Tech & Engineering Essay Examples and Topics. Page 9

5,909 samples

Impact of Cyber Crime on Internet Banking

The paper evaluates a con article on 'The impact of cybercrime on e-banking' [1]. H2: Identity theft will have a negative impact on the adoption of electronic banking.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 882

The Artificial Intelligence Use in Solar Panels

The use of solar PV panels as sources of renewable energy has been gaining traction in the recent decades. This implies that the output of energy in PV solar panels is often unstable.
  • Subjects: AI
  • Pages: 5
  • Words: 1430

The Role of Databases in Organizations

In the contemporary technology-driven world of business, the use of information technologies is essential for the efficient and competitive implementation of business practices.
  • Subjects: Data
  • Pages: 1
  • Words: 291

Integration of Artificial in Human Resource

The paper will focus on summarizing the piece of work to comprehend the contribution of the authors in understanding the role of AI in modern HR practices.
  • Subjects: AI
  • Pages: 9
  • Words: 1673

Remote Working: Impact of Technological Development

Remote working is a form of arrangement where the employee does not have to commute to the workplace. The number of telecommuters increased to 2,000 in 1983, and the figure continued to grow in the [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 919

Properties of Engineering Materials

Specific heat of a material is the amount of heat required to increase the temperature of unit mass of material by one degree Celsius and is denoted by the letter S.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1441

Application Development Using Android Studio

Android Studio offers a range of testing tools and frameworks to help one in testing the app. Further, an XML file in the Android Studio enables one to create a layout and resources.
  • Subjects: Applications
  • Pages: 2
  • Words: 560

Discussion of Cybercrimes in Modern World

The relevance of cybercrime research is dictated by the fact that it is challenging to ensure the complete safety of data on the Internet.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1447

EBay: Cloud Computing SAAS Model

Software-as-a-Service is a cloud computing model that suits eBay's needs outlined in the previous slide. As anyone can access the service without specialized hardware, software, or knowledge, it can be brought to a large audience [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 617

Technology Acceptance Model and Cybersecurity

In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Boolean Search and How to Use It

The use of the created Boolean string yields 1726 results, which is a relatively large number of articles for manual selection of the most relevant sources.
  • Subjects: Programming
  • Pages: 6
  • Words: 449

Technology and Wind Energy

Efforts by the elite members of the society enlightened the global countries about the benefits of renewable energy sources in conserving the environment prompting the need to consider wind energy.
  • Subjects: Other Technology
  • Pages: 1
  • Words: 295

Airports Security Systems’ and Passengers’ Satisfaction

All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
  • Subjects: Aviation
  • Pages: 19
  • Words: 4975

Project Risk Analysis and Management

The Project Management Institute (PMI) defines a project as a one time work effort that has "a clear beginning and end and is intended to create a unique product or knowledge".
  • Subjects: Project Management
  • Pages: 20
  • Words: 2243

The Flashlight Technology Description

The plastic casing of the husky flashlight consists of a 5 inch cylindrical plastic container with a very thin spring or a strip piece of metal that is used to make the electrical connections between [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 649

Influence of YouTube and Facebook on Business

Two of the most influential and promising technologies in this age are the YouTube and Facebook, a social website. The impact of social media on business is remarkable and companies use YouTube to market their [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 2171

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

Relational Database: The University Database

A tutor also qualifies as a module coordinator and hence the primary key of any of the tutors is the ModCoord. The association between the module coordinator and the student table is a one-to-many type.
  • Subjects: Data
  • Pages: 7
  • Words: 2325

Modern Navigation Systems and Safety

It is also capable of determining the ground speed and the time in relation to ground station when in "line of sight" of transmission. LORAN is capable of providing highly accurate bearing, distance, time to [...]
  • Subjects: Aviation
  • Pages: 12
  • Words: 3430

Overview on 4G Technologies

The major plan of 4G technology is to ensure that users can access and have a faster and more reliable internet access on their mobile phones and the mobile broadband services and combine all other [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 921

The Wireless Robotic Car: Design Project

2
In this prototype, the task is to design a robotic car that can be controlled by a computer using wireless communication technology.
  • Subjects: Robotics
  • Pages: 6
  • Words: 1992

Computer Problems: Review

I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 1056

Microsoft Power Point: Program Review

The latest version of the Microsoft Office system program is a 32-bit application and can run on a Windows 64-bit platform.
  • Subjects: Programming
  • Pages: 2
  • Words: 749

XO Laptop Version 2.0 Analysis

The main consideration, represented in the article is associated with the fact, that the new model of laptops for children is a very successful and highly potential solution of the educational issues, and the maters [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1063

Information Technologies and Disaster Management

In this article, Sakurai and Murayama present examples of the application of information technology in various stages of disaster management, including preparedness, recovery, response, and risk reduction.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 434

