Category: Tech & Engineering

  • The Mobile Game “Clash of Clans”

    Table of Contents Introduction History of mobile games Clash of Clans. The description of the game Reasons for the popularity of mobile games Dangers and disadvantages of mobiles games Conclusion Works Cited Introduction Over the last years, significant progress in the development of technologies was achieved, especially in mobile systems. Mobile systems and communication technologies…

  • Attilio Ievoli Accident and Human Errors

    Table of Contents Introduction Specification of the vessel and accident scenario How accident causation has changed over time from domino to Swiss-Cheese model Four levels of analysis in HFACS Lessons to be applied to navigation and safety management Conclusion Reference List Introduction Vessels running aground have occurred many times since the history of navigation. The…

  • Electrical Injuries and Fatalities

    Electrical injuries are believed to have started within the last two centuries; however, humans have been exposed to electrocution through lightening for a very long time. These injuries are not frequent but they pose devastating effects with high mortality and morbidity on human beings. Most of them occur at workplaces although most children are exposed…

  • Sherry Turkle’s “Can You Hear Me Now”

    Outline This is an argumentative essay in ‘They Say/ I Say’ evaluating the points raised by the sociologist Sherry Turkle in one of her essays named “Can You Hear Me Now”. The author observes how people are increasingly being dependant on technology and electronic equipment to stay connected with their colleagues, friends, and family. This…

  • Data Presentation and Visualization

    Table of Contents Redesign of Quantitative Data Report Visual Presentation of Data Data Presentation Visual Presentation of Data Versus Columns of Numbers Visualization Tool References Redesign of Quantitative Data Report A quantitative data report should be presented meaningfully using data analysis techniques. To effectively redesign the report and make it more useful, I would examine…

  • Blue Moon Financial Company’s Incident Response

    Table of Contents A plan for responding to the network intrusion incident Communication and Coordination Plan Determining Further Information about the Source of the Attack Handling Potential Evidence References A plan for responding to the network intrusion incident First steps after the attack are confirmed The initial step would be containment. The senior security analyst…

  • Operating Systems Used in Personal Digital Assistant (PDA)

    Operating system (OS) is a master program that controls the functioning of the computer hardware; it is an interface linking the user and the hardware. Normally, an operating system executes processes through application software. There are many categories of application software, including business software, education software, entertainment software, and utility software. Application software depends on…

  • Trustworthy and Trusted Computing Differences

    Table of Contents Introduction Discussion Conclusion References Introduction It is imperative to note that the safety of computer systems is a fascinating topic that is actively discussed by scholars. Many approaches have been developed over the years and currently, there is no consensus on which framework is the most reasonable. The problem is that most…

  • Informatics as an Approach and a Theory

    Table of Contents Informatics as a Multidisciplinary Approach Definitions of Informatics Informatics Approach Informatics as a Theory References Informatics as a Multidisciplinary Approach The multidisciplinary approach to informatics, in my view, relates to the fact that the domain of informatics as we know it today combines or involves a multiplicity of academic disciplines and professional…

  • The Role of Big Data Analytics

    Currently, there is a separate class of products on the market that provide a solution to the problem of processing big data. For example, there is a system designed to provide other applications with the necessary data at the right time. It is used to normalize, study, and distribute data for transactions, which result in…