Home > Free Essays > Tech & Engineering > Computer Science

Computer Science Essay Examples and Topics

Computers and Web 2.0

The perspectives in which the online platform is expected in 2012 is undoubtedly different to that of 5 years before-thus the emerging of the brand Web 2.0.

Computer Games and Instruction

Even though the designs of the people in the game left much to be desired and most of the characters looked like the Pixar movie rejects, it was still a lot of fun to create [...]

Laptop Models and Their Specifications

The best feature of this laptop is that it has genuine Windows 7 which is suitable for a RAM of 2GB and hard drive of 320 GB.

Workflow and Open Source Software and Outsourcing

The software allows the computer to work as a multi-user inter-phase since the configured programs can run alongside others working in the back ground.

Two- and Three-Dimensional Digital Image Processing

When moving from two-dimensional to three-dimensional image processing, the use of an area that is represented by pixels is not used, and instead, a voxel that represents the volume of the image is used.

Memex and Dynabook as Early Portable Computers

As we were able to see, Bush's "memex" was to be a machine that could store large amounts of information and allow the user to retrieve and process it quickly.

Bush’s Memex Revisited and Kay & Goldberg’s Personal Dynamic Media

The overall variety of potential handlers of the technology is so excessive that every endeavor to explicitly taking into consideration their requests and demands in the project of the Dynabook in advance would inevitably culminate [...]

Char Davies’ Osmose as Virtual Reality Environment

On the following position, the installment suggests the invitees a chance to trail the discrete interactor's voyage of imageries from end to end of this counterpart of natural surroundings.

Media: Memex by Bush v. Dynabook by Kay & Goldberg

While both of the articles serve as examples of the prediction of future inventions widely used in the modern world, the ideas proposed by the authors have significant differences related to the specifics of their [...]

Memex vs. Dynabook as First Portable Media Devices

One of the most important aspects that need to be discussed is that both these articles have focused on the flexibility of the devices. It needs to be said that the way some of them [...]

Media Devices: Kay & Goldberg’s Dynabook vs. Bush’s Memex

The reason to state that both Memex and Dynabook are based on the same idea and vision of the personal computer's development is in the fact that Bush, Kay, and Goldberg were focused on creating [...]

Software Failures in Business Settings

A bug caused a failure of the updating process, and the platform deleted all internal files connected to the program from the computer.

Business Software Quality and Reliability

The only way to mitigate this contributor is to provide the developers with training sessions and peer-review the system with the help of experts in the field.

Physical Layer in Data Communication and Networking

In addition, the Physical layer is considered as the lowest of all. In addition, the Physical layer conducts the transmission of data as well as its reception.

Computer Hardware Components and Functions

Hardware is the physical components of a computer, while the software is a collection of programs and related data to perform the computers desired function.

Touch-Screen Technology and Its Practical Benefits

Starwood Hotels could also mount a touch-screen on the wall and this would contain information on the nutritional contents of the various foods served in the hotel.

Intelligent Input/Output Technologies

As it is mentioned above, the concept of I2O hardware architecture was developed by the Intel Corporation. This section is intended to compare the most significant advantages and disadvantages of I2O techniques.

Applied E-Systems and Pervasive Computing

However, the mobile interface is the graphical enhancement that allows individuals to interact with their device and communication infrastructure. In contrast, the mobile interface is a program that links the software and hardware.

Enterprise Architecture Frameworks Comparison

Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.

Microsoft Operating Systems on Trial

The incompatibility of older software and the enhanced capabilities of the new operating system in some cases force users to upgrade to perform their job, meaning that they would not have a choice but receive [...]

Computer-Based Information Systems

The present essay will seek to discuss computer-based information systems in the context of Porter's competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic [...]

Human-Computer Interaction

It is a scope of study that explores how individuals view and ponder about computer related technologies, and also investigates both the human restrictions and the features that advance usability of computer structures.

The Digital Revolution Creating

The efforts and activities of these innovators made it possible for numerous gains to be made in the future. The second interesting thing is that most of the achievements made in the world of technology [...]

Nintendo Game Innovation: Wii’s Principles

In this case, it has to be mentioned that Sony's PlayStation was paying substantial attention to the quality of the image, sound, and speed of the processor to build a perception of one of the [...]

Graphic Card Industry and Evolution

A graphic card, usually, referred to as a video card or a graphic accelerator card is an electronic circuit installed on the motherboard inside the central power unit, mostly on Laptops and desktop computers.

Radix Sort Algorithm, Its Logic and Applications

The sorting process starts from the rightmost digit based on the key or the positions of the numbers being sorted. LSD radix sorts the integers from the least to the most significant digit.

Life Without Computers

One of the major contributions of the computer technology in the world has been the enhancement of the quality of communication.

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.

Paessler Router Traffic Grapher Network Monitoring

Therefore, it is important to use only the best tools when it comes to securing the network and giving access to the most sensitive areas of the system.

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]

The Smart Grid Implementation

This is the case in the US, where the existing electricity infrastructure is outdated and thus is unable to meet the requirements of the users.

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.

Nintendo Wii as an Innovative Product

The paper aims at analyzing the case and answering the questions regarding the nature of the innovation, aspects of the value proposition, and details of the used business model.

Server Virtualization and Its Benefits for Company

Besides the demands advanced by the world of IT, virtualization is implemented with a view to economy as it helps reduce power consumption and air conditioning needs of a company.

The K-Means Algorithm and Its Alternatives

Moreover, the paper seeks to identify the aspects of the K-Means clustering algorithms that help find good clustering in spatial data.

Computer Evolution, Its Future and Societal Impact

In spite of the computers being in existence since the abacus, it is the contemporary computers that have had a significant impact on the human life.

Human Computer Interaction: Types of Special Needs

The rapid growth of the information technology sector worldwide, with the accompanying rise and spread of the internet denotes the intensity of the challenge of meeting the special needs of persons who cannot use the [...]

Informatics as an Approach and a Theory

The multidisciplinary approach to informatics, in my view, has led to the many different definitions of informatics as professionals use the lens of individual disciplines or fields of expertise to make sense of the processes, [...]

PowerPoint Computer Program: Principles and Processes

If their needs are considered when the use of PowerPoint to communicate is addressed is a subject to be debated. However, it is quite difficult to fulfill the needs of the blind when PowerPoint is [...]

Computer Reservations System in Hotel

That is why, it is obvious that blistering development of systems of this sort became possible due to the evolution of means of communication and discoveries in the field of digital technologies.

VSphere Computer Networking: Planning and Configuring

In order to successfully configure vSphere networking, it is prudent to begin the procedure by establishing the capabilities of a vSS. VM ports and VMkernel ports are the two types of distinct connections in this [...]

Human Computer Interaction in Web Based Systems

The personalization of web services has been seen to improve the interaction that the user will have with the information presented by the machine.

Recording Studio Equipment: Hardware and Software

The purpose of this report is to present the information on the necessary equipment to purchase; the justification of the equipment choices; the discussion of the equipment connectivity and the diagram; and the budget table [...]

Google Chrome Strategies

Chrome is well poised to remain the number one choice for web users because it is available in both desktop and mobile platforms.

Goodrich Company’s Hardware and Software Systems

Through virtualization software, the deployment of new services takes less than 2 hours which has led to increased efficiency in IT section of the company.

Information Technology Architecture

Each non-functional attribute or requirement of an information system makes it easier for employees to use the software in an effective manner.

Modern Technology: Development and Effects

It has made the daily functions easier and more practical, as the software programs, internet and stored memory have extended the use of information and understanding.

Personal Computers in the U.S Market

In the case of personal computers, there are many reasons that are leading to its decline in the market, especially in the US' market.

Public Key Infrastructure System

The primary purpose of the paper is to evaluate the significance of implementation of the public key infrastructure in the working process and discuss strength and weaknesses of the system.

Watching TV Makes You Smarter?

Although it is true that watching TV and playing video games can be mentally stimulating activities, it is important to remember the value of selecting shows and video games that can help children accomplish the [...]

How to Stop Internet Crime?

While discussing the evolution of the cyberspace and providing the techniques to protect users from the Internet crimes, Hallam-Baker focuses his attention on the idea that the Internet should be strengthened with references to the [...]

The NBA 2K Game as the Element of Popular Culture

Despite the original aim of producing the series of popular video games NBA 2K is a popularization of basketball among the representatives of the modern situation, the release of the series also focuses on advertising [...]

Operating System and Applications Support

The hardware consists of devices that support input and output functions, provides an interface for users to interact with the computer or the software by enabling users to enter commands which are translated by the [...]

Multitouch Devices Usefulness in Society

The purpose of the study was to outline the various problems multitouch technology encounters, its features, and usefulness in society today.

Microsoft Tips and Tricks

For instance the first tip highlights the usefulness of the control key to Microsoft Office Outlook. However, lessons drawn from the article can be applied to the latest versions of Microsoft office.

Computer Hardware Definition

Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.

Virtual Machines Technologies: Architecture and Benefits

According to Smith and Nair, the perceptions held about virtual machines are discussed in the context of the software components that provide an abstract representation of the hardware on which machine instructions are executed on [...]

Network Consultation for DesignIT Company

DesignIT will use Ethernet network design, which is small and suitable for the size of the company. The network architecture will allow DesignIT to provide network to serve all its users.