Qualitative research: Data Analysis and Reporting Plan

Consequently, the analysis will involve the interpretation of the respondents' responses provided on the questionnaires. In addition, a final analysis will be conducted to focus on the issues which arise after data collection.
  • Subjects: Data
  • Pages: 2
  • Words: 611

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Cybersecurity and Social Networks

Recently, there have been many trends the security of information and communication technologies, in particular, due to the expansion of the reach of social media which increase the size of social network, which has taken [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 2895

Business Information System by Google Docs

Department managers share the requirements, recommendations, list of criteria, and deadline information for the developers. Processing of the online stored information is performed online, and hard copies are processed by workers responsible for processing any [...]
  • Subjects: Applications
  • Pages: 6
  • Words: 1607

Network Infrastructure Upgrade: Selection Process

As one of the top management team members, I was involved in advertising a job for a suitable company to write a proposal report and present to us so that we could evaluate them and [...]
  • Subjects: Other Technology
  • Pages: 11
  • Words: 3501

Analysis and Interpretation of Text and Image

Text analysis in this discourse will focus on critically examining and analyzing the language structure in the document to identify the communication function of the discourse.
  • Subjects: Applications
  • Pages: 12
  • Words: 3352

The Different Sides of Hacking

In a general sense, computer hacking involves the intrusion of the computing privacy of other people, damage of the computing property of other people like files, software etc.or the theft of private information by unauthorized [...]
  • Subjects: Computer Security
  • Pages: 2
  • Words: 575

Risk and Trust – Internet Relationships

Politics has hampered efforts to spread the knowledge of the risk society. It is noted that scientists have also failed to come up with a rational solution to the risks of modernity.
  • Subjects: Internet
  • Pages: 8
  • Words: 2217

Effect of Modern Methods of Construction

MMC includes; Make use of more effective material Speed up hiring delivery Enable high standards of design quality Can help to reduce resource consumption It has often been regarded as a mean of improving quality, [...]
  • Subjects: Engineering
  • Pages: 20
  • Words: 3504

Mobile Phones and True Communication

This problem led to the invention of mobile phones which foster true communication in the following aspects. The radio enhances communication because one is capable to get world news despite the compactness of the phone.
  • Subjects: Phones
  • Pages: 2
  • Words: 560

Full Disclosure of the Vulnerability

This report discusses the causes of security vulnerabilities in the products, risks involved in the disclosure of a vulnerability, and the position of white, grey, and black hat hackers on the discovery and disclosure of [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2630

Choosing the Right Career Path: Biomedical and Civil Engineering

Biomedical engineers join sound skills of engineering and biological science, and so tend to have a bachelor of science and superior degrees from major universities, who are now recovering their biomedical engineering program as interest [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1547

Open Technology. Marshall Poe’s The Hive Article

For instance, in training their leaders and the staff, you find that these people are in a position to learn online through the use of the internet and this has helped these organizations to reduce [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1297

How Computers Negatively Affect Student Growth

Accessibility and suitability: most of the school and student do not have computers that imply that they cannot use computer programs for learning, lack of availability of internet facilities' availability also makes the students lack [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 611

Batch Processing and Real-Time Processing

To begin with, one should mention that the time lag is one of the essential characteristics used to distinguish between real-time and batch systems.
  • Subjects: Data
  • Pages: 2
  • Words: 557

Google Glass Technology and Its Future

Hence, it is crucial to discuss Google Glass and its features, including what the future holds for this technology. The only problem is that Google Glass has not been demonstrated to be a lasting solution [...]
  • Subjects: AI
  • Pages: 2
  • Words: 637

Artificial Intelligence Managing Human Life

Although the above examples explain how humans can use AI to perform a wide range of tasks, it is necessary for stakeholders to control and manage the replication of human intelligence.
  • Subjects: AI
  • Pages: 3
  • Words: 835

Digital Socialization in Modern Society

With the rise of the Internet and citizen journalism, everyone is capable of having a voice and swaying the opinions of millions with solid facts, innovative ideas, and moving imagery.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 327

Science and Innovation in Different Societies

Firstly, it is critical to study the importance of science and innovation because the fields high influence the life of people by making it more convenient such as the usage of elevators.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 274

Project Control, Audit, and Termination

The process of project controlling is a complicated system of various actions which requires a lot of experience and efforts. This type of control meets some challenges as it is not always easy to identify [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 844

Telecommunications, the Internet and Wireless Technology

The rest of the tag is an antenna that transmits data to a reader using radio waves. 0 tools by organizations in a bid to foster a relationship with the main stakeholders, including associates and [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 609

Multimedia Technology for Teaching and Learning

Studies have shown that the use of multimedia is a technological phenomenon because its applications involve the use of technology. The implication is that multimedia has a theoretical basis for both teaching and learning.
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 567

