Tech & Engineering Essay Examples and Topics. Page 9

4,726 samples

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

File Sharing and Its Pros and Cons

The presence of file sharing enables businessmen and consumers to be aware of new products in the market. The presence of file sharing enables businessmen and consumers to be aware of new products in the [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 2221

IBM SPSS Software Analysis

IBM SPSS is one of the statistical packages used for analyzing and interpreting data. Validity has two distinct sections namely the research section and the degree to which a test measures some data.
  • Subjects: Programming
  • Pages: 2
  • Words: 568

System Engineering Failure Prevention in Defense Industry

The call into question the reliability of the procurement process in determining the functional accuracy of the military systems in fulfilling their objectives as well as the veracity of the technical specifications and performance arises.
  • Subjects: Accidents & Protection
  • Pages: 18
  • Words: 5205

Privacy Challenges in the Modern Age

Although proponents of these devices argue that their usage helps to acquire the necessary information regarding the customer use of their products and consequently enable them to improve on them, the use of RFIDS just [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 829

What Is a Flash Drive

This is not found in the other mentioned drives and hence when storing information it would be easy to know the size of free space left.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 765

Computers’ Critical Role in Modern Life

The manner in which the military operates in the modern world has completely been influenced and revolutionized by the use of computers.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2909

Net Neutrality: Freedom of Internet Access

In the principle of Net neutrality, every entity is entitled access and interaction with other internet users at the same cost of access.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1239

Fire Safety Strategy for Multi-Storey Buildings

In serious fire outbreaks, the consequences can be very bad and often result in, business closure, the destruction of property worth lots of money, loss of livelihood, displacement, and damage of property, causality in human [...]
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2571

Analysis and Interpretation of Text and Image

Text analysis in this discourse will focus on critically examining and analyzing the language structure in the document to identify the communication function of the discourse.
  • Subjects: Applications
  • Pages: 12
  • Words: 3352

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Technology and Lifestyle in the United States

The people of America has made well use of it and extracted the cream of these blessings to produce energy and speedy transport; all of which led to the building up of capital that has [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1449

The Telephone and Industrialization

The problem with the telegraph was that it needed operators to carry out the interpretation of the messages that were coded and passed over a wire.
  • Subjects: Phones
  • Pages: 4
  • Words: 1095

Ethics of New Technologies

On the other hand, the right and duties act is of the opinion that ethical acts are the ones which acknowledges other individuals rights and duties imposed by such rights.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 826

Why Internet Filters Should Be Used?

Internet filters give parents a sense of control over their children in the only area of their lives where parents cannot get in, that is the internet.
  • Subjects: Internet
  • Pages: 2
  • Words: 723

Evaluation of Macbook Laptop

The level can be as high as 160 GB hard disk which is double the original in the case of the black Mac Book.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 644

Nintendo Gameboy: Technological Advancement

Nintendo has made lots of variation in the original game boy this includes the Game boy pocket which is 30% smaller than the original game boy with equal size screen, the Game boy color it [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1243

Fire Prevention Measures and Technology

Most preferable, the alarm system should be installed in every floor of the building to alert the fire fighters incase of an emergency of fire In his article about fire prevention measures, Gary Taylor says, [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1320

Digital Storytelling Projects

As the author of the site noted, the project is the online meeting place for community digital storytelling advocates and facilitators.
  • Subjects: Internet
  • Pages: 3
  • Words: 815

Information Warfare & Neutrality in Modern Society

The large layer of literature discusses the problem of information warfare and its impact on the citizens. In conventional combat, information on the performance of systems is only the beginning of a strategy to counter [...]
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3295

Full Disclosure of the Vulnerability

This report discusses the causes of security vulnerabilities in the products, risks involved in the disclosure of a vulnerability, and the position of white, grey, and black hat hackers on the discovery and disclosure of [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2630

Agile Methodology for Software

The Agile methodology is complete in more than a few phases, the psychoanalysis section, the proposed stage, the completion phase, and the testing stage.
  • Subjects: Programming
  • Pages: 5
  • Words: 1387

Oxford English Dictionary and the Wordnet Analysis

A number of other boxes are also provided and these boxes help to refine the search. So it is possible to set the search for a sequence such as first Operation A and then operation [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 2147

The Cyberspace Behaviour of People

With it, the internet connection helped the organization know their employees more, helping them assess the working efficiency of each of the employees.
  • Subjects: Internet
  • Pages: 5
  • Words: 1297

The Internet: Introduction to Networking

With the increase in the availability of good and affordable bandwidth, the Internet has become a valuable tool for many people to create a network of friends that is spread across the globe and across [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1498

