Tech & Engineering Essay Examples and Topics. Page 9

4,436 samples

Device Addiction: Consequences and Solutions

One of the essential traits of smartphone addiction is tolerance which is defined as "a gradual increase in the mobile phone use to obtain the same level of satisfaction".
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1204

Discord Server as Online Public Space

Interestingly, both types of relationships are natural to Discord because it has many functions, and there is possible to create many channels with the same people, so different parts of a project can be separated [...]
  • Subjects: Applications
  • Pages: 1
  • Words: 324

Should the Internet Be Regulated?

The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
  • Subjects: Internet
  • Pages: 2
  • Words: 661

Amazon Company’s Acquisition Risk Analysis

Since Amazon is one of the largest companies in the world highly sensitive to cybersecurity risks, it would be appropriate for the company to use the best provider regardless of the price of the solution.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2264

“Artificial Intelligence and Its Role in Near Future”

The author's work is devoted to the role of artificial intelligence in human life: He writes about the development of AI, especially noting how computer technology has caused a renaissance of influence on processing data [...]
  • Subjects: AI
  • Pages: 4
  • Words: 1141

Unified Theory of Acceptance and Use of Technology

Nevertheless, the most convenient and affordable is a mobile technology that can work on different operational systems and track the motion of tourists in real time, transmitting data to the Internet server and allowing one [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1119

GG Freightways Mobile Marketing Application Project

The mobile marketing application intends to assist in tracking the whereabouts of the goods transported hence contributing to the timely delivery of the freight to the clients.
  • Subjects: Applications
  • Pages: 5
  • Words: 1379

Technoscience and Humanity in the Elysium Film

Moreover, the concepts of transhumanism and artificial intelligence are analyzed in the context of the corrupted social order to draw on the failure of humanism, ethical and moral decay, and prosperity of the wealthy.
  • Subjects: Technology Effect
  • Pages: 7
  • Words: 1993

Artificial Intelligence Impact on Work and Society

One of the biggest aspects that significantly affected my understanding of the issue of utilizing artificial intelligence for a variety of tasks is the increasingly important role of human interventions.
  • Subjects: AI
  • Pages: 4
  • Words: 1203

Technology in Education: Benefits and Challenges

To succeed in this learning environment, students need to develop organizational and clinical skills and strategies to achieve academic success; challenges may be associated with the quality of received information and consequences of using devices.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 634

Layering and Encapsulation Security Design

The concept behind the layer is to provide multiple security tiers to protect the organization from exposure to these failures. Thus, it is an example of a wrong solution to the world.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 720

How Do Hybrid Cars Work

The branch supports hybrid cars because they help to protect the environment through the reduction of emissions to the atmosphere and use of less fuel.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Technological Advancement: Automatic Vehicles

In the past decades, people complained of the quality of vehicles that used to be produced. Advancement in technology has led to most of the operations being mechanized.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2251

How Computer Works?

In order for a computer to function, stuff such as data or programs have to be put through the necessary hardware, where they would be processed to produce the required output.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 891

Submerged Arc Welding

But in the case of welding, the by-products of the welding process can be hazardous to the health of the workers.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2010

Digital Self-Harm: Causes and Interventions

Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2258

Toyota Land Cruiser GXR: Model Description

The region and the use of the car will guide the owner on the required level of protection. The ballistic level of protection depends on the owner of the vehicle's requirements.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1118

Innovations in Mobile Communication Devices

The advent of mobile communication devices and the Internet brought a paradigm shift in the way that people worked, interacted and lived and changed the speed with which communication was conducted.
  • Subjects: Phones
  • Pages: 50
  • Words: 14365

Remote Sensing Monitoring the Ground Water Quality

The overall view of the water quality index of the present study area revealed that most of the study area with > 50 standard rating of water quality index exhibited poor, very poor and unfit [...]
  • Subjects: Other Technology
  • Pages: 25
  • Words: 7005

VMware Server Virtualization Solution

This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
  • Subjects: Computer Science
  • Pages: 45
  • Words: 13587

Airports Security Systems’ and Passengers’ Satisfaction

All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
  • Subjects: Aviation
  • Pages: 19
  • Words: 4975

Boston Dynamics’ Spot Robot Dog

Spot is a four-legged robot that evolved from SpotMini (the initial version) that offers multiple capabilities of operation, including climbing, jumping, walking.
  • Subjects: Robotics
  • Pages: 4
  • Words: 357

Creating a Database in Microsoft Access

During the database design, it is not possible to delete the primary key fields in the datasheet view until one changes to the design view, since the primary key represents a unique identification field of [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 758