Technological Innovation in Law Enforcement

It shows that criminals may use the same methods as police officers and also indicates that the storage of personal information in cyberspace is related to major safety risks.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 870

“A Whole New Mind” by Daniel Pink

In his book A Whole New Mind, Daniel Pink focuses on a discussion of one of the major changes in the modern society that have occurred under the influence of such professes as industrialization and [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 849

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 571

The Technology of Drones

Drones are an emerging sector of the aviation industry that has been received differently by the public primarily due to the possibility of misuse, infringement of privacy, and military use in combat.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1135

Single and Multi Touch User Interface

The core purpose of any multi-touch interface is to detect and process the users' intuitive gestures. The first and foremost advantage of multi-touch interfaces is that they can be adjusted to virtually every situation where [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 855

The Oil and Gas Industry: Project Management

Figure 1 presents the WBS developed for the Horse Hill Project concerning these stages.  The proposed WBS is appropriate to describe the work and activities associated with the realization of the Horse Hill Project.
  • Subjects: Project Management
  • Pages: 2
  • Words: 425

Strategic Airline Alliances: Present and Future

Because of globalisation and the heightened competition, the airlines of the current world regard the essence of joining strategic alliances as crucial for bolstering their competitiveness.
  • Subjects: Aviation
  • Pages: 15
  • Words: 4167

Emergency Response Planning in the Airline Industry

The goal of this paper is to provide information about the concepts surrounding this issue and to look into the impact of emergency response on the reputation of an airline and legitimacy based on real-life [...]
  • Subjects: Aviation
  • Pages: 13
  • Words: 3558

Learning Objectives Implementation

With the advent of the internet, online courses have sprouted resulting in the debate on the two options, traditional class setting, and the online class.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 1013

Testing Approaches and Change Management Process

There are several integration testing levels: Component Integration Testing checks the interaction between the system components after their testing. System Integration Testing checks the interaction between different systems after the system testing.
  • Subjects: Programming
  • Pages: 3
  • Words: 845

The Carnival Triumph Cruise Ship’s Crisis Management

This paper is a critical analysis of the crisis communication surrounding the marooning of the Carnival Triumph Cruise ship. The contribution of the Carnival's PR in addressing the Triumph crisis is subject to analysis to [...]
  • Subjects: Accidents & Protection
  • Pages: 10
  • Words: 2838

Internet Gambling and Its Impact on the Youth

However, it is necessary to remember that apart from obvious issues with gambling, it is also associated with higher crime rates and it is inevitable that online gambling will fuel an increase of crime rates [...]
  • Subjects: Internet
  • Pages: 3
  • Words: 830

Screwdriver – Mechanism Description

The fulcrum shank of a hex nut screwdriver is a metallic rod that is attached to the handle of the screwdriver and ends with a blade.
  • Subjects: Engineering
  • Pages: 2
  • Words: 579

Microsoft SharePoint as a Private Cloud App

The SharePoint allocation has the capability of efficiently replacing the sandbox and farm solutions thus, guaranteeing satisfaction to the administrators, users, and third-party application experts. In terms of the users' recompense, the SharePoint application enables [...]
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 602

Remix Culture on the Internet

Thus, it is inevitable for a remix to face legal issues when a part of the original piece is copied, adapted, or reproduced without the agreement and permission of the copyright owner through a Creative [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2213

“The Dumbest Generation”

This is proven by the fact that he has gone beyond his limits to investigate the impacts of technology on America's young people.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1101

Technology and Personal Devices

It is obvious that many programs and applications greatly help collect, organize and store data and statistics, as well as manipulate information, represent it graphically and send it to a distant location, and this has [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 580

The Evolution of Television

The discovery of the photoconductive properties of selenium by Willoughby Smith and his assistant in 1873 completely changed the things in the history of television.
  • Pages: 5
  • Words: 1407

Steam Digital Software Distribution System

The relative successes of such companies create a competitive pressure for Steam as they either force the company to re-invent its products, or forces the company to consider reducing the price of its products, thereby [...]
  • Subjects: Internet
  • Pages: 7
  • Words: 2011

Internet Usability Importance

Internet usability refers to the design and positioning of a website for ease of interaction with the users. The branding of domain names also leads to enhanced internet usability.
  • Subjects: Programming
  • Pages: 2
  • Words: 757

How Computers Work: Components and Power

The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1077

E-Commerce System for a Clothing Company in Abu Dhabi

Consequently, the following is the work breakdown configuration: Work Breakdown Configuration for the Development and Implementation of the e-Commerce Application Project Preliminary Study/Survey Understanding the Apparel Market and its trends in marketing and selling Evaluation [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2836