Process of Cyclic Steam Injection

The injection phase commences with injecting steam into a well for a specified duration in order to heat the oil within the surrounding reservoirs with the intention of recovering at least 20% of the Original [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1171

Safety Management Systems in Aviation

Passengers booking non-refundable and unchangeable flight tickets do not have any incentive to notify the airline of their no-show, and the total weight of passengers are difficult to estimate before the date of check-in.
  • Subjects: Aviation
  • Pages: 2
  • Words: 1074

Disruptive Technology and Its Implications

As a result, their extensive use of smartphones denies them the opportunity of understanding the way they relate with these groups of people.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 580

Evie.ai: Artificial Intelligence and Future Workforce

That is why it is crucial to analyze some trends in artificial intelligence that are being adopted by many businesses for better functioning, in particular, the implementation of Evie.ai, its functions, and the consequences.
  • Subjects: AI
  • Pages: 4
  • Words: 1215

LED Therapy in the Esthetics Industry

Such procedures have shown to stimulate multiple repair functions within the skin depending on the color of the LED light used.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 551

Why Is Samsung Considered a Design Inspiration?

The reimagined camera is one of the key features of the Samsung smartphone that reflects the inspirational design. Samsung employs the horizontal integration strategy in the production of its smartphones and other products.
  • Subjects: Phones
  • Pages: 5
  • Words: 1444

Information Security Concepts and Policies

In addition, she argues that there has been an increase in the complexity of computers attached to these large networks; therefore, this has become a serious challenge because it is not easy to analyze, secure, [...]
  • Subjects: Computer Security
  • Pages: 20
  • Words: 336

Supercomputer Design, Hardware and Software

The advantage of shared memory is that it implies the existence of a unified space from which all the necessary data can be retrieved; however, different processors usually need access to certain kinds of data [...]
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1960

Cyber Theft and Internet Security Measures

This research paper will address the usage of the internet and how internet theft has continued to thrive as technology advances and how users of the internet can be made safer.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 595

Online Collaborative Learning

Through the approach, students were able to work in groups in coming up with solutions to the assigned tasks. With respect to my teaching experience, I would recommend that computer-assisted collaborative tools should be adopted [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

Cybercrime and Digital Evidence

When a user searches for a music file by title or a musician's name, the user's request is sent out to all computers in the network, and a response list is generated to the user [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1234

ATN Corporation’s Cloud Computing Mechanisms

The second mechanism expected to be a part of the described solution is the virtual server. Finally, the third mechanism likely to be leveraged as a part of the described solution is a cloud usage [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 828

Ship Unloaders and Belt-and-Bucket Elevators

These systems have an automatic sink-in device found in the HL-SKT as a component of the marine leg to ensure the best position when the unloader starts operations and, therefore, automatic unloading can be achieved [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 1531

Engineers Australia Stage 1 Competencies

I have been able to exhibit the above elements in a number of ways. As a leader, I have been able to understand the engineering students' challenges during placements.
  • Subjects: Engineering
  • Pages: 3
  • Words: 879

Technology Effect on Early Learning

The exposure to digital experiences is slowly rewiring and reshaping the cognitive process of the modern child. Studies and research have found digital exposure to influence the language and cognitive development of a child.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 319

The Detailed Network Design and Layout Implementation

The internal network is connected to the external network with a T-1 link from Verizon using a dynamic NAT router installed and tested and overloaded with PAT to support a higher number of clients with [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 827

Communities and Social Change

Almost every country in the world has contributed to the invention of new technologies and ideas that put them on the same level as the rest of the world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1143

Electrical and Electronics Engineering Career

The main aim of the report is to enable the career consultants who will be acting as career advisors to be able to understand my career field and in the process, they will be able [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 621

Software Engineering Career Information

Software Engineering is a field in engineering that requires the practitioner to apply the principles of engineering in the design and development of software products.
  • Subjects: Engineering
  • Pages: 2
  • Words: 549

Computer Technology in the Student Registration Process

The registration process became more efficient due to the reduction in the number of registration staff because they are only tasked with the transfer of the students' information to their respective departments.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 591

Pressure Drop and Full Models in Filtration Technology

Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2599

Multimedia Technology for Teaching and Learning

Studies have shown that the use of multimedia is a technological phenomenon because its applications involve the use of technology. The implication is that multimedia has a theoretical basis for both teaching and learning.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 567

Office Automation Software in the School

Teachers of course play the role of providing the content to be used in the application and then it becomes the duty of software developers to come up with the complete software that suits the [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 548

Intelligent Input/Output Technologies

As it is mentioned above, the concept of I2O hardware architecture was developed by the Intel Corporation. This section is intended to compare the most significant advantages and disadvantages of I2O techniques.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 537