Interactive Tools: Types and Its Benefits

In this modern day, it is important to remain competitive. Information technology and interactive tools are some methods which one can improve the online consulting process.
  • Subjects: Applications
  • Pages: 12
  • Words: 1586

Robotics and Artificial Intelligence in Organizations

Otherwise, cognitively complex tasks and those demanding emotional intelligence will be performed by humans, with the support of robotics and AI. Therefore, this study speaks of the importance of employee trust in AI and organization.
  • Subjects: AI
  • Pages: 7
  • Words: 2005

Computer Network: Data Flow and Protocol Layering

The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

The Design Characteristics of an Airplane

Control defines the ability of an airplane to respond to the controlling actions of a pilot and the ability to produce the desired displacement of altitude in flight.
  • Subjects: Aviation
  • Pages: 2
  • Words: 540

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

Steganography in Current Digital Media

When the hair grew, the slave went to the recipient of the message who shaved the head to expose the hidden message. In these methods, the hidden information within files may be known to the [...]
  • Subjects: Computer Security
  • Pages: 13
  • Words: 3674

Fiber Optics Usage in Medicine

An optical fiber can be explained as a flexible length of transparent pure glass with width not larger than human hair, which has the ability to transmit messages in modulated light waves through application of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1228

Commercial Airport Security Plan for the US

The intent of this security plan is to help the airport commission, tenants, and local law enforcement enhance security of the airport grounds, facilities, buildings and procedures.
  • Subjects: Aviation
  • Pages: 15
  • Words: 3914

Condenser Operation and Maintenance

The design of the surface condenser is such that steam is made to get its way into the condenser system through an opening at the top section of the condenser system after which distribution takes [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2202

Mobile Devices and Convenience

Mobile devices that fulfill such requirements provide the merit of functionality optimization, mobile network security with the consequence of the reduction in costs associated with downtimes while not negating the privilege of reduced general costs [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1618

Personal Protective Equipment for Firefighters

It is for the serious impact of the fire that the department of fire fighting was initiated within every country to respond to fire incidences.
  • Subjects: Accidents & Protection
  • Pages: 50
  • Words: 14095

Stress-Strain Relation of Stainless Steel After Exposure to Fire

To study the behavior of stainless steel at elevated temperatures, the material data of the steel obtained through testing is important.ca Steady-state tensile tests and transient-state procedures determine the stress-strain relationships of stainless steel at [...]
  • Subjects: Engineering
  • Pages: 15
  • Words: 4453

Policing Internet Fraud in Saudi Arabia

However, the criminals get the opportunity to use personal information in order to undermine the credibility and to destroy the image of the innocent person to be benefited economically or for other purpose.
  • Subjects: Cyber Security
  • Pages: 60
  • Words: 16625

Cascading Style Sheet (CSS)

CSS removes the styling from the HTML to ensure that the HTML only handles the content while the CSS takes care of the styling of the web page.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 565

Engineering and Technology Management

Engineering and technology management group is aimed at encouraging the coordination of engineering and technology to management technicalities which has divisions for national and international conference participation.
  • Subjects: Engineering
  • Pages: 3
  • Words: 875

The Hyatt Regency Hotel Walkway Collapse

On collapse, the 2nd and 4th floor walkways feel into the floor of the atrium. Collection of samples for failure analysis, therefore involved debris from areas related to the hanger rod connections.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1644

Can Manufacturing Material and Process

However, the period of technological advancements that started after the Second World War saw a breakthrough in the extraction of aluminum and easy smelting of aluminum.
  • Subjects: Engineering
  • Pages: 7
  • Words: 2015

Aircraft Crash and Emergency Management: Flight UA232

There was no indication of any type of problem that could have warned the pilots of the impending disaster that would force them to crash-land the DC-10 that carried 285 passengers and eleven crew members.
  • Subjects: Aviation
  • Pages: 7
  • Words: 2038

Nanophotonics and Its Applications

The fiber and the couplers are believe in charge of the conveyance of the light wave to the system optical switches.
  • Subjects: Robotics
  • Pages: 3
  • Words: 852

Types of the Information Systems

A company can use information system to gain competitive advantage via better organisation of data and its storage; for instance, data can be stored in the way that allows direct access to it from inside [...]
  • Subjects: Data
  • Pages: 5
  • Words: 1380

Simulation of a Direct Detection Optical Fiber System

Meanwhile, the report will be discussing the procedures initiated during integration processes that includes the device parameters and stating all components required to make the device. Below are the procedures and the components used in [...]
  • Subjects: Programming
  • Pages: 7
  • Words: 1928

Growing Use of 3D Technology in Theatres and at Home

One of the major beneficiaries of technological advances that have been made by man over the cause of the last century has been the entertainment industry which as grown exponentially through the years.
  • Subjects: Other Technology
  • Pages: 16
  • Words: 4446

Krakow Energy Efficiency Project (Poland)

This paper describes the Krakow Energy Efficiency Project whose project proponent were the World Bank and the Government of Poland. The first parameter was the satisfaction of the end-user consumer with regard to the standards [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2067

Computer Network: Electronic Mail Server

In practice, the major problem of sending messages to various different email addresses is typically solved by entering a list of multiple addresses separated by comma within the "To", "BCC", or "CC" fields of the [...]
  • Subjects: Computer Science
  • Pages: 20
  • Words: 5456

Reverse Engineering for Software Maintenance

To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences.
  • Subjects: Computer Science
  • Pages: 16
  • Words: 4361

Technologies and Barriers in Higher Education

This paper uses the relevant scholarship and argues that the high interactivity offered by digital technology has the opportunity to enhance the quality of higher education for students regardless of their age or technological prowess.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1592

Researching Capacitive Touch Sensor

The closeness of electrodes in a single-touch electrode in the two layers determines the coordinate system. The operation of a capacitive touch sensor is based on a capacitor's response to change in capacitance.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1504

The Tractor Hydraulic System: Components

The valves also block fluid flow via the center when the hydraulic is in the aforementioned state. Valves also allow the flow of fluid through the center and into the reservoir during this particular.
  • Subjects: Engineering
  • Pages: 3
  • Words: 964

Information Technologies and Disaster Management

In this article, Sakurai and Murayama present examples of the application of information technology in various stages of disaster management, including preparedness, recovery, response, and risk reduction.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 434

Very-Low-Frequency Testing of Cables

The current paper aims to review the key elements of the VLF cable testing and outline the potential areas of development that could be addressed by the experts in the field to improve the quality [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1815

Technological Advancements in Cybercrime and Fraud

To investigate the connection between rapid technological development and high rates of cybercrime and fraud in the UK. To conduct a substantial literature review on the topic of cybercrime and fraud rates in the UK.
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2070

IPhone Product Life Cycle Analysis

The product life cycle is one of the most crucial methods describing the processes of development, introduction, growth, maturity, and decline of a product.
  • Subjects: Phones
  • Pages: 2
  • Words: 557

File Sharing and Its Pros and Cons

The presence of file sharing enables businessmen and consumers to be aware of new products in the market. The presence of file sharing enables businessmen and consumers to be aware of new products in the [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2221

Using Free Antivirus Programs: Pros and Cons

So, you should always remember that it is of great importance to keep your computer and personal data safe by installing an antivirus program.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 534

Computers’ Critical Role in Modern Life

The manner in which the military operates in the modern world has completely been influenced and revolutionized by the use of computers.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2909

Fire Safety Strategy for Multi-Storey Buildings

In serious fire outbreaks, the consequences can be very bad and often result in, business closure, the destruction of property worth lots of money, loss of livelihood, displacement, and damage of property, causality in human [...]
  • Subjects: Accidents & Protection
  • Pages: 9
  • Words: 2571

Malware: Code Red Computer Worm

The worm used the vulnerability by running a long string of the repeated character 'N' to get entry to the computer.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 840

Mobile Texting and Chatting Negative Effects

Linguists and communication experts often argue that close to ninety percent of one's conversation is not what is said it is actually how one says it and the body language that the person uses.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1313

Advantages of Using Computers at Work

I have learned what I hoped to learn in that I have become more aware of the advantages of using computers and why I should not take them for granted.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 582

Computers: The History of Invention and Development

It is treated as a reliable machine able to process and store a large amount of data and help out in any situation."The storage, retrieval, and use of information are more important than ever" since [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1660

Resource Description and Access (RDA) in Library

It is printed together by the Canadian Library, The American Library Association, Association as well as the Information Professionals along with the Chartered Institute of Library within the UK.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2396

Multimedia Navigation and Usability

The user-centered design principle is to involve the end-users in the design decision process of a particular product. The use of words or pictures in relating a story is said to be infographics.
  • Subjects: Programming
  • Pages: 2
  • Words: 596

Fire Prevention Measures and Technology

Most preferable, the alarm system should be installed in every floor of the building to alert the fire fighters incase of an emergency of fire In his article about fire prevention measures, Gary Taylor says, [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1320

The Concept of 2-Factor Authentication

This article strikes a critical examination of the 2-Factor Authentication with a strong analytical exploration of the pros and cons accruing to this type of authentication.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 828

