Computer Science Essay Examples and Topics

399 samples

Life Without Computers Essay

One of the major contributions of the computer technology in the world has been the enhancement of the quality of communication.
  • 3.2
  • Pages: 2
  • Words: 590

Microsoft Information System

The validity and reliability of the data is also analyzed by a variety of tools and techniques feeded in the system just to enhance total quality management and other related knowledge.
  • 5
  • Pages: 11
  • Words: 3007

Computer Technology: Evolution and Developments

The development of computer technology is characterized by the change in the technology used in building the devices. The semiconductors in the computers were improved to increase the scale of operation with the development of [...]
  • Pages: 3
  • Words: 955

Opera Fidelio Property Management System

The name of the company was changed to Micros Systems in 1978. The vision of Micros is to be "the world-leading IT company in the hospitality and retail sectors".
  • Pages: 8
  • Words: 2247

Are We Too Dependent on Computers?

The duration taken to restore the machine varies depending on the cause of the breakdown, expertise of the repairing engineer and the resources needed to restore the machine.
  • Pages: 6
  • Words: 1630

Order Processing System Design and Implementation

The system analysis, development, and implementation phases reflect a framework that the system analyst used to design the order processing system that could be implemented to solve various problems related to the existing system.
  • Pages: 12
  • Words: 2841

Computers vs. Humans: What Can They Do?

The differences between a human being and a computer can be partly explained by looking at their reaction to an external stimulus. To demonstrate this point, one can refer to chess computers that can assess [...]
  • Pages: 2
  • Words: 540

Microcomputer Components and Functions

The development of microcomputers began in the 1970s with the conception of the Intel 4004 microprocessor in 1971. The processor is the brain of the microcomputer.
  • Pages: 5
  • Words: 1121

Processor Intel Core i5 and Its Features

The second stage is instruction decode, where instructions are decoded, and file register retrieved to acquire the register values used in the instructions. ALU operations, branch resolution, memory address calculation, and CSR read/write are done [...]
  • Pages: 4
  • Words: 1177

Google Chrome SWOT Analysis

Chrome is well poised to remain the number one choice for web users because it is available in both desktop and mobile platforms.
  • Pages: 3
  • Words: 948

The Fall of IBM

Overall, the threat of new entrants is high in the software segment and moderate in the hardware segment of the industry.
  • Pages: 11
  • Words: 2904

Microsoft Office Applications

When I was introduced to the internet, I learned to use the search bar, the chat, the email facility and the facility to play a video or watch a movie.
  • Pages: 3
  • Words: 900

Dependency on Computers

For example, even the author of this paper is not only using the computer to type the essay but they are also relying on the grammar checker to correct any grammatical errors in the paper. [...]
  • Pages: 5
  • Words: 1411

Computers and Transformation From 1980 to 2020

The humanity dreams about innovative technologies and quantum machines, allowing to make the most complicated mathematical calculations in billionths of a second but forgets how quickly the progress of computers has occurred for the last [...]
  • 5
  • Pages: 3
  • Words: 1058

Comparison Between two Operating Systems

Windows XP ensures that any free memory in the RAM is allocated to a certain process so as to help in improving the performance of the operating system.
  • Pages: 19
  • Words: 5256

John Searle: Can Machines Think?

He says that according to strong AI, the computer is a mind if it is well programmed, that is, it can be said to understand things if it is given the correct programs.
  • Pages: 3
  • Words: 1001

Lighting Techniques in 3D Animation

In distinction with 2D animation where every frame should be painstakingly painted and filled in with the required tints, lights, and shadows, lighting in 3D animation is performed by pointing the source of light, while [...]
  • Pages: 4
  • Words: 1122

How to Build a Computer?

Preparation and Materials In order to build a personal computer, it is necessary to choose the performance that you want by considering the aspects such as the desired processor speed, the memory, and storage capacity. [...]
  • Pages: 4
  • Words: 1114

Challenges of Computer Technology

Computer Technologies and Geology In fact, computer technologies are closely connected to any sphere of life, and it is not surprisingly that geology has a kind of dependence from the development of computers and innovative [...]
  • Pages: 6
  • Words: 1673

Global Information Systems (GIS)

Information on the country in which the organization operates is relevant to the organization because it provides the relevant information regarding the existing business opportunities in the country and the possibility of their exploitation.
  • Pages: 10
  • Words: 2773

Aspects of Laptop Rental Service

Upon return of the product, the computer will be evaluated, and the student will be billed fully for the full time the product was rented. Therefore, students attending the university will be the target market [...]
  • Pages: 11
  • Words: 3052

The Systems Analyst Profession

The profession of a system analyst in the modern labor market is one of the most demand due to the rapid development of information technology.
  • Pages: 3
  • Words: 909

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Pages: 5
  • Words: 1686

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Pages: 3
  • Words: 780

Small Billing Business Network Design

This proposal is about the design of a network for a small billing business. After a thorough discussion with the small billing business the following needs were identified: Workstations: 2 pieces A quality printer: 1 [...]
  • Pages: 5
  • Words: 975

