Computer Science Essay Examples and Topics

501 samples

Life Without Computers Essay

3.8
One of the major contributions of the computer technology in the world has been the enhancement of the quality of communication.
  • Pages: 2
  • Words: 590
We will write a custom essay specifically for you
for only 11.00 9.35/page
808 certified writers online
Learn More

Are We Too Dependent on Computers?

The duration taken to restore the machine varies depending on the cause of the breakdown, expertise of the repairing engineer and the resources needed to restore the machine.
  • Pages: 6
  • Words: 1630

Order Processing System Design and Implementation

The system analysis, development, and implementation phases reflect a framework that the system analyst used to design the order processing system that could be implemented to solve various problems related to the existing system.
  • Pages: 12
  • Words: 2841

How to Build a Computer?

Preparation and Materials In order to build a personal computer, it is necessary to choose the performance that you want by considering the aspects such as the desired processor speed, the memory, and storage capacity. [...]
  • Pages: 4
  • Words: 1114
Looking for 100% original essay? Let`s see if we can help you!
Get your first paper with 15% OFF
Learn More

Dependency on Computers

For example, even the author of this paper is not only using the computer to type the essay but they are also relying on the grammar checker to correct any grammatical errors in the paper. [...]
  • Pages: 5
  • Words: 1411

Computer Technology: Evolution and Developments

The development of computer technology is characterized by the change in the technology used in building the devices. The semiconductors in the computers were improved to increase the scale of operation with the development of [...]
  • Pages: 3
  • Words: 955

Microsoft Information System

5
The validity and reliability of the data is also analyzed by a variety of tools and techniques feeded in the system just to enhance total quality management and other related knowledge.
  • Pages: 11
  • Words: 3007

Microcomputer Components and Functions

The development of microcomputers began in the 1970s with the conception of the Intel 4004 microprocessor in 1971. The processor is the brain of the microcomputer.
  • Pages: 5
  • Words: 1121

Opera Fidelio Property Management System

The name of the company was changed to Micros Systems in 1978. The vision of Micros is to be "the world-leading IT company in the hospitality and retail sectors".
  • Pages: 8
  • Words: 2247
1 hour!
We'll deliver
a
100% original paper
this fast
Learn More

Introduction to Human-Computer Interaction

It is a scope of study that explores how individuals view and ponder about computer related technologies, and also investigates both the human restrictions and the features that advance usability of computer structures.
  • Pages: 4
  • Words: 1148

Computers vs. Humans: What Can They Do?

The differences between a human being and a computer can be partly explained by looking at their reaction to an external stimulus. To demonstrate this point, one can refer to chess computers that can assess [...]
  • Pages: 4
  • Words: 540

Challenges of Computer Technology

Computer Technologies and Geology In fact, computer technologies are closely connected to any sphere of life, and it is not surprisingly that geology has a kind of dependence from the development of computers and innovative [...]
  • Pages: 6
  • Words: 1673

Computer’s Memory Management

Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.
  • Pages: 20
  • Words: 5417
We will write a custom essay specifically for you
for only 11.00 9.35/page
808 certified writers online
Learn More

Processor Intel Core i5 and Its Features

The second stage is instruction decode, where instructions are decoded, and file register retrieved to acquire the register values used in the instructions. ALU operations, branch resolution, memory address calculation, and CSR read/write are done [...]
  • Pages: 4
  • Words: 1177

Computer Hardware: Past, Present, and Future

Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.
  • Pages: 4
  • Words: 1123

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Pages: 1
  • Words: 342

IT on Everyday Life

Many people have become too dependent on IT as a means of life, and this has made IT a major human need in many areas of the world.
  • Pages: 4
  • Words: 1165
Looking for 100% original essay? Let`s see if we can help you!
Get your first paper with 15% OFF
Learn More

Linux, the Operating System of Choice

A recent trend in the field of software is the open source genre, and it can rightly be said that the Linux operating system has become the embodiment of this genre.
  • Pages: 12
  • Words: 3421

