Home > Free Essays > Tech & Engineering > Computer Science

Computer Science Essay Examples and Topics

Software Architecture and Its Styles in Examples

The purpose of software architecture is to solve issues and design problems beyond the basic algorithms and data structures used in software instead of focusing on structural phenomena.
  • Pages: 4
  • Words: 1244

Vector vs. Raster Images: What’s the Difference?

A raster image, unlike a vector image, is capable of transmitting a realistic image with a lot of small details. The Adobe Illustrator and CorelDraw programs are more appropriate for working with vector images.
  • Pages: 2
  • Words: 456

Supercomputer Design, Hardware and Software

The advantage of shared memory is that it implies the existence of a unified space from which all the necessary data can be retrieved; however, different processors usually need access to certain kinds of data [...]
  • Pages: 7
  • Words: 1960

Information About Network Devices

A solid router capable of managing the network of a small business, in case the four ports it is equipped with will be enough.
  • Pages: 2
  • Words: 560

How to Create a Spreadsheet in Google Docs?

One of the columns was to carry the walker's name, while the second was for recording the amount the walker raised, and the third to fill in the organization with which the walker was affiliated.
  • Pages: 4
  • Words: 1094

DELL and HP Machines Comparison

The two brands are known to produce good quality machines, and consumers prefer these models over the rest of the models in the markets.
  • Pages: 2
  • Words: 598

WiMax Specific Aspects

Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of computer networks.
  • Pages: 7
  • Words: 2020

Kai-Fu Lee Restores China’s Technology Leadership

A recent reconsideration of the role of China in the evolution of technology has revealed, though, that the Chinese organizations still deliver innovative products; however, because of the competition with the Western brands of a [...]
  • Pages: 4
  • Words: 1145

Order Processing System Design and Implementation

The system analysis, development, and implementation phases reflect a framework that the system analyst used to design the order processing system that could be implemented to solve various problems related to the existing system.
  • Pages: 12
  • Words: 2841

Allocating a Personal Computer

I can confirm that the supervisor and the rest of the team at the CSD treat me as one of their colleagues and not just a temporary intern.
  • Pages: 3
  • Words: 855

How to Reformat a Hard Drive?

The major reason as to why the formatting is done is in order to free the contents of the disk so that it can be used for other data. Soft disk drive: a disk for [...]
  • Pages: 6
  • Words: 1699

Needs and Choosing Technology to Meet Them

Aside from this, it would be necessary to have a 1 terabyte capacity hard drive due to the sheer amount of storage space necessary to run present-day games and applications.
  • Pages: 2
  • Words: 555

Data Life Cycle Management

The most important part of the testing is the creation of the queries as it would benefit the integrity of the database.
  • Pages: 2
  • Words: 564

Computers and Web 2.0

The perspectives in which the online platform is expected in 2012 is undoubtedly different to that of 5 years before-thus the emerging of the brand Web 2.0.
  • Pages: 7
  • Words: 1973

Computer Games and Instruction

Even though the designs of the people in the game left much to be desired and most of the characters looked like the Pixar movie rejects, it was still a lot of fun to create [...]
  • Pages: 3
  • Words: 826

Two- and Three-Dimensional Digital Image Processing

When moving from two-dimensional to three-dimensional image processing, the use of an area that is represented by pixels is not used, and instead, a voxel that represents the volume of the image is used.
  • Pages: 2
  • Words: 558

Media: Memex by Bush v. Dynabook by Kay & Goldberg

While both of the articles serve as examples of the prediction of future inventions widely used in the modern world, the ideas proposed by the authors have significant differences related to the specifics of their [...]
  • Pages: 2
  • Words: 554

Business Software Quality and Reliability

The only way to mitigate this contributor is to provide the developers with training sessions and peer-review the system with the help of experts in the field.
  • Pages: 3
  • Words: 867

