Tech & Engineering Essay Examples and Topics. Page 6

4,315 samples

Artificial Intelligence and Gamification in Hiring

It is evident that the connection between the current scientific controversy and the work by Mary Shelley is expressed in a conflict between science and morality in the context of the desire to penetrate the [...]
  • Subjects: AI
  • Pages: 2
  • Words: 659

Recovery of Airbus A380 From Failure

The demise of the A380 can be linked to various issues, including a change in the market as well as reduced demand for the craft, that is regarded among the largest airplanes.
  • Subjects: Aviation
  • Pages: 8
  • Words: 2316

Human Performance and Technology in Education

In the article "Application of Performance Technology in Educational Technology," Yingying Sun asserts the attention and concern channeled towards the performance technology in the educational technology framework.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1214

Graph Analytics in the Aviation Industry

In response to this significance, several frameworks have been designed to deal with big numbers, given the availability of data and the complex agent interactions. Data extraction and analysis have been in the face of [...]
  • Subjects: Aviation
  • Pages: 10
  • Words: 2968

Space Science and Technology Development in the UAE

For this reason, the given study focuses on investigating the role of space science and technology development in the UAE and their contribution to the development of international relations.
  • Subjects: Technology Effect
  • Pages: 40
  • Words: 11835

The Solar Powered Flashlight and Its Advantages

Once fully charged, the solar powered flashlight will play an important role of ensuring one is able to navigate all the challenges that might arise at night.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 556

Technology in Education and Business

The best forms of inspiration incorporate the thoughts and feelings of the whole team and encourage them to try something new.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 913

Digital Forensic Analysis of Fitbit

The comparison of the results and the analyses of the data as a result of the research gave the authors of the article a conclusion in regards to the methodology that has evidence-based results in [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 878

The Hybrid Robot Vacuum Cleaners

The EUFY series of hybrid vacuum cleaners is one of the most popular choices in the market, and the company offers products in various pricing ranges. In the context of hybrid robot vacuum cleaners, market [...]
  • Subjects: Robotics
  • Pages: 10
  • Words: 2869

The Place of Humanity in the Robotic Future

The developers are trying to implement the brain, the human mind, in a digital environment. Paying attention to mechanical machines, commonly called "robots", can be seen that they are created in the image and likeness [...]
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 401

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 342

Technology in Nursing Education

Such students have the right to receive the same learning opportunities, which is why textbooks, in-person assistance, and in-print information provision are some of the measures that can be applied.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 567

Mounting Drives: Advantages and Disadvantages

Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 594

The General Data Protection Regulation

For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 817

Technological Impact on Aviation Security

It is the role of everyone in the aviation industry to find out the best way of using technology to help solve the challenge of aviation security.
  • Subjects: Aviation
  • Pages: 6
  • Words: 2019

EBay: Cloud Computing SAAS Model

Software-as-a-Service is a cloud computing model that suits eBay's needs outlined in the previous slide. As anyone can access the service without specialized hardware, software, or knowledge, it can be brought to a large audience [...]
  • Subjects: Cloud Computing
  • Pages: 3
  • Words: 617

The Benefits and Growth of IPv6

The current type is the most recent and most advanced internet protocol that can determine the location of the computer systems across a given network and routing.
  • Subjects: Internet
  • Pages: 1
  • Words: 303

Importance of Data Analysis

In order to determine the methods of mathematical and statistical processing, first of all, it is important to assess the nature of the distribution for all the parameters used.
  • Subjects: Data
  • Pages: 4
  • Words: 1118

Pros and Cons of Distance Education

On the one hand, modernization of education allows it to expand the usual boundaries of transmitting and receiving information in the educational process while retaining all the integral components.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 512

Cybersecurity Implementation Plan for PBI-FS

Therefore, the current plan will define the objectives, goals, and objectives, and scope of the implementation. The implementation of the cybersecurity management plan pursues both business and project goals and objectives.
  • Subjects: Cyber Security
  • Pages: 16
  • Words: 4430

Should the Internet Be Regulated?

The French government's attempts to control the internet were unsuccessful because of similar arguments and the failure and lack of jurisdiction.
  • Subjects: Internet
  • Pages: 2
  • Words: 661

Is the Internet Affecting People Negatively?