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Pages: 36
  • Words: 2834
1 hour!
We'll deliver
a
100% original paper
this fast
Learn More

Comparison Between two Operating Systems

Windows XP ensures that any free memory in the RAM is allocated to a certain process so as to help in improving the performance of the operating system.
  • Pages: 19
  • Words: 5256

Windows XP Operating System’s Installation Process

The windows XP installation will continue without interference since you are installing from a full version windows XP CD. The installation will restart the computer and this time it will take you back into the [...]
  • Pages: 2
  • Words: 522

Network Administration and Its Importance

5
The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
  • Pages: 5
  • Words: 1413

Computer Network Types and Classification

For a computer to be functional it must meet three basic requirements, which are it must provide services, communications and most of all a connection whether wireless or physical.the connection is generally the hardware in [...]
  • Pages: 2
  • Words: 604

How Computer Works?

In order for a computer to function, stuff such as data or programs have to be put through the necessary hardware, where they would be processed to produce the required output.
  • Pages: 10
  • Words: 891
We will write a custom essay specifically for you
for only 11.00 9.35/page
808 certified writers online
Learn More

Video Game Effects: Good or Bad?

Given the fact that there is indeed a logically sound rationale to such a suggestion, throughout the course of conducting my study, I remained thoroughly observant of the article's classification-related suggestions, in regards to the [...]
  • Pages: 4
  • Words: 1290

Mounting Drives: Advantages and Disadvantages

Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
  • Pages: 2
  • Words: 594

Small Billing Business Network Design

This proposal is about the design of a network for a small billing business. After a thorough discussion with the small billing business the following needs were identified: Workstations: 2 pieces A quality printer: 1 [...]
  • Pages: 5
  • Words: 975
Looking for 100% original essay? Let`s see if we can help you!
Get your first paper with 15% OFF
Learn More

Microsoft Office Applications

When I was introduced to the internet, I learned to use the search bar, the chat, the email facility and the facility to play a video or watch a movie.
  • Pages: 3
  • Words: 900

Computer Laboratory Staff and Their Work

This will depend on the discretion of the staff to look into it that the rules that have been set in the system are followed dully. This is the work of the staff in this [...]
  • Pages: 5
  • Words: 1531

Global Information Systems (GIS)

Information on the country in which the organization operates is relevant to the organization because it provides the relevant information regarding the existing business opportunities in the country and the possibility of their exploitation.
  • Pages: 8
  • Words: 2773

Ethical and Illegal Computer Hacking

For the ethical hackers, they pursue hacking in order to identify the unexploited areas or determine weaknesses in systems in order to fix them.
  • Pages: 2
  • Words: 557

DELL and HP Machines Comparison

The two brands are known to produce good quality machines, and consumers prefer these models over the rest of the models in the markets.
  • Pages: 2
  • Words: 598
1 hour!
We'll deliver
a
100% original paper
this fast
Learn More

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Pages: 11
  • Words: 2967

AutoCAD in Different Fields of Design Technology Study

In the engineering technology, CAD is overwhelmingly used from the conceptual layout and design, through a comprehensive engineering and analysis of constituents, to the definition of the various manufacturing methods used.
  • Pages: 11
  • Words: 3092
We will write a custom essay specifically for you
for only 11.00 9.35/page
808 certified writers online
Learn More

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Pages: 3
  • Words: 919

Building a PC, Computer Structure

The choices available are Western Digital 320GB and Seagate 320GB and my advice would be to go for Western Digital as it is a good performer all along.
  • Pages: 2
  • Words: 910

Software Architecture and Its Styles in Examples

The purpose of software architecture is to solve issues and design problems beyond the basic algorithms and data structures used in software instead of focusing on structural phenomena.
  • Pages: 4
  • Words: 1244
Looking for 100% original essay? Let`s see if we can help you!
Get your first paper with 15% OFF
Learn More

Google Chrome SWOT Analysis

Chrome is well poised to remain the number one choice for web users because it is available in both desktop and mobile platforms.
  • Pages: 3
  • Words: 948