IT on Everyday Life

Many people have become too dependent on IT as a means of life, and this has made IT a major human need in many areas of the world.
  • Pages: 4
  • Words: 1165

Computer Components in the Future

It must be noted though that liquid cooling systems utilize more electricity compared to traditional fan cooling systems due to the use of both a pump and a radiator in order to dissipate the heat [...]
  • Pages: 24
  • Words: 6517

Computer Laboratory Staff and Their Work

This will depend on the discretion of the staff to look into it that the rules that have been set in the system are followed dully. This is the work of the staff in this [...]
  • Pages: 5
  • Words: 1531

Computer Network Types and Classification

For a computer to be functional it must meet three basic requirements, which are it must provide services, communications and most of all a connection whether wireless or physical.the connection is generally the hardware in [...]
  • Pages: 2
  • Words: 604

Computer Hardware: Past, Present, and Future

Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.
  • Pages: 4
  • Words: 1123

Hacking: Positive and Negative Perception

The possible advantage of cooperating with hackers for security systems mangers of international organizations and governmental organizations is the probability to recruit them and use their knowledge to empower different organizations to improve their security [...]
  • Pages: 3
  • Words: 538

How Computer Works?

In order for a computer to function, stuff such as data or programs have to be put through the necessary hardware, where they would be processed to produce the required output.
  • Pages: 10
  • Words: 891

Infrared Wireless Local Area Networks

In general, a client must be configured with the appropriate SSID to gain access to the wireless LAN. In OSA, the wireless device does not have a specific cryptographic key to allow for authentication with [...]
  • Pages: 2
  • Words: 739

Introduction to Human-Computer Interaction

It is a scope of study that explores how individuals view and ponder about computer related technologies, and also investigates both the human restrictions and the features that advance usability of computer structures.
  • Pages: 4
  • Words: 1148

Management Information Systems (MIS)

The advances in the evolution of devices and the achievement of a new stage of development critically impacts MIS and creates the basis for the emergence of multiple changes towards the achievement of better outcomes [...]
  • Pages: 2
  • Words: 573

The Effectiveness of the Computer

The modern computer is the product of close to a century of sequential inventions. We are in the information age, and the computer has become a central determinant of our performance.
  • Pages: 4
  • Words: 1225

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Pages: 3
  • Words: 919

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]
  • Pages: 2
  • Words: 575

Computer’s Memory Management

Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.
  • Pages: 20
  • Words: 5417

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.
  • Pages: 35
  • Words: 2834

Researching of Ubuntu Operating System (OS)

The read permission for a file allows a person to view the application's information, whereas the read capability for a folder merely enables the individual to access the directory's components.
  • Pages: 7
  • Words: 2048

Information System: Advantages and Disadvantages

The essential components of a computer include the processing and control device, the processor; storage; and input and output devices. Storage devices are designed to store various amounts of information on the PC: the amount [...]
  • Pages: 1
  • Words: 342

Computers: The History of Invention and Development

It is treated as a reliable machine able to process and store a large amount of data and help out in any situation."The storage, retrieval, and use of information are more important than ever" since [...]
  • Pages: 6
  • Words: 1660

Boot Process of a CISCO Router and Computer

An understanding of the processes that would help in setting up the configuration of a router and its various elements can lead to relating the booting process of the router to that of any other [...]
  • Pages: 2
  • Words: 581

Introduction to Database Management System

Among all the Address Spaces it has, the first address space is called Database Service Address Space that provides the database capability to manipulate the DB2 data structures.
  • Pages: 7
  • Words: 1755

Home Networks, Their Functions and Features

A home network is a small local area network that enables communication among two or more computing devices within a limited area of a home. Typical elements of a home network are a modem, a [...]
  • Pages: 18
  • Words: 552

The NBA 2K Game as the Element of Popular Culture

Despite the original aim of producing the series of popular video games NBA 2K is a popularization of basketball among the representatives of the modern situation, the release of the series also focuses on advertising [...]
  • Pages: 2
  • Words: 555

Ethical Hacking: Bad in a Good Way

Introduction of personal computers led to the increase in the number of hackers as well as hacker targets were widened. Many hackers lack the skills to damage network systems in a major way.
  • 3
  • Pages: 6
  • Words: 1718

In-House vs. Outsourced IT Solution

The components of the source, the vendors, and the origin of the software-intensive system are the key drivers of the outcomes of a component sourcing option.
  • Pages: 2
  • Words: 617

Researching of Waterfall Model

The Agile SDLC paradigm is a blend of iterative and incremental modeling techniques that emphasizes process scalability and service quality through the fast turnaround of a functional software package.
  • Pages: 3
  • Words: 697

Reverse Engineering for Software Maintenance

To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences.
  • Pages: 16
  • Words: 4361

Resource Description and Access (RDA) in Library

It is printed together by the Canadian Library, The American Library Association, Association as well as the Information Professionals along with the Chartered Institute of Library within the UK.
  • Pages: 8
  • Words: 2396

Hardware and Software Development Analysis

The 90-s was a real breakthrough in software development and it was mainly connected with the development of the Internet. The dominant software policy of IBM for a long period was standardized and open mainly [...]
  • Pages: 3
  • Words: 858