Opponents of the Internet tend to view and criticize it one-dimensionally as a source of mindless entertainment, whereas in reality, it is rich with potential uses that have their unique properties.
  • Subjects: Internet
  • Pages: 5
  • Words: 1306

Data Classification and Data Loss Prevention

The security program managers are provided with the information about the process while the senior security manager is responsible for execution of the process.
  • Subjects: Data
  • Pages: 2
  • Words: 685

Protecting Digital Assets Overseas for U.S. Companies

The question of how U.S.companies can protect their digital assets can be answered by examining available protection frameworks and how to take advantage of them The U.S.government offers cybersecurity for its companies both domestically and [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 573

Cybersecurity Threats to Educational Institutions

The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 3136

Digital Self-Harm: Causes and Interventions

Instead of direct or indirect harm to the body, this type of self-harm focuses on emotional harm and reflects the state of one's mental health.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2258

Computer Network: Data Flow and Protocol Layering

The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791

Propeller-Driven Performance vs. Jet-Driven Performance

Propeller-driven aircraft is more efficacious at low speeds than jet-driven aircraft, for they create higher propulsive efficiency and, consequently, greater thrust while the craft is moving at lower airspeed; however, jet-driven aircraft experience the deficiency [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 655

Process Virtualization Theory Overview

Therefore, the author found it appropriate to address the theoretical underpinning of IT in virtualization processes to account for the gap in the field.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1420

Aviation Industry: New Technologies

The reason behind this is due to the fact that the researcher believes that as a student attempting to attain a Bachelor of Science in Aeronautics with a Minor in Safety and Human Factors his [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1928

The Aviation Industry in France

The amalgamation of five private airlines in the year 1933 led to the formation of Air France, the national airline. In the early nineties, the airline was in the brinks of collapse due to heavy [...]
  • Subjects: Aviation
  • Pages: 6
  • Words: 1908

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1686

Nikola Tesla’s Inventions and Achievements

It is interesting to discuss that Tesla's AC system led to the event in the history of the scientific and commercial world called the war of the currents.
  • Subjects: Engineering
  • Pages: 7
  • Words: 1977

Hackers: The History of Kevin Mitnick

The trial that took place in the year 1999 contained his confession to some of the presented crimes and the sentence was administered in a form of a plea bargain, where he received three years [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 657

Cisco Packet Tracer: A Simulation Tool

The administration usage of the computers is represented by A. 255 as the address range of F Administration = 176.16.1.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 1326

College’s Database Purpose and Entities

The main purpose of a database is to collect and organize data. Also, it helps the college to keep track of students' activities and interests, and, thus, shows what is better for them and what [...]
  • Subjects: Data
  • Pages: 2
  • Words: 672

IBM SPSS Software Analysis

IBM SPSS is one of the statistical packages used for analyzing and interpreting data. Validity has two distinct sections namely the research section and the degree to which a test measures some data.
  • Subjects: Programming
  • Pages: 2
  • Words: 568

Materials Comparison About Packaging

Although the forests are cut down to manufacture paper-based containers, they are recyclable, and compared to wood, paper's recycling rate is the highest among recyclable materials, so it is more friendly to the environment than [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1124

Computers’ Critical Role in Modern Life

The manner in which the military operates in the modern world has completely been influenced and revolutionized by the use of computers.
  • Subjects: Technology Effect
  • Pages: 10
  • Words: 2909

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 598

Computers: The History of Invention and Development

It is treated as a reliable machine able to process and store a large amount of data and help out in any situation."The storage, retrieval, and use of information are more important than ever" since [...]
  • Subjects: Computer Science
  • Pages: 6
  • Words: 1660

Multimedia Navigation and Usability

The user-centered design principle is to involve the end-users in the design decision process of a particular product. The use of words or pictures in relating a story is said to be infographics.
  • Subjects: Programming
  • Pages: 2
  • Words: 596

Computer Security: Bell-Lapadula & Biba Models

Cybersecurity policies require the formulation and implementation of security access control models like the Bell-LaPadula and the Biba, to successfully ensure availability, integrity, and confidentiality of information flows via network access.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 882

Internet and Ethical Challenges

The Internet began in 1969 as an experiment of the United States Defence Department that resulted in the Advanced Research Projects Agency Network. In 1993, the number of internet users increased dramatically to get the [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2322

Introduction to Database Management System

Among all the Address Spaces it has, the first address space is called Database Service Address Space that provides the database capability to manipulate the DB2 data structures.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1755

Use and Benefit of Computer Analysis

The introduction of computers, therefore, has improved the level of service delivery and thus enhances convenience and comfort. Another benefit accruing from the introduction of computers is the ability of the world to manage networks [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 550

