Tech & Engineering Essay Examples and Topics. Page 9

4,317 samples

Facial Recognition Technology Lab Report

The implantation of a chip in video cameras to identify the face of the shown participant is actively used for national security purposes of the state, in the agricultural sector, and in the front camera [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 588

Drone Technology and Its Role in Logistics

Currently, the logistics industry is profitable and attractive to many companies globally due to the use of drone technology in improving service delivery to customers.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2219

M-PESA: Critical Success Factors

Generally, consumers preferred mobile payments on paying for services and transfer of money wherein most of them enjoy the convenience of the technology and this was the initial value point considered by the consumers. The [...]
  • Subjects: Phones
  • Pages: 6
  • Words: 1058

Information Technology Code of Ethics & Responsibilities

According to the social contract theory, the government has the obligation of ensuring the security of individual and organizational information by instituting laws on the protection of their privacy.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 528

The Delta Airlines Flight 191 Crash

When the pilot successfully flies through to the other end of the microburst, the direction of the wind changes and becomes a tailwind because it is now behind the plane.
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2849

Microsoft Excel 2019 Experience

The program offers modern tools for creating simple and pivot tables, importing information, performing calculations using complex mathematical formulas, analyzing statistics, and visualizing it in graphs and charts.
  • Subjects: Applications
  • Pages: 1
  • Words: 279

Layering and Encapsulation Security Design

The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures. Thus, it is an example of a wrong solution to the world.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 720

Boolean Search and How to Use It

The use of the created Boolean string yields 1726 results, which is a relatively large number of articles for manual selection of the most relevant sources.
  • Subjects: Programming
  • Pages: 6
  • Words: 449

Airport Operations and Cargo Transportation

Considering the significant number of employees in an airport, and the importance of areas restricted for security reasons, staff identification is a crucial part of an airport's landside security.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Automated Catering Management System

It is a key part of future improvement as this information can be stored in the system and processed to promote positive change.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1104

Effectiveness of Integrating ICT in Schools

Most of the learning activities were undertaken in a classroom in front of the students, and assessment processes were conducted in class with paper and pen assessments.
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2908

Digital Self-Harm: Causes and Interventions

Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2258

How Animation Can Teach Children History

The development of interest in the subject will be greatly enhanced if there is a close partnership between the animators and teachers in designing the desired syllabus with the acquaintance of the tools of animation.
  • Subjects: Technology in Education
  • Pages: 23
  • Words: 6441

Multicast Routing and Its Protocols

A DVMRP router is a source-based protocol. The algorithm buil.ds source-rooted trees to optimise the transmission path through a network.
  • Subjects: Internet
  • Pages: 4
  • Words: 1285

Health and Environment: The Impact of Technology

This is a foundation of the healthcare sector that has been offering support to the integration and operation of variety of health services applications and thus contributing to the betterment of the healthcare sector.
  • Subjects: Technology Effect
  • Pages: 20
  • Words: 5816

Interactive Tools: Types and Its Benefits

In this modern day, it is important to remain competitive. Information technology and interactive tools are some methods which one can improve the online consulting process.
  • Subjects: Applications
  • Pages: 12
  • Words: 1586

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 974

Proxy Fights: Definition, Factors and Implications

In a way, the phenomenon of a proxy fight can be viewed as the tool for reinforcing the strengths of the organization by creating a very strong and well-coordinated team of shareholders, who are willing [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 664

Role of Information Technology in the Business Sector

In this way, the author concludes that IT is powerful enough to affect the successfulness of business and its competitiveness. It is also vital to ensure that IT is aligned with the overall business goals [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 598

The Design Characteristics of an Airplane

Control defines the ability of an airplane to respond to the controlling actions of a pilot and the ability to produce the desired displacement of altitude in flight.
  • Subjects: Aviation
  • Pages: 2
  • Words: 540

Interoperability of Web Services

Interoperability is the felicity of a software interface working with diverse and varied software systems swiftly and at ease for providing special finesse and rhythm to web services' network and its operations.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2410

Process Virtualization Theory Overview

Therefore, the author found it appropriate to address the theoretical underpinning of IT in virtualization processes to account for the gap in the field.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1420

Method of Construction of Hydro Schemes

In the first section, the construction techniques used in the construction of the dams and their hydropower stations are given in detail.
  • 4
  • Subjects: Engineering
  • Pages: 18
  • Words: 4900

Wi-Fi and LAN Technologies: Data Communication Lab

The units were TCP/IP LAN technology, advanced LAN technology, rack server module, wireless LAN technology, copper tool kit, protocol analyser, and network analyser. The notes indicated how the units were configured in real LAN networks.
  • Subjects: Data
  • Pages: 4
  • Words: 1113

Aviation Industry: New Technologies

The reason behind this is due to the fact that the researcher believes that as a student attempting to attain a Bachelor of Science in Aeronautics with a Minor in Safety and Human Factors his [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1928

Are Word Processing Programs Making Students Lazy?

