Home > Free Essays > Tech & Engineering

Tech & Engineering Essay Examples and Topics

Cybersecurity and Vital Elements

The focus of any risk management effort is a standard system or a framework that help organizations and individuals to manage integrity, confidentiality, and data and ensure critical resources availability.

Network Security for Mobile Devices

The main concerns of security are maintaining the functionality of the network environment, securing privacy, and providing the integrity of confidential information.

Computer Viruses, Their Types and Prevention

A memory-resident virus is one of the most resilient types of viruses out there since it resides in the RAM of the computer and comes out of stasis every time the computer's OS is activated.

Nintendo Game Innovation: Wii’s Principles

In this case, it has to be mentioned that Sony's PlayStation was paying substantial attention to the quality of the image, sound, and speed of the processor to build a perception of one of the [...]

Virtual Reality Technology in Referee Training

Referees need to experience the practical nature of the profession during the training process, and the VR technology will eliminate the underlying challenges to the development of experience in the profession.

Digital Citizenship Definition and Problems

In this connection, the paper is devoted to the proposal of the digital citizenship necessity and its safe implementation including such integral aspects as digital literacy, etiquette, tolerance to other digital citizens, appropriate referencing, and [...]

Cyber Attack: “Guardians of Peace”

In the next month, GOP threatened the company and urged it to cancel the release of the film "The Interview". Sony accepted the demand and did not let the film run on the cinema screens [...]

Graphic Card Industry and Evolution

A graphic card, usually, referred to as a video card or a graphic accelerator card is an electronic circuit installed on the motherboard inside the central power unit, mostly on Laptops and desktop computers.

Students’ Mobile Learning in Higher Education

The current concept of m-tools as the household strategy for implementing the teaching and learning process is flawed to a significant extent due to the lack of guidance and support from the tutor that it [...]

Tablets Instead of Textbooks

The emergence of tablets is one of the recent inventions in the field of education and it is clear that it is soon replacing textbooks. What are the benefits of using tablets in learning institutions?

The Big Data Definition

It can be used in any field that requires operations with the big data sets, including the fact that there is a possibility of utilizing the Big Data techniques for the purposes of resolving various [...]

Embedded Intelligence: Evolution and Future

The importance of mobility in the current business context has motivated the use of embedded technology to design systems. It is used in the management of energy systems such as production, distribution, and optimization.

Problems of the Software Piracy

This paper examines the modes of software piracy, the reasons behind it, who are the offenders, the cost of such actions, and how and who to control them.

Incident Command Models in the US, the UK, Qatar

The current paper will consider the basic features and the structure of the three incident command models or systems: the National Incident Management System, the Joint Decision Making Model, and The National Command Centre.

Life Without Computers

One of the major contributions of the computer technology in the world has been the enhancement of the quality of communication.

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.

Advantages of Fresnel Lenses

A Fresnel lens possesses a large aperture and a short focal length, which allows it to capture and focus more from a light source than a conventional lens, and project it over vast distances while [...]

Max Bögl Company’s Procurement Management

The list of the identified risks is provided in the following table where each risk factor is rated on a five-point scale according to the likelihood of its occurrence and potential impact on the project [...]

The Impact of Technological Change on Business

While it is obvious that effective and diverse means of communication have been at the disposal of entrepreneurs for more than a century now, it is undeniable that the development of the informational technology, especially [...]

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]

A South Korean Copy of Snapchat

Snow has become popular because it is focused on the Asian market and, in fact, it introduced Asia-specific features earlier than Snapchat managed to develop them and offer local-language versions of the app.

Rügen Bridge: Plan Procurement Management

During this time, the company in charge of the project had not only built a bridge, the core part of which is 4100 meters long, but also contracted other businesses to prepare the surface, smooth [...]

Digital Transformation: Hyper-Connectedness and Collaboration

The guiding principles for E2E economy formulated by the authors include the ability of organizations to provide optimal customer experiences through the right partnerships, capacity to use contextual and predictive analytics to generate customer value, [...]

The Cultural Impact of Technology

In a third paragraph, the author argues that such things are not regarded as technological innovations now, and the term "technology" is limited to the description of new electronic devices and digital services which have [...]

Cultural Impact of Technology

In the present-day world, the technological advances entailed a significant transformation in the mode of life, and it is possible to say that the new stage of social development is provoked by the growth of [...]

“The Dark Side of Big Data” by Tom Goodwin

The rise of social media and the improvements in data aggregation led to the collection of large quantities of user-generated data, and it was only a matter of time until businesses started using this data [...]

Cultural Impact of Technology on Life

Indeed, much to the credit of the authors and the participants of the conversation, there is a strong tendency for people to view technology as a thing in itself.

E-Books: An Interactive Technology Tool

Since the topic of the lesson is "Domestic Animals," an e-book can provide meaningful and engaging opportunities for the young learners to develop their phonemic awareness and reading skills.

Ice Machines, Their History and Types

According to experts, one of the things one should consider when buying an ice machine is the type of ice it produces and its suitability to the immediate needs. The other common type of ice [...]

Online Media Publishing Options and Applications

The existing media world provides numerous options for the end-users to reach and scrutinize the information of interest. For the most part, CMS is intended to create a collaborative environment and allow the end-users to [...]

A New Weapon Used Against Youth

One of the most difficult issues connected to youth culture is their lack of consciousness when it comes to the use of modern means of communication and other things that were invented to promote knowledge [...]

3D Printing: Pros and Cons

The authors compare the quick advancement and loss in the price of 3D printers with the rise of the personal computers.

Using Cohesive Devices during the Course of Lectures

While the research objectives are relevant and the answers to questions put by Ali would benefit the investigation of discourse, the author's article incorporates a number of limitations connected with the flow of research as [...]

Video Games and Learning

The paper will also analyze the features of good educational video games and the types of skills that can be developed by the new approach to learning.

Web Application Attack Scenario

The simplest example of the application of SQL injections is a situation when the query asks the database to pull the username and password from the database rows.

Microscopic Traffic SIMmulator Model

Unfortunately, these models are not suitable for ITS applications and large-scale traffic networks. With new ITS developments, incident management, mainline traffic control, and real-time route guidance become possible for traffic management systems.

Attilio Ievoli Accident and Human Errors

The aim of this report is to present actual finding on the probable cause of the accident in which the 4,450 chemical tanker to run aground just some few moments after the change of guard [...]

Time Travel’s Definition

The purpose of this paper is to investigate the domain of time travel and to provide evidence that traveling to the future is more likely than to the past if the necessary conditions have been [...]

Information Security Implementation in Healthcare

Consequently, if the policy is endorsed, it means that the administration fully supports it; if the policy is relevant, it means that the policy can be applied at an organizational level; if the policy is [...]

Wireless Networks’ Historical Development

The paper concludes by describing the implications of wireless networks for different emergency agencies and the police. The history of wireless networks is "founded on the development of the first wireless telegraph".

Airlines’ Practical Guidelines in Procurement Process

This paper examines how airlines can maximize the usefulness of practical guidelines that can be used to implement a performance-based contracting approach in their procurement process and the value the aviation industry will acquire in [...]

Heinrich’s Domino Safety Theory

In other cases, some employers tend to ignore the safety needs of their employees by providing unsafe working conditions, which eventually contribute to accidents within the workplace.

Electronic Nature of Information Systems

They can be used to spread malicious files even without the knowledge of the sender. These are the most common types of malicious software that is used to attack information networks.