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Pages: 8
  • Words: 2279

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Pages: 18
  • Words: 4954

Information Retrieval Methods

4
The search mechanism is the system that allows for the searching of the database for the retrieval of the information stored in it.
  • Pages: 10
  • Words: 2493
1 hour!
We'll deliver
a
100% original paper
this fast
Learn More

Recording Studio Equipment: Hardware and Software

The purpose of this report is to present the information on the necessary equipment to purchase; the justification of the equipment choices; the discussion of the equipment connectivity and the diagram; and the budget table [...]
  • Pages: 5
  • Words: 1500

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Pages: 6
  • Words: 1864
We will write a custom essay specifically for you
for only 11.00 9.35/page
808 certified writers online
Learn More

Pipeline Hazards in Computer Architecture

Therefore, branch instructions are the primary reasons for these types of pipeline hazards to emerge. In conclusion, it is important to be able to distinguish between different pipeline types and their hazards in order to [...]
  • Pages: 1
  • Words: 306

Aspects of Laptop Rental Service

Upon return of the product, the computer will be evaluated, and the student will be billed fully for the full time the product was rented. Therefore, students attending the university will be the target market [...]
  • Pages: 11
  • Words: 3052

What Is a Flash Drive

This is not found in the other mentioned drives and hence when storing information it would be easy to know the size of free space left.
  • Pages: 2
  • Words: 765

Microsoft Tips and Tricks

For instance the first tip highlights the usefulness of the control key to Microsoft Office Outlook. However, lessons drawn from the article can be applied to the latest versions of Microsoft office.
  • Pages: 2
  • Words: 557
Looking for 100% original essay? Let`s see if we can help you!
Get your first paper with 15% OFF
Learn More

Unified Modeling Language (UML)

UML was created to be used in modeling of software intensive systems by use of diagrammatic models making it easy to introduce more objects to an existing project.
  • Pages: 2
  • Words: 616

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Pages: 4
  • Words: 1445

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]
  • Pages: 2
  • Words: 575
1 hour!
We'll deliver
a
100% original paper
this fast
Learn More

Computers and Information Gathering

On the other hand, it would be correct to say that application of computers in gathering information has led to negative impacts in firms.
  • Pages: 2
  • Words: 617

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Pages: 4
  • Words: 1233

How Computers Negatively Affect Student Growth

Accessibility and suitability: most of the school and student do not have computers that imply that they cannot use computer programs for learning, lack of availability of internet facilities' availability also makes the students lack [...]
  • Pages: 2
  • Words: 611
We will write a custom essay specifically for you
for only 11.00 9.35/page
808 certified writers online
Learn More

Bill Gates’ Contributions to Computer Technology

Upon examination of articles written about Gates and quotations from Gates recounting his early childhood, several events stand out in significance as key to depicting the future potential of Gates to transform the world with [...]
  • Pages: 2
  • Words: 1306

Nintendo Wii as an Innovative Product

The paper aims at analyzing the case and answering the questions regarding the nature of the innovation, aspects of the value proposition, and details of the used business model.
  • Pages: 4
  • Words: 879

How Computers Work: Components and Power

The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.
  • Pages: 4
  • Words: 1077
Looking for 100% original essay? Let`s see if we can help you!
Get your first paper with 15% OFF
Learn More

Prezi vs. PowerPoint

In making presentations, the choice of presentation software to be used will be dictated by the amount of information the presenter wishes to pass to the audience, as well as the format of data the [...]
  • Pages: 6
  • Words: 1702
1 hour!
We'll deliver
a
100% original paper
this fast
Learn More

Security in the Information Communication Technology

These include adapting the users to the system and getting the involvement of users through soliciting their input on ways of advancing the system. The corporate governance of the information security ought to begin from [...]
  • Pages: 12
  • Words: 3185
We will write a custom essay specifically for you
for only 11.00 9.35/page
808 certified writers online
Learn More