The Internet: Introduction to Networking

With the increase in the availability of good and affordable bandwidth, the Internet has become a valuable tool for many people to create a network of friends that is spread across the globe and across [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1498

Geographic Information Systems and Remote Sensing

Use of telescope to look at objects many miles away is an example of remote sensing. Electromagnetic Radiation is usually used to carry data and information in remote sensing.
  • Subjects: Applications
  • Pages: 5
  • Words: 1152

How the Internet Has Affected Amazon.com

Looking at its location, and with a wide range of products it deals with, coupled with a high demand for its products in the world market, we have to appreciate the role played by the [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 514

Electricity Hazards for Human Body

The main points of this article are to offer the reader with an awareness of the generally dangers of electricity, and to provide some insight into the physiological effects of electrical shock on the human [...]
  • Subjects: Accidents & Protection
  • Pages: 6
  • Words: 1641

Home Networks, Their Functions and Features

A home network is a small local area network that enables communication among two or more computing devices within a limited area of a home. Typical elements of a home network are a modem, a [...]
  • Subjects: Computer Science
  • Pages: 18
  • Words: 552

Full Surface Fuel Fire at an Oil Refinery

It is important to establish the drainage of water from the fire and the removal of toxic substances to ensure the safety of the firefighting crew.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 941

Artificial Intelligence Managing Human Life

Although the above examples explain how humans can use AI to perform a wide range of tasks, it is necessary for stakeholders to control and manage the replication of human intelligence.
  • Subjects: AI
  • Pages: 3
  • Words: 835

Pressure Drop and Full Models in Filtration Technology

Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
  • Subjects: Engineering
  • Pages: 9
  • Words: 2599

Computer Hardware Components and Functions

Hardware is the physical components of a computer, while the software is a collection of programs and related data to perform the computers desired function.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 251

Technology in Society, Healthcare and Education

However, the research on this topic is extensive and shows the impact of technology to be a positive one. Further research on this and other topics should be considered due to the widespread presence of [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1061

Environmental Effects of Cell Phones on Society

The amount of EMF generated, measured in watts per meter square, by cell phones is in the range of 0. Many of these materials such as lead, nickel, mercury, and the chemicals are toxic.
  • Subjects: Phones
  • Pages: 9
  • Words: 2563

Guitar Construction: Acoustical Features

It is at the front part of the guitar, and it is the most critical part of the instrument, because the back part and the sides of the guitar reflects the sound back to the [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 891

3D Printing: Pros and Cons

The authors compare the quick advancement and loss in the price of 3D printers with the rise of the personal computers.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 928

Strategic Airline Alliances: Present and Future

Because of globalisation and the heightened competition, the airlines of the current world regard the essence of joining strategic alliances as crucial for bolstering their competitiveness.
  • Subjects: Aviation
  • Pages: 15
  • Words: 4167

Technology for Learning: Digital Students

The technology they are exposed to include the daily use of computers in their studies, and daily use of the internet and mobile phones.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 824

American Airlines 1420: Accident Overview

Because of the thunderstorm and heavy rain on the way, the pilot did not manage to land the plane safely, and it crashed after the overrunning the end of the runway.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 1385

Making a PowerPoint Presentation

Tim Washer, attempts to highlight some of the issues that affect the effectiveness of a PowerPoint presentation and how one can solve these issues. In addition, Washer suggests that developing a story relevant to the [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 572

Accidents and Ramp Damage – Aviation

In order to prevent substantial expenses described afore, it is undoubtedly worthwhile for airlines and aviation companies to invest in ground operations safety and train all the staff working in the ramp and gate areas.
  • Subjects: Aviation
  • Pages: 2
  • Words: 560

Technological Advances in US

The United State is the country that made the most significant technological contributions in the 20th century. The US underwent significant changes in the postwar period of 1946 to 1960.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 574

Computer’s Memory Management

Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.
  • Subjects: Computer Science
  • Pages: 20
  • Words: 5417

Jet Engine in the Air Transport Industry

The purpose of this essay is to evaluate the impacts of the jet engine development on the air transport industry. The following is a discussion of some of the implications that the jet engine brought [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 1978

Using Smartphones in Learning

The other purpose of the study is to understand the recent developments that have been made to the smartphones and how people are able to adopt the changes.
  • 4.3
  • Subjects: Technology in Education
  • Pages: 22
  • Words: 6084

Computer Technology in the Last 100 Years of Human History

These communication tools are based on computer technology, and are the foundation of younger generations' living. Computer technology is detrimental to the lives of younger generations because it fails.
  • 5
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1113

Mobile Applications in Learning

Mobile applications take into consideration the capabilities of the target devices and the information is therefore presented in a manner that is appropriate for the diverse mobile devices.
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1415

Discouraging and Eliminating Cyber Bullying

Resources Role of the resource/input Statement forms To facilitate information transfer to the staff Counseling Personnel To arm students against the problem Bullying report system To create efficient internet enhance report system Regulation implementation documents [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 591

Computers and Information Gathering

On the other hand, it would be correct to say that application of computers in gathering information has led to negative impacts in firms.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 617

The Advantages and Disadvantages of PMA

The difference between the licensed and independent PMA is in the character of the cooperation between the companies and the features of producing the PMA parts.
  • Subjects: Aviation
  • Pages: 2
  • Words: 553

The Educational Promise of Social Media

The use of social media can only be useful if the students or children are closely watched and guided on how to make use of it for positive development.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 588

In-room Technologies Used in the Hotel Rooms

It also looks into how the technological advances all over the globe affect the hotel industry and how the industry is prepared to adopt the in-room technologies which are used inside the hotel rooms specifically [...]
  • Subjects: Applications
  • Pages: 15
  • Words: 4111

Concepts of HP Laptops

The quality of HP laptops is not a selfish guarantee of aggressiveness in the market, but rather market protectionism and increased sales.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 665

Personal Digital Assistant Failure

The power of the processor, the lifespan of the battery and the memory that was required to enhance the PDA performance were not well developed.
  • Subjects: Phones
  • Pages: 4
  • Words: 1141

Mobile Computing and Its Future Scope

Mobile communication, mobile hardware and software are the main concepts in mobile computing. The objective of mobile computing is to be able to work from anywhere.
  • 4
  • Subjects: Phones
  • Pages: 9
  • Words: 1347

Technology Development In Asia

The science and technology in the Republic of India, for example, has employed advanced technologies in the manufacture of commercial vehicles.
  • Subjects: Engineering
  • Pages: 6
  • Words: 1619

Different Types of Cement

The other types of cement include the blended and the hydraulic cement. Type one and Type one-A constitute of the Portland cement used for most of the basic construction.
  • 5
  • Subjects: Engineering
  • Pages: 3
  • Words: 853

Apple MacBook Pro

The development of Apple MacBook Pro can be seen as a great milestone in computer technology and specifically for the MacBook family and MacBook Pro line.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 792

Improper Internet Use at Work

However, every company has written or unwritten policy for the use of internet and the employees must ensure that they: Comply with the policy Use internet in an acceptable way Do not create unnecessary risk [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1418

Technology and Negative Effects

The unfortunate part is that people do not pay attention to the growing concern and continue using the social networks. All of this is impossible to see and feel over the internet or texting.
  • 1.5
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1442

Digital Technology in Modern Society

From the above analysis, it is more evident that digital technology has a wide range of effects to our culture and to the young generation.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1091

Benefits of the Internet

One of the uniqueness of using internet to communicate is that, there are no barriers, as people can connect easily at any place and all the time.
  • Subjects: Internet
  • Pages: 4
  • Words: 1123

Machinery and Modern Industry

The main thrust of the essay though was not to point out how effective machines are in increasing the means of production, rather, it was the intention of Marx to reveal how the use of [...]
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1737

Theranos: Incapable Technology

The CEO promised to use a cartridge-based medical machine to run blood tests and immediately send the results to the lab for interpretation. Holmes and Sunny constantly lied about the success of Theranos technology to [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2229

Machine Learning in Medical Imaging

Therefore, the clarification of the basic processes of the different topics of medical imaging, including X-rays, MRIs, and CT scans, will provide context for our investigation of machine learning in the next section.
  • Subjects: AI
  • Pages: 5
  • Words: 1250

The Need for Physical Security in the Modern World

The adoption and integration of Internet of Things and Industrial Internet of Things devices have produced a network of Cyber-Physical Systems that is more interconnected than before, increasing the attack surface and hiding features of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1183

The Histogram Concept Definition and Examples

For example, through the creation of a histogram with the frequency of purchases and the class interval of age that shows the range of age groups in comparison with the number of purchases, marketers receive [...]
  • Subjects: Data
  • Pages: 2
  • Words: 596