Making a PowerPoint Presentation

Tim Washer, attempts to highlight some of the issues that affect the effectiveness of a PowerPoint presentation and how one can solve these issues. In addition, Washer suggests that developing a story relevant to the [...]
  • Pages: 2
  • Words: 572

Computers and Information Gathering

On the other hand, it would be correct to say that application of computers in gathering information has led to negative impacts in firms.
  • Pages: 2
  • Words: 617

Linux, the Operating System of Choice

A recent trend in the field of software is the open source genre, and it can rightly be said that the Linux operating system has become the embodiment of this genre.
  • Pages: 12
  • Words: 3421

Computer System Electronic Components

The Random Access Memory commonly referred to as RAM is another fundamental component in a computer system that is responsible for storing files and information temporarily when the computer is running. The other storage component [...]
  • Pages: 2
  • Words: 526

Children’s Game Analysis Project: The Sims

Being aimed at showing the daily activities of the family, the game is great in considering the roles of the family members and the distinguishing those in accordance with the gender roles.
  • Pages: 2
  • Words: 563

Personal Computer: The Tool for Technical Report

In addition to this, computers, via the use of reification, make it feasible to reconfigure a process representation so that first-time users can examine and comprehend many facets of the procedures.
  • Pages: 6
  • Words: 1651

Mounting Drives: Advantages and Disadvantages

Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
  • Pages: 2
  • Words: 594

VMware Server Virtualization Solution

This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
  • Pages: 45
  • Words: 13587

Digital Image Processing: Basics

Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
  • Pages: 11
  • Words: 2967

Overview of Computer Languages – Python

A computer language helps people to speak to the computer in a language that the computer understands. Also, Python Software Foundation, which is a not-for-profit consortium, directs the resources for the development of both Python [...]
  • Pages: 3
  • Words: 818

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Pages: 2
  • Words: 598

Evaluation of Macbook Laptop

The level can be as high as 160 GB hard disk which is double the original in the case of the black Mac Book.
  • Pages: 2
  • Words: 644

Use and Benefit of Computer Analysis

The introduction of computers, therefore, has improved the level of service delivery and thus enhances convenience and comfort. Another benefit accruing from the introduction of computers is the ability of the world to manage networks [...]
  • Pages: 2
  • Words: 550

Bill Gates’ Contributions to Computer Technology

Upon examination of articles written about Gates and quotations from Gates recounting his early childhood, several events stand out in significance as key to depicting the future potential of Gates to transform the world with [...]
  • Pages: 5
  • Words: 1306

WiMax Technology Specific Aspects

Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of computer networks.
  • Pages: 7
  • Words: 2020

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Pages: 4
  • Words: 1445

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Pages: 2
  • Words: 571

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.
  • Pages: 4
  • Words: 1162

Computer Reservations System in Hotel

That is why, it is obvious that blistering development of systems of this sort became possible due to the evolution of means of communication and discoveries in the field of digital technologies.
  • Pages: 5
  • Words: 1316

Presentation Importance in the Business

In my future presentations, I will consider some of the techniques mentioned in this article that include creating client newsletters, marketing postcards and presentation folders to enhance efficiency and exhibit a level or organization.
  • Pages: 2
  • Words: 550

Security on Windows Server 2008

During execution, the process is given an access token that identifies it to the rest of the system and quite often this token will be the same as the user account that started the process.
  • Pages: 8
  • Words: 2319

Preparing a Computer Forensics Investigation Plan

However, if the information is thought to be contained in the permanent storage, then a computer has to be shut down before transporting it to a laboratory for forensic analysis. The first step in the [...]
  • Pages: 3
  • Words: 858

How to Build a Gaming Computer

The first step to creating a custom build for a PC is making a list of all the necessary components. This explanation of how to build a custom gaming computer demonstrates that the process is [...]
  • Pages: 2
  • Words: 604

Pipeline Hazards in Computer Architecture

Therefore, branch instructions are the primary reasons for these types of pipeline hazards to emerge. In conclusion, it is important to be able to distinguish between different pipeline types and their hazards in order to [...]
  • Pages: 1
  • Words: 306

The Amazon Web Service Key Features

When it comes to the hardware of the AWS system, there are various concepts that a reader must understand to comprehend the configurations of the Amazon application.
  • Pages: 6
  • Words: 1505

Usability Testing and Pact Analysis Report

The PACT analysis is conducted to find the utility of the tool in the optimum resource management at a call center. The usefulness of the Call Center Traffic Monitoring System is to be measured by [...]
  • Pages: 12
  • Words: 3200

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Pages: 5
  • Words: 1077

Personal Computer Evolution Overview

It is important to note that the first evolution of a personal computer occurred in the first century. This is because of the slowness of the mainframe computers to process information and deliver the output.
  • Pages: 10
  • Words: 2972
Headline Generator
We’ll help you brainstorm great title ideas for your essay, research or speech in no time!
Research Question Generator
Get a list of ideas for your essay or term paper. We’ve prepared the best research question generator.
Title Page
Generator
Craft a paper title page with just a couple of clicks. Get it in APA, MLA, Chicago, or Harvard without any effort
Updated: