Tech & Engineering Essay Examples and Topics. Page 9

4,312 samples

Using Free Antivirus Programs: Pros and Cons

So, you should always remember that it is of great importance to keep your computer and personal data safe by installing an antivirus program.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 534

IBM SPSS Software Analysis

IBM SPSS is one of the statistical packages used for analyzing and interpreting data. Validity has two distinct sections namely the research section and the degree to which a test measures some data.
  • Subjects: Programming
  • Pages: 2
  • Words: 568

Competitor Companies: YouTube vs. Google Video

The restriction of user-generated content to the use of a downloadable plug-in from VideoLAN had an irreversible effect on the growth of the site since it troubled many users in its operation and hence necessitated [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 900

Technological Facilities: Computers in Education

The researcher chooses the students who study in the high school stage to investigate the issue of computer usage in high schools Physics classrooms in Saudi Arabia because different computer software is highly beneficial for [...]
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 842

Animation: Social, Economic and Technological Aspects

It was following the advent of motion picture films, that the field of animation was generated as films became popular. George Melies was one of the pioneers in the field of animation.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 842

Technology and Type of Powers on the Workplace

Surfing the internet can also be said to reduce stress as it offers a form of interaction with people in the outside world On the other hand, technology can be said to increase stress due [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 774

GIS Project: Global Warming and Its Causes

For the GIS project, it is necessary to study the main aspects and problems of global warming and the way it affects the geographic presentation of the planet.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 585

Seat Belts And Seat Belt Laws

Some factors that may affect fatality regardless of the use of the seat belts or not include the speed of collisions, the number of passengers in the vehicles that are involved in an accident, the [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2967

“The Real Transformers” by Robin Marantz Henig

The addition of "Real" in the title clearly indicates the theme of the article, in which the gap between the progress in the fields of robots and science fiction predictions casts doubt on whether we [...]
  • Subjects: Robotics
  • Pages: 2
  • Words: 572

Resource Description and Access (RDA) in Library

It is printed together by the Canadian Library, The American Library Association, Association as well as the Information Professionals along with the Chartered Institute of Library within the UK.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2396

Macintosh vs. IBM for Personal Usage

The perpendicular incorporation technique is used in the manufacture of Mac into which the entire Apple hardware parts are integrated and also the personal operating system of the Mac is preinstalled.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1685

The Concept of 2-Factor Authentication

This article strikes a critical examination of the 2-Factor Authentication with a strong analytical exploration of the pros and cons accruing to this type of authentication.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 828

The Increasing Human Dependence on Computers

Large amounts of information can be stored in the computer that is instantly available with the click of the mouse, which enables the ordering and tracking of resources in a very convenient and fast manner.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1443

The Internet: Introduction to Networking

With the increase in the availability of good and affordable bandwidth, the Internet has become a valuable tool for many people to create a network of friends that is spread across the globe and across [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1498

Hardware and Software Development Analysis

The 90-s was a real breakthrough in software development and it was mainly connected with the development of the Internet. The dominant software policy of IBM for a long period was standardized and open mainly [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Batch Processing and Real-Time Processing

To begin with, one should mention that the time lag is one of the essential characteristics used to distinguish between real-time and batch systems.
  • Subjects: Data
  • Pages: 2
  • Words: 557

Use of Robots in Computer Science

Currently, the most significant development in the field of computer science is the inclusion of robots as teaching tools. The use of robots in teaching computer science has significantly helped to endow students with valuable [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 858

Google Glass Technology and Its Future

Hence, it is crucial to discuss Google Glass and its features, including what the future holds for this technology. The only problem is that Google Glass has not been demonstrated to be a lasting solution [...]
  • Subjects: AI
  • Pages: 2
  • Words: 637

Operating Systems and Their Development History

The emergence of the scientific discipline of program design, the creation of compatible systems, the creation of emulators, the beginning of OS specialization.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 645

The Bring Your Own Device Policy

What are the advantages and disadvantages of allowing employees to use their personal smartphones for work? Compare the BYOD experiences of IBM and Intel.
  • Subjects: Phones
  • Pages: 7
  • Words: 2015

The “Smart City” Concept

Such end users are the Dubuque authorities that receive valuable data as the decision makers and the responsible citizens of the city as the evaluators of the impact the project has on their life in [...]
  • Subjects: Technology Effect
  • Pages: 12
  • Words: 1940

Science and Technology Impact on Globalization

Globalization has by now laid down the phase for this epoch through making the world interrelated further and the tools of empowerment available to all."To start with, Globalization refers to the trend toward countries joining [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 826