Laser Communication Links in Space

Inter-satellite laser communication is also a great prospect to explore, as there are no obstacles in space that could impede or reduce the effectiveness of a laser beam.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1922

Educational Policy Changes: Technology in Education

The goal of the policy change is to ensure that schools can adequately apply innovative technology, including devices and applications to engage students in the learning process and provide them with skills necessary to use [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 5123

Augmented Reality in Document Detection

It is these processes that have led to the creation of augmented reality. Hartl et al.also demonstrated the usefulness of augmented reality technology in verifying holograms by saying that the technology's use of multiple reference [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1651

Technology in the English Learning Classroom: Mixed-Method Study

The success of research usually depends on several factors, including the quality of sources, the abilities of researchers, and the established timeframes. The next step in the development of a data collection plan is a [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1162

Interactive Whiteboards in Saudi Arabian Schools

A comprehensive understanding of the benefits of adopting technology and the barriers to its maximal integration and implementation in learning institutions will create a better platform from which to review the existing literature and explore [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 4862

Information Visualization: Task by Data Type Taxonomy

In the Department of Tourism and Commerce Marketing, the way the TTT may be implemented at the individual, group, and organizational levels can be substantially defined by both the types of data used at those [...]
  • Subjects: Data
  • Pages: 10
  • Words: 2734

Human Factor and Motivation in Aviation Security

For this reason, the human factor in aviation security becomes a crucial issue that should be investigated in order to improve this aspect and minimize the probability of error.
  • Subjects: Aviation
  • Pages: 14
  • Words: 3907

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1445

Regulatory Requirements for Flight Crew: US and UAE

Considering the volume of air traffic, airports, and operators in the US, the FAA has extensive rules and regulations. To a large extent, GCAA has followed the rules and regulations of the FAA on many [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2314

Television, Its Invention and Technical Evolution

The history of television involves the contribution of several engineers from different parts of the world. This paper seeks to explore the technical evolution of the television from its invention to the current developments.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1099

Artificial Intelligence and Humans Co-Existence

Some strategies to address these challenges exist; however, the strict maintenance of key areas under human control is the only valid solution to ensure people's safety.
  • Subjects: AI
  • Pages: 2
  • Words: 658

The Impact of Technological Change on Business

While it is obvious that effective and diverse means of communication have been at the disposal of entrepreneurs for more than a century now, it is undeniable that the development of the informational technology, especially [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1735

3D Printing: Pros and Cons

The authors compare the quick advancement and loss in the price of 3D printers with the rise of the personal computers.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 928

Cutting Tools, Their Failure, Use and Materials

Experts strive to develop materials that can work under high temperatures and forces while minimizing the proneness to wear of a cutting tool during machining operations.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1409

Saudi Aramco Company’s Engineering Innovation and Ethics

The organization has been operating in the environment of the global market since 1933 and has gained a reputation of the company that promotes technological innovation as the foundational tool for attaining high-quality rates.
  • Subjects: Engineering
  • Pages: 11
  • Words: 3920

Airlines’ Practical Guidelines in Procurement Process

This paper examines how airlines can maximize the usefulness of practical guidelines that can be used to implement a performance-based contracting approach in their procurement process and the value the aviation industry will acquire in [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1981

Heinrich’s Domino Safety Theory

In other cases, some employers tend to ignore the safety needs of their employees by providing unsafe working conditions, which eventually contribute to accidents within the workplace.
  • Subjects: Accidents & Protection
  • Pages: 1
  • Words: 298

Open Source Security Testing Methodology

The benefits of the Penetration Testing Framework 0. The Open Source Security Testing Methodology Manual and Penetration Testing Framework 0.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 576

Information Security: Evaluation and Recommendation

Generally, when a case involving loss of data through leakage or any other way, security firms entrusted with the responsibility of handling confidential information of clients stand to face serious challenges directly associated with loss [...]
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1455

Security and Logical Functions of Microsoft Excel

This consists of the cell which can be a text or value which identifies the information in the cell. IS" can be described as another function of the excel program that describes the nine functions [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 599

Delta Airlines Flight 191 and Aviation Safety

Later on, the shower was getting stronger, and the captain of the plane noticed lightning in the cloud before him. At that moment, the only thing the pilots could do to prevent a crash was [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 897

Information Technology, Its Role, Pros and Cons

The work also gives ground for discussions related to the nature of technologies and their implementation in the majority of modern activities to increase their efficiency.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 554

Challenger Disaster and Risk Management Failure

As the notorious example shows, the stage involving detailed and scrupulous tests of the project design, as well as the assessments of any possible flaws with their further elimination from the product, are to be [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 820