Intelligent Input/Output Technologies

As it is mentioned above, the concept of I2O hardware architecture was developed by the Intel Corporation. This section is intended to compare the most significant advantages and disadvantages of I2O techniques.
  • Pages: 2
  • Words: 537

Applied E-Systems and Pervasive Computing

However, the mobile interface is the graphical enhancement that allows individuals to interact with their device and communication infrastructure. In contrast, the mobile interface is a program that links the software and hardware.
  • Pages: 5
  • Words: 1412

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
  • Pages: 4
  • Words: 1445

Microsoft Operating Systems on Trial

The incompatibility of older software and the enhanced capabilities of the new operating system in some cases force users to upgrade to perform their job, meaning that they would not have a choice but receive [...]
  • Pages: 2
  • Words: 561

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]
  • Pages: 2
  • Words: 571

Human-Computer Interaction

It is a scope of study that explores how individuals view and ponder about computer related technologies, and also investigates both the human restrictions and the features that advance usability of computer structures.
  • Pages: 4
  • Words: 1148

The Digital Revolution Creating

The efforts and activities of these innovators made it possible for numerous gains to be made in the future. The second interesting thing is that most of the achievements made in the world of technology [...]
  • Pages: 3
  • Words: 854

Nintendo Game Innovation: Wii’s Principles

In this case, it has to be mentioned that Sony's PlayStation was paying substantial attention to the quality of the image, sound, and speed of the processor to build a perception of one of the [...]
  • Pages: 3
  • Words: 820

Graphic Card Industry and Evolution

A graphic card, usually, referred to as a video card or a graphic accelerator card is an electronic circuit installed on the motherboard inside the central power unit, mostly on Laptops and desktop computers.
  • Pages: 8
  • Words: 2193

Radix Sort Algorithm, Its Logic and Applications

The sorting process starts from the rightmost digit based on the key or the positions of the numbers being sorted. LSD radix sorts the integers from the least to the most significant digit.
  • Pages: 3
  • Words: 823

Life Without Computers

One of the major contributions of the computer technology in the world has been the enhancement of the quality of communication.
  • Pages: 2
  • Words: 590

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
  • Pages: 4
  • Words: 1111

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
  • Pages: 5
  • Words: 1413

The Smart Grid Implementation

This is the case in the US, where the existing electricity infrastructure is outdated and thus is unable to meet the requirements of the users.
  • Pages: 2
  • Words: 599

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Pages: 3
  • Words: 919

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.
  • Pages: 4
  • Words: 1162

Nintendo Wii as an Innovative Product

The paper aims at analyzing the case and answering the questions regarding the nature of the innovation, aspects of the value proposition, and details of the used business model.
  • Pages: 4
  • Words: 879

Human Computer Interaction: Types of Special Needs

The rapid growth of the information technology sector worldwide, with the accompanying rise and spread of the internet denotes the intensity of the challenge of meeting the special needs of persons who cannot use the [...]
  • Pages: 4
  • Words: 1227

Informatics as an Approach and a Theory

The multidisciplinary approach to informatics, in my view, has led to the many different definitions of informatics as professionals use the lens of individual disciplines or fields of expertise to make sense of the processes, [...]
  • Pages: 3
  • Words: 866

Computer Reservations System in Hotel

That is why, it is obvious that blistering development of systems of this sort became possible due to the evolution of means of communication and discoveries in the field of digital technologies.
  • Pages: 5
  • Words: 1316

VSphere Computer Networking: Planning and Configuring

In order to successfully configure vSphere networking, it is prudent to begin the procedure by establishing the capabilities of a vSS. VM ports and VMkernel ports are the two types of distinct connections in this [...]
  • Pages: 2
  • Words: 604

Recording Studio Equipment: Hardware and Software

The purpose of this report is to present the information on the necessary equipment to purchase; the justification of the equipment choices; the discussion of the equipment connectivity and the diagram; and the budget table [...]
  • Pages: 5
  • Words: 1500