Software Development Life Cycle

Nevertheless, software development is a process that involves certain risks, as the SDLC framework is prone to weaknesses from the start of the project and until the acceptance of the final product by the customer.
  • Subjects: Programming
  • Pages: 3
  • Words: 885

Laser Communication Links in Space

Inter-satellite laser communication is also a great prospect to explore, as there are no obstacles in space that could impede or reduce the effectiveness of a laser beam.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 1922

Educational Policy Changes: Technology in Education

The goal of the policy change is to ensure that schools can adequately apply innovative technology, including devices and applications to engage students in the learning process and provide them with skills necessary to use [...]
  • Subjects: Technology in Education
  • Pages: 19
  • Words: 5123

Information Visualization: Task by Data Type Taxonomy

In the Department of Tourism and Commerce Marketing, the way the TTT may be implemented at the individual, group, and organizational levels can be substantially defined by both the types of data used at those [...]
  • Subjects: Data
  • Pages: 10
  • Words: 2734

Technology in Society, Healthcare and Education

However, the research on this topic is extensive and shows the impact of technology to be a positive one. Further research on this and other topics should be considered due to the widespread presence of [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1061

The Three Types of Hackers

The article "They are attacking you: learn the three types of hackers' was written by Jonathan Nichols and explores the three main types of hackers that attack organizations and their clients, and the factors that [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 568

TransAsia Airways Flight 235 Accident

The purpose of this paper is to review the Flight 235 accident, as well as to analyze the causes of its origin and the importance of the human factor, which made a critical contribution to [...]
  • Subjects: Accidents & Protection
  • Pages: 8
  • Words: 2171

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1111

CCD Camera vs Tube Camera Comparison

In reality, the camera did not change positions in the scene; this effect is the result of the editing done so that a viewer could comprehend the film.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1324

Airlines’ Practical Guidelines in Procurement Process

This paper examines how airlines can maximize the usefulness of practical guidelines that can be used to implement a performance-based contracting approach in their procurement process and the value the aviation industry will acquire in [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1981

The Uses and Abuses of Technologies and Medias

However, it is apparent that using smartphones is one of the major distractions in class, and it is likely to result in the lowering of the performance levels of the students.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1373

Docebo and Talent Learning Management Systems

The biggest advantage of LMS is the opportunity to prepare substantial resources for educating the employees or students. DoceboLMS is a powerful and extendable SaaS incorporating a function of activating an Enterprise Cloud Solution application [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1401

Frequency Modulation, Its Applications and Future

The main reason the review of frequency modulation is the focus of the research is the rise in popularity of the digital media, which requires the novel approach and means of operation.
  • Subjects: Other Technology
  • Pages: 12
  • Words: 3371

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 919

UBS-Painewebber: the Weakest Link

The defense could have used this information to prove that Duronio was not the only suspect, and further investigation was needed.
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1136

Legal Issues of the Multimedia Usage in Classrooms

To avoid any legal issues, the organization should make sure that all employees are aware of major regulations and laws associated with the use of intellectual property. Of course, it is important to remember that [...]
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

The Importance of Virtual Learning Communities

The learning communities enable the instructors and the students to volunteer their questions. The virtual learning communities enable online degree programs to give students autonomy over the learning process.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1679

The Wright Brothers’ First Flight

The given paper revolves around one of the greatest events in the history of humanity which predetermined the further development of science and society.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1131

Airport Security and Air Travel Safety

The study was based on an evaluation of the evolution of airport security with respect to the general safety of this mode of transport.
  • Subjects: Aviation
  • Pages: 12
  • Words: 3316

Manufacturing Industry Accidents: Causes and Protection

The first direct cause of the accident was the inexperience of the crane operator and the injured worker. The second direct cause of the accident was irresponsibility by the employees involved in the accident.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 617

Short-Haul Operations in Airline Industry

The liberation of the market has seen a change in the ownership of airlines from government owned to private owned airlines and airports. With advanced technology, short-haul aircrafts are easy to use for the majority [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2075

New Technology and Its Harm to Society

Owing to the huge significance of technology, new technology is constantly being developed and implemented with the aim of improving human life even further.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1425

Voice Recognition Technology: Definition and Usage

It is against this backdrop that this report explores the concept of voice recognition technology in terms of disadvantages and domain of its use, impacts of this technology on individuals and organizations as well as [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1826

How Tablets Changed Everything?

In spite of the fact that tablets allow people not to worry about their mistakes, weaken the analysis of the reading and worsen literacy abilities due to reading text with the help of a screen, [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1375

Internet Evolution and Structure

The creation of the network was meant to be a security measure to ensure that data and information belonging to ARPA remained within the system.
  • Subjects: Internet
  • Pages: 5
  • Words: 1406

How the Internet is Changing Your Brain?