Besides, easy access, availability, and strong support in learning institutions have contributed to the widespread use of word processing programs among students. However, the capability of word processing programs in correcting grammatical and spelling mistakes [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 884

Network Design for Business

The physical and the logical layout structure of the network have to match the design and the business needs in that particular context.
  • Subjects: Internet
  • Pages: 4
  • Words: 1083

Assessment of Firewall Security

In general given that a firewall is aimed at providing security to the system and user data it is important that the software is capable of preventing attacks.
  • Subjects: Computer Security
  • Pages: 9
  • Words: 2463

Computer Forensics: Data Acquisition

Data acquisition is a branch of computer forensics concerned with the retrieval of data originally located on a suspect medium such as a hard drive.
  • Subjects: Data
  • Pages: 3
  • Words: 862

Can Manufacturing Material and Process

However, the period of technological advancements that started after the Second World War saw a breakthrough in the extraction of aluminum and easy smelting of aluminum.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2015

Growing Use of 3D Technology in Theatres and at Home

One of the major beneficiaries of technological advances that have been made by man over the cause of the last century has been the entertainment industry which as grown exponentially through the years.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4446

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Subjects: Computer Science
  • Pages: 11
  • Words: 2967

Mobile and PDA Technologies Use in Education

It is a fact that things have become easy with the use of technology such as the Internet or the Worldwide Web and other Information Technology features, for example, software that make it easy for [...]
  • Subjects: Technology in Education
  • Pages: 11
  • Words: 2970

Information Security and Privacy

At the dawn of the new technology and especially in this information age, protecting the same information is very crucial to it.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2546

Open Search Standard in Windows

A standard definition for OpenSearch as given by its website, opensearch.org, says that "OpenSearch is a collection of simple formats for the sharing of search results".
  • Subjects: Data
  • Pages: 6
  • Words: 1432

Computer Problems

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1056

The Importance of Coding Analysis

In the survey conducted by the World Forum, about 91% of the employers involved in the study revealed the need for new staff with relevant technical proficiencies, and 51% reported the regular hiring of freelancers [...]
  • Subjects: Data
  • Pages: 4
  • Words: 1111

How Has Technology Affected Your Life?

In this essay, I will provide examples proving the positive and negative influence of technology. I believe that filtering content and controlling the time spent on social networks will maximize the positive influence of technology.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 398

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

Integrated Computation and Communication

Industrial edge computing, which requires more time, can optimize data, computation, and storage resources through smart gateways and local clouds. As a supplement, industrial edge computing can ensure interoperability, self-optimization, and reduction of industrial clouds' [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 265

Cyberbullying and the First Amendment

Under the geographical approach, the defendant can argue that since the event in question occurs online and outside of school property, it is covered by the First Amendment and the school has "no authority to [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 593

History of Radio and Guglielmo Marconi

Marconi demonstrated the usability of the radio for military and naval purposes and launched the company to develop and distribute radio communication services and equipment.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 336

Importance Data Science in Business

Veracity refers to the degree of accuracy and precision in the analysis and interpretation of results, which is critical to decision-making and business development.
  • Subjects: Data
  • Pages: 5
  • Words: 1434

Performance Gap at eBay

Gathering large quantities of data is essential in maximizing the performance of eBay. The collection of large amounts of data makes it more challenging to analyze and make meaning out of it.
  • Subjects: Data
  • Pages: 4
  • Words: 1142

Cybersecurity and Social Networks

Recently, there have been many trends the security of information and communication technologies, in particular, due to the expansion of the reach of social media which increase the size of social network, which has taken [...]
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 2895

Information Technology in Operations Management

In spite of the difficulty to automate driving in roads with heavy traffic as correctly observed by Levy and Murnane, the challenge of building a computer that can substitute for human perception and pattern matching [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 823

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Risk and Trust – Internet Relationships