Google Chrome Strategies

Chrome is well poised to remain the number one choice for web users because it is available in both desktop and mobile platforms.
  • Pages: 3
  • Words: 948

Information Technology Architecture

Each non-functional attribute or requirement of an information system makes it easier for employees to use the software in an effective manner.
  • Pages: 2
  • Words: 550

Modern Technology: Development and Effects

It has made the daily functions easier and more practical, as the software programs, internet and stored memory have extended the use of information and understanding.
  • Pages: 2
  • Words: 559

Public Key Infrastructure System

The primary purpose of the paper is to evaluate the significance of implementation of the public key infrastructure in the working process and discuss strength and weaknesses of the system.
  • Pages: 3
  • Words: 843

Watching TV Makes You Smarter?

Although it is true that watching TV and playing video games can be mentally stimulating activities, it is important to remember the value of selecting shows and video games that can help children accomplish the [...]
  • Pages: 3
  • Words: 891

How to Stop Internet Crime?

While discussing the evolution of the cyberspace and providing the techniques to protect users from the Internet crimes, Hallam-Baker focuses his attention on the idea that the Internet should be strengthened with references to the [...]
  • Pages: 3
  • Words: 840

The NBA 2K Game as the Element of Popular Culture

Despite the original aim of producing the series of popular video games NBA 2K is a popularization of basketball among the representatives of the modern situation, the release of the series also focuses on advertising [...]
  • Pages: 2
  • Words: 555

Operating System and Applications Support

The hardware consists of devices that support input and output functions, provides an interface for users to interact with the computer or the software by enabling users to enter commands which are translated by the [...]
  • Pages: 2
  • Words: 540

Microsoft Tips and Tricks

For instance the first tip highlights the usefulness of the control key to Microsoft Office Outlook. However, lessons drawn from the article can be applied to the latest versions of Microsoft office.
  • Pages: 2
  • Words: 557

Computer Hardware Definition

Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.
  • Pages: 4
  • Words: 1123

Virtual Machines Technologies: Architecture and Benefits

According to Smith and Nair, the perceptions held about virtual machines are discussed in the context of the software components that provide an abstract representation of the hardware on which machine instructions are executed on [...]
  • Pages: 2
  • Words: 280

Network Consultation for DesignIT Company

DesignIT will use Ethernet network design, which is small and suitable for the size of the company. The network architecture will allow DesignIT to provide network to serve all its users.
  • Pages: 8
  • Words: 1625

Opera Fidelio Property Management System

The name of the company was changed to Micros Systems in 1978. The vision of Micros is to be "the world-leading IT company in the hospitality and retail sectors".
  • Pages: 8
  • Words: 2247

Firewalls for Corporate Usage

It gives a description of a scenario of a company with identified threats and a review of a firewall product that matches the risks. It has an extensive network divided into a number of subnets [...]
  • Pages: 2
  • Words: 619

Presentation Importance in the Business

In my future presentations, I will consider some of the techniques mentioned in this article that include creating client newsletters, marketing postcards and presentation folders to enhance efficiency and exhibit a level or organization.
  • Pages: 2
  • Words: 550

Making a PowerPoint Presentation

Tim Washer, attempts to highlight some of the issues that affect the effectiveness of a PowerPoint presentation and how one can solve these issues. In addition, Washer suggests that developing a story relevant to the [...]
  • Pages: 2
  • Words: 572

Home Network: Hardware and Security Management

00, it is important to describe the required hardware and the network system; to select concrete items to be used for completing the home network; to discuss the approach to beck up devices, and to [...]
  • Pages: 3
  • Words: 829

Computer Security

The main thing that people need to know is how this breach of security and information occurs and also the possible ways through which they can be able to prevent it, and that's why institutions [...]
  • Pages: 3
  • Words: 1026

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]
  • Pages: 2
  • Words: 575

Internet Piracy and SOPA Act

At the end of it all, internet piracy will hurt the same people who are profiting from it because they will have fewer materials to sell or distribute in the future.
  • Pages: 2
  • Words: 559

Humanities and Computer Science Collaboration

Much attention has over the years been given to IS as a social science, and much has been published on the application of IS in the humanities, however, the gap in the reflection and theory [...]
  • Pages: 12
  • Words: 3679

Salesforce.com: Cloud Computing

The firm also faced the challenge of demonstrating to its clients that it was dependable and safe enough to manage their corporate data and applications remotely.
  • Pages: 2
  • Words: 553

VMware Services Basic Requirements

Processor requirements can be greater if the database operates on the same computer.vCentre server also requires a minimum of 4GB RAM.
  • Pages: 2
  • Words: 577

Virtual Machines and Tools to Manage Them

To start the conversion process, turn on the conversion wizard by first selecting and configuring the hardware and software of the physical machine to and by creating a destination folder to house the new virtual [...]
  • Pages: 2
  • Words: 582

Apple’s Security Issue

A continuum of legal issues concerning consumer privacy and security have affected the demand of Apple phone and computer products in the consumer market, consequently prompting Apple Company to strategize on means of protecting information [...]
  • Pages: 5
  • Words: 1504

How to Build a Computer?

Preparation and Materials In order to build a personal computer, it is necessary to choose the performance that you want by considering the aspects such as the desired processor speed, the memory, and storage capacity. [...]
  • Pages: 4
  • Words: 1114

Process of Outsourcing Network Security

However, a company's network is supposed to be provided with a definitive filter in the form of a firewall. The latter can be a cumbersome task owing to the high level of risks involved.
  • Pages: 2
  • Words: 310

Internet Censorship

It is the obligation of the government to protect the innocence of the children through internet censorship. In some nations, the government uses internet blocking and filtering as a method to hide information from the [...]
  • Pages: 4
  • Words: 1097

Computer’s Memory Management

Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.
  • Pages: 20
  • Words: 5417

Computer Science: Threats to Internet Privacy

Allegedly, the use of the Internet is considered to be a potential threat to the privacy of individuals and organizations. Internet privacy may be threatened by the ease of access to personal information as well [...]
  • Pages: 4
  • Words: 1100

Design and Installation of a Computer Network

For instance, the software installations and the hardware installations team leaders should determine their resource requirements in good time and forward such to the operations head.
  • Pages: 2
  • Words: 308

Adobe Corporation Interactive Installation

This is one of the things which make this installation attractive to the users. The interactive installation discussed in this paper is a good example of such media.
  • Pages: 4
  • Words: 1099

The Multics Operating System Project

The architect linked "the file system with the memory access system". The Stratus VOS operating system had relied on "Multics to design its internal and external features".
  • Pages: 4
  • Words: 1156

Computer Security – Information Assurance

Some of the health care information stored in shared computers is sensitive, and it calls for health care practitioners to use a two-factor authentication to make sure that other users do not access the information. [...]
  • Pages: 4
  • Words: 1159

QR Codes Overview

QR codes platforms need to be made more secure to reduce security threats which users are exposed to. Some users are directed to malicious content and websites whenever they scan these codes.
  • Pages: 2
  • Words: 580

Two Greatest Hacking Systems in the USA

Appropriating intellectual output of someone else is also a computer malpractice that is intolerable. Generally, Computer malpractice is seen when a person shows hasty and careless conducts or behaviors when making use of computer systems.
  • Pages: 3
  • Words: 950

Network Securities Management

The introduction of e-businesses has resulted to the need to modify the computer security systems from keeping the unwanted users away, but enabling the targeted people to access the network.
  • Pages: 7
  • Words: 2184
Psst... Stuck with your
assignment? 😱
Psst... Stuck with your assignment? 😱
Do you need an essay to be done?
What type of assignment 📝 do you need?
How many pages (words) do you need? Let's see if we can help you!