Causes and Effects of the Decline of Letter Writing

However, in the context of casual letter writing, there is a diminishing trend and the fundamental cause of this trend is globalization and the impact of internet communication along with other telecommunication agents.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 779

Airplnane: Description of the Invention

The credit for the invention of the first powered airplane goes to the Wright brothers Orville and Wilbur. The worlds first powered, sustained and controlled flight in a heavier-than-air airplane was achieved by the Wright [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 587

How the Internet Has Affected Amazon.com

Looking at its location, and with a wide range of products it deals with, coupled with a high demand for its products in the world market, we have to appreciate the role played by the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 514

Airbags’ History, Working Principles, Usefulness

Road traveling and road transportation are some of the oldest methods of road uses since the birth of technological era and the commencement of human civilization.
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1889

Computers Will Not Replace Teachers

On the other hand, real teachers can emotionally connect and relate to their students; in contrast, computers do not possess feeling and lack of empathy.
  • Subjects: Technology in Education
  • Pages: 1
  • Words: 200

The UAE Telecommunication Sector

To understand how the country may strengthen the contribution of telecommunications to its economy, the present paper will mainly aim to analyze the sector from the perspective of the theories of competition and monopoly.
  • Subjects: Phones
  • Pages: 8
  • Words: 2267

Crowdsourcing: Definition, Advantages and Disadvantages

The advantage of crowdsourcing is in reducing the cost of the company to perform many tasks. It is important to note that the disadvantages of crowdsourcing include the difficulty in predicting the quality of project [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 610

Batch Processing and Real-Time Processing

To begin with, one should mention that the time lag is one of the essential characteristics used to distinguish between real-time and batch systems.
  • Subjects: Data
  • Pages: 2
  • Words: 557

Mobile Telephones and Social Life

The main purpose of the project is exploring the positive and negative aspects of mobile phone use in society since the technology is at the forefront of most interactions between modern people.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Driverless Cars and Safety Concerns

However, in the future, the application of machine learning might as well make driverless cars safer and their systems "smarter" in a way that they would mimic human reactions to unpredicted events.
  • Subjects: AI
  • Pages: 1
  • Words: 441

Technophobes and Their Fear of Technology

Technophobes assume that they will whether be laid off by the company or will have to commit to continuous learning, which to many people, is a big challenge on its own.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 432

The Boston Molasses Disaster of 1919

Moreover, the steel used to build the walls of the tank was too thin and brittle to hold the required weight.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 294

Food Recommender Systems and Their Types

In the article "Knowledge-based recommender system," it is stated that the cognitive element is expected to be sufficient to dwell upon the similarity of the constituents.
  • Subjects: Applications
  • Pages: 3
  • Words: 942

Digital Temperature Controller

The effectiveness of the temperature controller improves the productivity and performance of the machine. The project demonstrates the functions and capabilities of the digital temperature controller.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1151

Cybercrime and Digital Evidence

When a user searches for a music file by title or a musician's name, the user's request is sent out to all computers in the network, and a response list is generated to the user [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1234

Electronic Reading Devices, Their Pros and Cons

Such devices may be expensive and unaffordable for some people. Overall, reading on electronic devices offers vast opportunities both for the publisher and for readers of all ages.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 281

Communities and Social Change

Almost every country in the world has contributed to the invention of new technologies and ideas that put them on the same level as the rest of the world.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1143

Technology in Education and Medicine

Also today, courtesy of technology, students with learning disabilities can participate fully in the learning process using assistive learning techniques and programs.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 523

Handheld Devices for Student Learning

The availability and development of handheld devices facilitate mobile learning acceptance as a method to provide personalized, accessible and flexible learning.
  • Subjects: Technology in Education
  • Pages: 45
  • Words: 11842

Science and Technology Impact on Globalization

Globalization has by now laid down the phase for this epoch through making the world interrelated further and the tools of empowerment available to all."To start with, Globalization refers to the trend toward countries joining [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 826

Road Accidents and Traffic in Abu Dhabi and Dubai

The proposal is aimed at pointing to the main reasons for the road incidents based on the reports and other literature sources with the purpose to allow the specialists to offer the solutions to reduce [...]
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1400

Audio-Visual Media and World Wide Web in Education

Due to manifold effects of technological innovations, education has undergone positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide Web, one [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 785

Cyber Attack on eBay Company: The Summer of 2014

Thus, one of the most famous cases in the world, which related to the hacking of important information, was the attack on the database of the world-famous online store eBay.
  • Subjects: Cyber Security
  • Pages: 11
  • Words: 3081