Opera Fidelio Property Management System

The name of the company was changed to Micros Systems in 1978. The vision of Micros is to be "the world-leading IT company in the hospitality and retail sectors".

Firewalls for Corporate Usage

It gives a description of a scenario of a company with identified threats and a review of a firewall product that matches the risks. It has an extensive network divided into a number of subnets [...]

Presentation Importance in the Business

In my future presentations, I will consider some of the techniques mentioned in this article that include creating client newsletters, marketing postcards and presentation folders to enhance efficiency and exhibit a level or organization.

Making a PowerPoint Presentation

Tim Washer, attempts to highlight some of the issues that affect the effectiveness of a PowerPoint presentation and how one can solve these issues. In addition, Washer suggests that developing a story relevant to the [...]

Large Software Systems Development Managing

It needs to be said that the author has addressed the issues that are related to the process of development of software systems.

Home Network: Hardware and Security Management

00, it is important to describe the required hardware and the network system; to select concrete items to be used for completing the home network; to discuss the approach to beck up devices, and to [...]

Computer Security

The main thing that people need to know is how this breach of security and information occurs and also the possible ways through which they can be able to prevent it, and that's why institutions [...]

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]

Internet Piracy and SOPA Act

At the end of it all, internet piracy will hurt the same people who are profiting from it because they will have fewer materials to sell or distribute in the future.

Humanities and Computer Science Collaboration

Much attention has over the years been given to IS as a social science, and much has been published on the application of IS in the humanities, however, the gap in the reflection and theory [...]

Salesforce.com: Cloud Computing

The firm also faced the challenge of demonstrating to its clients that it was dependable and safe enough to manage their corporate data and applications remotely.

VMware Services Basic Requirements

Processor requirements can be greater if the database operates on the same computer.vCentre server also requires a minimum of 4GB RAM.

Virtual Machines and Tools to Manage Them

To start the conversion process, turn on the conversion wizard by first selecting and configuring the hardware and software of the physical machine to and by creating a destination folder to house the new virtual [...]

Apple’s Security Issue

A continuum of legal issues concerning consumer privacy and security have affected the demand of Apple phone and computer products in the consumer market, consequently prompting Apple Company to strategize on means of protecting information [...]

How to Build a Computer?

Preparation and Materials In order to build a personal computer, it is necessary to choose the performance that you want by considering the aspects such as the desired processor speed, the memory, and storage capacity. [...]

Process of Outsourcing Network Security

However, a company's network is supposed to be provided with a definitive filter in the form of a firewall. The latter can be a cumbersome task owing to the high level of risks involved.

Globalization Influence on the Computer Technologies

In spite of the fact that globalization may be defined as a serious problem in different spheres of life, it is wrong to believe that the future of IT may undergo negative effects; it seems [...]

Internet Censorship

It is the obligation of the government to protect the innocence of the children through internet censorship. In some nations, the government uses internet blocking and filtering as a method to hide information from the [...]

Computer’s Memory Management

Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.

The Drawbacks of Computers in Human Lives

Since the invention of computers, they have continued to be a blessing in many ways and more specifically changing the lives of many people.

Computer Science: Threats to Internet Privacy

Allegedly, the use of the Internet is considered to be a potential threat to the privacy of individuals and organizations. Internet privacy may be threatened by the ease of access to personal information as well [...]

Design and Installation of a Computer Network

For instance, the software installations and the hardware installations team leaders should determine their resource requirements in good time and forward such to the operations head.

Adobe Corporation Interactive Installation

This is one of the things which make this installation attractive to the users. The interactive installation discussed in this paper is a good example of such media.

Improving the Security Levels of Software

In an effort to the plot and explain the answer to this vulnerability, the study has identified the solutions to preventing this destruction.

Cryptography, Asymmetric and Symmetric algorithms

The encryption key is kept public and is known as the "public key" while the decryption key is kept secret and is known as the "private or secret key".

The Multics Operating System Project

The architect linked "the file system with the memory access system". The Stratus VOS operating system had relied on "Multics to design its internal and external features".

Computer Security – Information Assurance

Some of the health care information stored in shared computers is sensitive, and it calls for health care practitioners to use a two-factor authentication to make sure that other users do not access the information. [...]

QR Codes Overview

QR codes platforms need to be made more secure to reduce security threats which users are exposed to. Some users are directed to malicious content and websites whenever they scan these codes.

Detection and Prevention of Wireless Intrusion

A wireless IDS is effective in identification of threats in the network. There are also other threats that a wireless IDS can detect on the network.

Two Greatest Hacking Systems in the USA

Appropriating intellectual output of someone else is also a computer malpractice that is intolerable. Generally, Computer malpractice is seen when a person shows hasty and careless conducts or behaviors when making use of computer systems.