Lighting Techniques in 3D Animation

In distinction with 2D animation where every frame should be painstakingly painted and filled in with the required tints, lights, and shadows, lighting in 3D animation is performed by pointing the source of light, while [...]
  • Pages: 4
  • Words: 1122

Reverse Engineering for Software Maintenance

To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences.
  • Pages: 14
  • Words: 4361
Looking for 100% original essay? Let`s see if we can help you!
Get your first paper with 15% OFF
Learn More

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Pages: 5
  • Words: 1686

Computers: The History of Invention and Development

It is treated as a reliable machine able to process and store a large amount of data and help out in any situation."The storage, retrieval, and use of information are more important than ever" since [...]
  • Pages: 6
  • Words: 1660
1 hour!
We'll deliver
a
100% original paper
this fast
Learn More

Computer System Electronic Components

The Random Access Memory commonly referred to as RAM is another fundamental component in a computer system that is responsible for storing files and information temporarily when the computer is running. The other storage component [...]
  • Pages: 2
  • Words: 526

Preparing a Computer Forensics Investigation Plan

However, if the information is thought to be contained in the permanent storage, then a computer has to be shut down before transporting it to a laboratory for forensic analysis. The first step in the [...]
  • Pages: 3
  • Words: 858

Computer Reservations System in Hotel

That is why, it is obvious that blistering development of systems of this sort became possible due to the evolution of means of communication and discoveries in the field of digital technologies.
  • Pages: 5
  • Words: 1316
We will write a custom essay specifically for you
for only 11.00 9.35/page
808 certified writers online
Learn More

Hacking: Positive and Negative Perception

The possible advantage of cooperating with hackers for security systems mangers of international organizations and governmental organizations is the probability to recruit them and use their knowledge to empower different organizations to improve their security [...]
  • Pages: 3
  • Words: 538

The Role of Intranet in Health and Human Services Organization

Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. Individuals ought to be empowered to control the collection, use, and distribution [...]
  • Pages: 4
  • Words: 982

Digital Certificate Management

The paper focuses on the process of issuing and managing digital certificates, discussing the weaknesses and vulnerabilities of different methods and the issues with revoking certificates, and possible remedies.
  • Pages: 4
  • Words: 1223

Researching of Ubuntu Operating System (OS)

The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
  • Pages: 7
  • Words: 2048
Looking for 100% original essay? Let`s see if we can help you!
Get your first paper with 15% OFF
Learn More

Balancing Hardware Needs and Budget

Activities that require a computer in my life include: Communicating with others through email and messaging apps Researching and gathering information online Writing papers and documents Creating and editing presentations Managing my schedule and to-do [...]
  • Pages: 1
  • Words: 286

How to Build a Gaming Computer

The first step to creating a custom build for a PC is making a list of all the necessary components. This explanation of how to build a custom gaming computer demonstrates that the process is [...]
  • Pages: 2
  • Words: 604

Linked Lists as a Data Structure

The linked list begins with a HEAD, which designates the beginning or the location in memory of the first node. The pointer to the list's first node is found in the circular linked list's last [...]
  • Pages: 2
  • Words: 591
1 hour!
We'll deliver
a
100% original paper
this fast
Learn More

The TCP-IP (Communication) Ports and Protocols

For each of the TCP / IP protocols, the standard defines the possibility of simultaneously allocating many unique ports on the host, identified by numbers. In this case, an attacker can imitate one of the [...]
  • Pages: 1
  • Words: 384

Microsoft Access Database and Microsoft Excel

The significant difference between Access and Excel is that Excel is a spreadsheet used for calculations and data representation, while Access database stores data for reference. On the other hand, Microsoft Access Database is a [...]
  • Pages: 1
  • Words: 349
Research Title Generator
We’ll help you brainstorm great title ideas for your essay, research or speech in no time!
Research Question Generator
Get a list of ideas for your essay or term paper. We’ve prepared the best research question generator.
Title Page
Generator
Craft a paper title page with just a couple of clicks. Get it in APA, MLA, Chicago, or Harvard without any effort