Politics has hampered efforts to spread the knowledge of the risk society. It is noted that scientists have also failed to come up with a rational solution to the risks of modernity.
  • Subjects: Internet
  • Pages: 8
  • Words: 2217

Importance of Help Desk

As the word indicates, help desk is for helping the public for the smooth running of their activities. I sent an e-mail to the helpdesk.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 706

Evaluation of Macbook Laptop

The level can be as high as 160 GB hard disk which is double the original in the case of the black Mac Book.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 644

Multimedia Navigation and Usability

The user-centered design principle is to involve the end-users in the design decision process of a particular product. The use of words or pictures in relating a story is said to be infographics.
  • Subjects: Programming
  • Pages: 2
  • Words: 596

Self Service & Bagging Technology

The EFTPOS machine makes contacts with the store's bank to inform them of the transaction and also to the customer's bank to debit the account.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 955

Contemporary Communication: Making Sense of New Media

Lister writes that communication via the Internet was a cultural achievement of the time and that it let the huge investments have a place in the world web by owing to a global interest of [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 873

Boot Process of a CISCO Router and Computer

An understanding of the processes that would help in setting up the configuration of a router and its various elements can lead to relating the booting process of the router to that of any other [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 581

Relevance of Technology in Schools

But this rapid advancement in technology has created problems in understanding and adjusting for the laypersons in the society. The point that should be focused on is to use this available technology effectively so that [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 852

Warehouse Safety and Occupational Health

Materials/goods should be well placed on the forks and lifted correctly to avoid slipping and falling on people. Forklift should be driven slowly and both the fork and the loads should be kept low while [...]
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1174

Computer Security: Bell-Lapadula & Biba Models

Cybersecurity policies require the formulation and implementation of security access control models like the Bell-LaPadula and the Biba, to successfully ensure availability, integrity, and confidentiality of information flows via network access.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 882

Introduction to Biotechnology and Its Elements

The impacts of biotechnology on life are tremendous and now this industry is becoming the essential one in our daily life. The biotechnology industry is regulated by the US Food and Drug Administration, the Environmental [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1095

The Analysis of the Crash of Douglas DC-10

Examination of 7:30 separation sector of the containment ring revealed great deformation and it was found out that the first fan disc burst into the ring in this sector.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1139

Do Video Games Cause Violence?

Those in favor of violent video games contend that fantasy and violence are integral parts of our life, which we tend to manifest in the form of storytelling.
  • 5
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 652

Media Future and New Technology – Mobile Phone Culture

Contrasting the Internet, this has flickered panics of a "digital divide" flanked by the modern and the third world countries, as cell phones have become popular in the society, community or all over the planet.
  • Subjects: Technology Effect
  • Pages: 11
  • Words: 2996

Cybercrime and Its Legal and Practical Management

With the development of various programmes that significantly simplify the daily activities of the organisations and individuals, the issues of privacy and security became more spread.
  • Subjects: Cyber Security
  • Pages: 7
  • Words: 2042

Google Glass Technology and Its Future

Hence, it is crucial to discuss Google Glass and its features, including what the future holds for this technology. The only problem is that Google Glass has not been demonstrated to be a lasting solution [...]
  • Subjects: AI
  • Pages: 2
  • Words: 637

Evie.ai Company in Artificial Intelligence Market

The application of artificial intelligence to manufacturing and agriculture is gradually expanding from the commercial and service industries. The global demand for AI is high, and it is expected to grow exponentially.
  • Subjects: AI
  • Pages: 9
  • Words: 2455

Technophobes and Their Fear of Technology

Technophobes assume that they will whether be laid off by the company or will have to commit to continuous learning, which to many people, is a big challenge on its own.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 432

Operating Systems and Their Development History

The emergence of the scientific discipline of program design, the creation of compatible systems, the creation of emulators, the beginning of OS specialization.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 645

Massive Open Online Courses

The introduction of MOOCs has changed the course of the development of VBL. The retention of users is one of the major challenges for MOOCs.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 586

Rise of the Machines

Nevertheless, the author does not try to persuade the readers to choose any of the sides and rather demonstrates the ambiguity associated with the technology's current position and states that it may become clearer in [...]
  • Subjects: AI
  • Pages: 2
  • Words: 296

Cybercrime and Law Enforcement Strategies

The analyzed literature reveals a problem in the sphere of cybercrime research the lack of statistical information and analysis of interventions in the field of personal data theft.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1016

WiMax Technology Specific Aspects

Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of computer networks.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2020