One of the most evident things that can be observed nowadays is that the Internet has a considerable impact on people, the development of relations, the ways of how information is exchanged, etc.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1128

Online Research and Web Based Survey Methods

They are well-constructed surveys that take to account most of the requirements that credible research entails. These surveys are conducted over the internet and they involve samples of the exact population of interest.
  • Subjects: Internet
  • Pages: 4
  • Words: 1124

An Argument Against Technological Advancement

Summaries Eggers's description of the book's title as The Circle is similar to that of the company. In addition, the familiarity of the author with modern technological advancement is convincing to the audience.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1428

Engineers and Ethical Dilemmas

Recently in the Kenyan media there was a situation in which a road engineer had been approached by the government to aid in the design and construction of a road in the Langata area.
  • Subjects: Engineering
  • Pages: 2
  • Words: 585

The Drawbacks of Computers in Human Lives

Since the invention of computers, they have continued to be a blessing in many ways and more specifically changing the lives of many people.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1114

Skype: All you Need to Know

A number of features of Skype comprise Skype to Skype calls, SMS messaging, video calls, immediate messaging, and the capability to forward calls to cell phones of the users when the user is offline.
  • Subjects: Phones
  • Pages: 5
  • Words: 1390

How podcasts differ from radio

The internet is less subjected to the limitations on the scope of coverage that are radio experiences. The role of content creation is also easy for podcasts in comparison to radio broadcasts.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 557

Who Should Be Allowed to Filter the Internet?

In this study, I shall discuss several issues pertaining filtering and censoring among them being: countries rights or needs to filter the internet, internet, how the Great Firewall of China reflects a particular form of [...]
  • Subjects: Internet
  • Pages: 6
  • Words: 1708

Wireless charging

The application and constant development of mobile phone technology in the modern era is experiencing a boom, as innovators in the technology sector look forward to a future of introducing wireless charging technology for the [...]
  • 1
  • Subjects: Engineering
  • Pages: 4
  • Words: 1194

Ethical Industrial Engineering Ethics

Failure to embrace this by past engineers led to the establishment of code of ethics that guide all engineers in their day to day execution of services.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1872

Data Warehousing at REI

The second reason is that the company wants to increase the accuracy of the information in its hands regarding the outdoor activities of its members.
  • Subjects: Data
  • Pages: 5
  • Words: 1417

Application of Technology in Education

Therefore, it is vital for educators to use the above spheres of learning in the application of technology in education. However, the spheres of learning are in constant conflict with each other in the lives [...]
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1107

Central heating systems

The main components of a central heating system include the source of heat and appliances for heating, medium of conveying the heat to the area where heating is required, and spaces for releasing heat.
  • Subjects: Engineering
  • Pages: 10
  • Words: 2743

Technology Fails to Deliver Happiness

With the advancements in information technology and the massive use of the internet, communication has become quite effective as people can connect when they are in different countries around the world, at any time.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1359

Extranet and B2B E-Commerce for Business

The risks to be considered by the Top Breadz team studying the solution are the following: Retail partners might not possess the proper or compatible Information Technology background to gain advantage of Top Breadz's new [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 1842

Impact of New Forms of Technology on Our Understanding of Pornography

This paper therefore shows that technology has completely changed concepts of the production of pornographic material, the distribution of pornographic material, access to pornographic material and our understanding of the concepts of privacy and identity.
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2276

Contingency Plan for Generation Next Airport

In the event that all lavatories become inoperable during a tarmac delay, the airline will return to the gate as soon as practical or make other arrangements to immediately service the aircraft to return the [...]
  • Subjects: Aviation
  • Pages: 22
  • Words: 5807

Solar Energy in the United Arab Emirates

The success of the solar power initiatives in the UAE is largely attributed to the wide range of financial incentives that the UAE government has offered to the companies that are prepared to advance the [...]
  • 5
  • Subjects: Engineering
  • Pages: 5
  • Words: 1352

Emerging Technology in Wireless Networking

The volatile growth of wireless systems together with the proliferation of laptop and miniature computers points out a brighter future for wireless networks, both as independent systems and as part of the wider networking infrastructure.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2753

Information Security of Information Technology

With the growth of information technology and its increased access, information security is a point of concern especially in regard to the transmission of the same.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2335

Technological Generations of Mobile Communications

Thus the use of this technology is dependent on the proximity to power supply. Thus, it is arguable to conclude that the development in the wireless communication cannot be optimum.
  • Subjects: Phones
  • Pages: 5
  • Words: 1333