Passenger Waiting Time Quality in Airports

Airport managers have to measure the level of performance in airport terminals in relation to the expectations of customers and the possible quality of services offered.
  • Subjects: Aviation
  • Pages: 3
  • Words: 943

Diffusion of Innovations Theory in Education

When it comes to discussing the origins of the theory and the factors that have predetermined its appearance, or, at the very least, played an essential part in the process of theory creation, one must [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1250

Learning Objectives Implementation

With the advent of the internet, online courses have sprouted resulting in the debate on the two options, traditional class setting, and the online class.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 1013

The Carnival Triumph Cruise Ship’s Crisis Management

This paper is a critical analysis of the crisis communication surrounding the marooning of the Carnival Triumph Cruise ship. The contribution of the Carnival's PR in addressing the Triumph crisis is subject to analysis to [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2838

Airport Security in United Arab Emirates

The process of ensuring airport security is made possible by the determination of the items accepted during the journey and the items prohibited during the journey.
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2491

The Wright Brothers’ First Flight

The given paper revolves around one of the greatest events in the history of humanity which predetermined the further development of science and society.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1131

Computer Reservations System in Hotel

That is why, it is obvious that blistering development of systems of this sort became possible due to the evolution of means of communication and discoveries in the field of digital technologies.
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1316

Safety Culture in the Maritime Industry

The company's concerns over the potential damage or loss of the three vessels and the cargo they carried at the time are thus valid, which forms the basis for the analysis of the company's current [...]
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 3684

The Impact of Nanorobots on the Society

With this the researchers envisage the use of resbots that would be deployed in the oil blocks just like the armies in order to gather important information for the explorers.
  • Subjects: Robotics
  • Pages: 8
  • Words: 2128

Collection of Environmental Data: System Designing

The scope of the study will be limited to data collection by the government agencies and members of the public. Engaging the public in collection of environmental data will help the government to identify some [...]
  • Subjects: Data
  • Pages: 22
  • Words: 5320

Pumps Concepts and History

The imbibing and suppuration nozzles in a single stage horizontal split centrifugal are integrally built in the lower half of the chamber and on the same horizontal centreline.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1344

US and UAE Aviation Regulations Comparison

The aviation regulations in the UAE and the US require aircraft companies to conform to standards in operations to significantly reduce accidents.
  • Subjects: Aviation
  • Pages: 3
  • Words: 919

Bracelet.3d: Design, Development, Application

Even though the device can replace a phone, iPad, and TV, it is easy to use and carry. 3d, as it has a holographic display that is bigger than a screen of a smartphone and [...]
  • Subjects: Phones
  • Pages: 3
  • Words: 875

Supervisory Control and Data Acquisition System

Sensors and control relays transmit data to RTUs and PLCs deployed in specific locations of the managed system, and this is where data acquisition occurs. RTUs and PLCs send the acquired data to the master [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1137

Cybersecurity: Stuxnet Virus

Cyber security is one of the major concerns of governments in the contemporary world. It is important to note that in case of Stuxnet the three aspects prove to be vulnerable.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1126

Ways to Stop Cell Phones Hacking

Although it is in the view of many that their phones cannot be hacked as they only protect their computers from hacking, mobile phone operators are more predisposed to being hacked since a mobile operator [...]
  • Subjects: Phones
  • Pages: 2
  • Words: 662

Technology Use among Children: Ethical Issues

The use of technology has triggered innovations and enhanced the skills of children and adults. Some of the contents in the internet are very dangerous to the children.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1378

How Technology Can Affect and Improve Policing?

It is critical to understand how technologies can influence policing because they can change the structure of police agencies, their functions, and goals.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 863

How the Internet is Changing Your Brain?

One of the most evident things that can be observed nowadays is that the Internet has a considerable impact on people, the development of relations, the ways of how information is exchanged, etc.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1128

Components and Aspects of Whistleblowing in Engineering

The purpose of this paper is to explore components of whistleblowing in engineering through case studies of notable cases in various fields and professions, including cases of Michael DeKort, Franz Gayl, and Diane Hartley.
  • Subjects: Engineering
  • Pages: 15
  • Words: 4292

Aircraft Instrumentation and Systems

The report will explore the instrumentation used in aircraft and flight instruments. Through these discussions, hopefully, we will be able to understand the significance of the instruments and systems in the aircraft and the entire [...]
  • 4.5
  • Subjects: Aviation
  • Pages: 12
  • Words: 3310

Smartphones and Information Technology Systems Management

Smartphones such as BlackBerry have applications that increase the accessibility of information, which is critical in enhancing the organisations' effectiveness particularly in the management of tasks and projects.
  • Subjects: Internet
  • Pages: 5
  • Words: 1447