Information Management Systems

It also discusses the importance of such systems in the context of the need to handle big data. For transaction processing system, the appropriateness of the dealings is overly dependent on the accurateness of the [...]
  • Subjects: Data
  • Pages: 8
  • Words: 2290

Cyber Security Technologies

The technology is regularly designed to alter the attack surface of a network, making it hard for attackers to access a system and reducing the susceptibilities and predictabilities available at any time.
  • Subjects: Other Technology
  • Pages: 18
  • Words: 5033

Internet Filtering Positives and Negatives

The issue of keeping of information by governments does not hold because as the government leaves the internet open to no filtering, it only protects the rights of a few individuals.
  • Subjects: Internet
  • Pages: 4
  • Words: 1042

Ephone v900 Mobile Telephone Advert

In the advert, the artist uses the element of space to illustrate the background thus indicating to the viewer the probable setting of the image.
  • Subjects: Phones
  • Pages: 2
  • Words: 570

Fire Safety in the Health Care System

Automatic fire alarm systems have either smoke or heat detectors that sense the presence of the smoke and heat respectively and sound the alarm to alert occupants to evacuate.
  • Subjects: Accidents & Protection
  • Pages: 7
  • Words: 1999

Cloud Computing Pros and Cons

In a computer system using cloud computing, the workload of running applications is shifted from the local computer to the cloud, which consists of network computers.
  • Subjects: Cloud Computing
  • Pages: 10
  • Words: 2752

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2279

Comparison Between two Operating Systems

Windows XP ensures that any free memory in the RAM is allocated to a certain process so as to help in improving the performance of the operating system.
  • Subjects: Computer Science
  • Pages: 19
  • Words: 5256

Internal and External Issues in the Airline Industry

The skills and training that the airline staff get is necessary to ensure security and effectiveness of the flight and thus make the operation and management of the airline easier. The preferences and the needs [...]
  • Subjects: Aviation
  • Pages: 11
  • Words: 3036

Assistive Technology Outcomes and Benefits

In addition, the improvement in technology has resulted in devices and equipments that can assist the disabled to access facilities and services that other people can access.
  • Subjects: Applications
  • Pages: 8
  • Words: 2336

Communication Technologies in Egypt

Significant technologies as developed with respect to two Egyptian revolutions, one in the year 1952 and the other in the year 2011 are discussed in line with the roles that these communication technologies played in [...]
  • Subjects: Phones
  • Pages: 12
  • Words: 3349

Brief History of the Boeing 787

The above information on the Boeing 787 is crucial as it has given the quest to explore the power behind the success of the aircraft in the market.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2207

Prezi vs. PowerPoint

In making presentations, the choice of presentation software to be used will be dictated by the amount of information the presenter wishes to pass to the audience, as well as the format of data the [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1702

IT Implementation Plan for Cloud Computing

Assessment of market requirements: Here, the service provider, the broker, and the organization must study the features of cloud computing to instill trust among them and on the new product.
  • Subjects: Cloud Computing
  • Pages: 4
  • Words: 1565

Nanotechnology Risk in NanoBatteries

4
When the nanobatteries are exposed to fire, the inhalation of the fumes may cause severe respiratory tracts inflammation in the upper region of the respiration systems, which can lead the damage of the lungs.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1524

Uninterruptable Power Supply (UPS) Systems

The equipment running under the UPS gets supply of power for several minutes before switching the power to an alternative or emergency power options such as batteries in case of electric failures.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1928

What Are the Causes of the Increased Lack of Internet Privacy?

Although every individual has the right to accuse the government and internet service providing companies over their failure to protect their customers' privacy, individuals should recognize, they have a crucial duty to play as far [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 712

The differences between e-readers and tablets

The spread of the innovative technologies pushes some people on the idea that books are going to disappear. First, the ancient books as the reminder of human history are going to remain.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 583

The Internet’s Advantages and Disadvantages

5
The resent and the most influential invention in the life of people is the creation of the Internet. Nowadays, the invention of the Internet allows people monitor the work of the departments abroad, run relationships [...]
  • Subjects: Internet
  • Pages: 4
  • Words: 1091

Accidents Comparison: UA Flight 232 and Baghdad DHL A300

The crew was able to land the plane without conventional control at the airport of Sioux City, but the right-wing of the airliner hit the runway, and the plane broken into several parts.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 557

Paper Administration Shift to Electronic Platforms

In comparison to the uncertainties and challenges of the 19th and 20th centuries, the goals of the people who live today, in the 21st century, are rather clear and definite.
  • Subjects: Technology Effect
  • Pages: 12
  • Words: 3324

Internet of Things Security in Smart Cities

Among the goals of hackers in attacks on the critical IoT of smart cities, there is the intentional organization of accidents or power outages, theft of personal information of users, interception of control of devices [...]
  • Subjects: Computer Security
  • Pages: 4
  • Words: 1130