Cybercrime and Digital Evidence

When a user searches for a music file by title or a musician's name, the user's request is sent out to all computers in the network, and a response list is generated to the user [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1234

The Enable Talk Gloves: Invention’s Pros & Cons

The gloves have special sensors that turn the signs into texts on a smartphone that also turns the texts into speech. This invention will impact the participation of people with speech problems in the activities [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 205

ATN Corporation’s Cloud Computing Mechanisms

The second mechanism expected to be a part of the described solution is the virtual server. Finally, the third mechanism likely to be leveraged as a part of the described solution is a cloud usage [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 828

Antecedents of Virtual Team Effectiveness

This section explores the context of the research, statement of the problem, research aims, research questions, and the implication of the study.
  • Subjects: Technology Effect
  • Pages: 60
  • Words: 14189

The U.S. Video Game Industry

This was also based on the views of the company's developers who assumed that the technological advantages of the the16-bit system were extremely less than that of the 8-bit system.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 941

Emerging Transportation Technology in the UAE

The purpose of this paper is to assess the most frequent purposes of interurban traveling of the UAE residents and their attitudes to Hyperloop, and to estimate the potential benefits of implementation of this technology.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4309

Home Networking Problems and Mistakes to Avoid

With the ever-increasing need to have access to the internet and telecommuting, individuals are being compelled to set up home networks that can guarantee access to the internet for the purposes of working, education, and [...]
  • Subjects: Internet
  • Pages: 28
  • Words: 7648

What Is a Wiki? General Description and Purpose

The name of this premier wiki was borrowed from that of the buses, which ply within the Honolulu International Airport's terminals, which are known by the name "Wiki- Wiki Shuttle".
  • Subjects: Internet
  • Pages: 12
  • Words: 3310

Workers’ Safety in Petrochemical Industry

It is noted that both the employer and the employee have a role to play in improving the health and safety of workers in the work place.
  • Subjects: Accidents & Protection
  • Pages: 13
  • Words: 2017

Road Accidents and Traffic in Abu Dhabi and Dubai

The proposal is aimed at pointing to the main reasons for the road incidents based on the reports and other literature sources with the purpose to allow the specialists to offer the solutions to reduce [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1400

Software Engineering Career Information

Software Engineering is a field in engineering that requires the practitioner to apply the principles of engineering in the design and development of software products.
  • Subjects: Engineering
  • Pages: 2
  • Words: 549

Multimedia Technology for Teaching and Learning

Studies have shown that the use of multimedia is a technological phenomenon because its applications involve the use of technology. The implication is that multimedia has a theoretical basis for both teaching and learning.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 567

Audio-Visual Media and World Wide Web in Education

Due to manifold effects of technological innovations, education has undergone positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide Web, one [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 785

Internet for Learning and Knowledge Acquisition

Due to manifold effects of technological innovations, education has undergone significant and positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1376

Concept of the Denial-of-Service Attacks

Therefore, it is important to understand the concept and classifications of DoS attacks. Notwithstanding the reason, the inability of individuals to access services they are qualified for is called a DoS attack.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1104

Environmental Pollution in the Petroleum Industry

At the same time, it threatens nature and creates many long-term issues related to pollution of air, soil, water, the weakening of the ozone layer, and the facilitation of the greenhouse gas effect.
  • Subjects: Engineering
  • Pages: 4
  • Words: 916

Technology and Human Development

This paper discusses video games as learning tools to highlight the kind of knowledge that they present to learners and their effectiveness in enabling people to acquire the knowledge.
  • Subjects: Technology in Education
  • Pages: 9
  • Words: 2508

Interactive Whiteboards in Saudi Arabian Schools

A comprehensive understanding of the benefits of adopting technology and the barriers to its maximal integration and implementation in learning institutions will create a better platform from which to review the existing literature and explore [...]
  • Subjects: Technology in Education
  • Pages: 18
  • Words: 4862

Internet Replacing Books as Learning Tool

The Internet is an opportunity to save time, find the required information, and use global connections, as well a threat of being isolated, misunderstood, and mislead; therefore, such factors as fashion, the role of parents, [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1735

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

Administrative and Academic Software

This enhances the campus ecosystem which comprises of the student information system and mainly deals with the integration of departments as well as regulation of the flow of work within the respective departments.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 674

Virtual Reality’s Main Benefits

The rapid development and the growing popularity of virtual reality raise a logical interest concerning the advantages and disadvantages that are related to the application of this new technology in various spheres of knowledge and [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 909