact that the researcher believes that as a student attempting to attain a Bachelor of Science in Aeronautics with a Minor in Safety and Human Factors his [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1928

Hydraulic Pumps: Review

There are several types and a majority of them are adjustable in order to regulate the amount of pressure delivered by the pump few are not; depending on whether the pumps are hydrostatic or hydrodynamic.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1095

Wi-Fi Technology and Applications

This paper discusses the Wi-Fi application and the technology behind its operation and functionality. This is a set standard within the wireless domain and is based on IEEE802.
  • Subjects: Internet
  • Pages: 4
  • Words: 1343

Personal Protective Equipment for Firefighters

It is for the serious impact of the fire that the department of fire fighting was initiated within every country to respond to fire incidences.
  • Subjects: Accidents & Protection
  • Pages: 50
  • Words: 14095

Engineering and Technology Management

Engineering and technology management group is aimed at encouraging the coordination of engineering and technology to management technicalities which has divisions for national and international conference participation.
  • Subjects: Engineering
  • Pages: 3
  • Words: 875