Tablet PCs Popularity and Application

The main reason why people prefer the tablet PCs is the ease of mobility and operability compared to the laptops and the desktops.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2948

Fibre Optic vs. Coaxial Cables: Advantages and Disadvantages

The cables are used mainly for the transmission of data from different terminal points, including computers and televisions. The cables are also immune to noise interferences that affect the quality of coaxial cables.
  • 2
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1111

Technology Impact on Human Civilization

Despite the large amount of information that the internet provides to people, research shows that the internet may have a negative effect on the intellectual ability of an individual. The use of technological devices may [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 816

The History of Relational Database Technology

In 1980's the disadvantages associated with relational database systems and the need to increase capacity of manageable objects led to the invention of commercial object-oriented database systems.
  • 5
  • Subjects: Data
  • Pages: 8
  • Words: 2179

Effects of Surveillance Technology on Privacy

The presence of surveillance devices and gadgets in public gathering places limits the use of the public places, as many people will tend to avoid such places in fear of exposing their privacy to their [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1660

The iPhones Fourth Generation

It is the fourth generation of the iPhone, having succeeded the iPhone 3GS, the other two previous models are the original iPhone and the iPhone 3G.
  • Subjects: Phones
  • Pages: 5
  • Words: 1425

Is Modern Conveniences and Technology a Curse or a Blessing?

However, although modern conveniences and technological innovations have some negative effects, the benefits of such conveniences and innovations overshadow such effects; hence, modern conveniences and technological developments have greatly improved the quality of life; hence, [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 845

Effects of Word Processors on Writing Ability

Using word processors, I can retrieve pieces of writing written in the past and try to improve on them. Sometimes I am not able to spot my mistakes in writing when using word processors.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 568

Ethical and Illegal Computer Hacking

For the ethical hackers, they pursue hacking in order to identify the unexploited areas or determine weaknesses in systems in order to fix them.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 557

Importance of Speed Limits and Stop Signs for Road Safety

Obeying the speed limit and stopping at stop signs are not merely legal obligations; they are crucial for ensuring the safety of drivers and pedestrians alike. Speed limits and stop signs are specifically designed and [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 557

Drawing 3D Objects With Use of Robotic Arm

The hot end of the printer melts the material and embeds it onto the surface onto the intended surface. The research also utilized the Arduino development board to interface the programs written and the physical [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2759

AR and VR for Maritime Industry Training

The first advantage of AR and VR for maritime training is that it is expected to provide trainees with a high level of practical experience in dealing with different scenarios.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2805

Introduction to the Engineering Design Process

NASA's Best Engineering Design Process course demonstrates how presenting the audience with the idea of bringing a satellite to the Moon can lead to introducing deeper problems associated with the engineering side of the idea.
  • Subjects: Engineering
  • Pages: 1
  • Words: 323

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

Defining Data, Information, and Knowledge

Thus, information can be defined as data that develops in one's cognitive system with the help of context and human intention. Knowledge is the process of understanding and explaining the information that happens in the [...]
  • Subjects: Data
  • Pages: 3
  • Words: 852

Role of Technology Behind Discord

Discord is built in a way to allow its participants to send messages to each other within communities, which are called 'servers'.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 313

Aspects of Business in the Digital Era

The purpose of this research proposal is to explore how businesses are operating in the digital era, specifically the prevalence of fraudulent activity and intrusions by hackers in commercial enterprises in the digital era.
  • Subjects: Accidents & Protection
  • Pages: 11
  • Words: 3125

The Amazon Web Service Key Features

When it comes to the hardware of the AWS system, there are various concepts that a reader must understand to comprehend the configurations of the Amazon application.
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1505

Proximity Sensors of Android Phone

Thus the IR-based proximity sensors are able to detect when the phone is close to the pocket walls and thus a message will be created to the processor of your phone to switch off the [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 939

How to Make APA Format Tables and Figures Using Microsoft Word

Both for figures and tables, there are two basic options for their placement they may be mentioned and subsequently embedded in the text or placed after references on a separate page. The creation and placement [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 328

Transition From Analog to Digital World

However, one should understand that this state of affairs has not always been the same, and the analog world preceded the digital one.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 279

Common Security Models

In the Clark-Wilson model, users do not access the object directly, as an intermediary serves to ensure the integrity of the data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 614

Science Personal and Professional Life

Our decision to eat baked yams instead of fries, the car we drive in, our mobile phones, the oral drugs we use to treat certain illnesses and the purified water we drink at the end [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1146