Home > Free Essays > Tech & Engineering > Computer Science

Computer Science Essay Examples and Topics

The Smart Grid Implementation

This is the case in the US, where the existing electricity infrastructure is outdated and thus is unable to meet the requirements of the users.

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]

The History of Computer Storage

Thus, the scope of the project includes the history of crucial inventions for data storage, from the first punch cards to the latest flash memory storage technology.

Nintendo Wii as an Innovative Product

The paper aims at analyzing the case and answering the questions regarding the nature of the innovation, aspects of the value proposition, and details of the used business model.

Human Computer Interaction: Types of Special Needs

The rapid growth of the information technology sector worldwide, with the accompanying rise and spread of the internet denotes the intensity of the challenge of meeting the special needs of persons who cannot use the [...]

Informatics as an Approach and a Theory

The multidisciplinary approach to informatics, in my view, has led to the many different definitions of informatics as professionals use the lens of individual disciplines or fields of expertise to make sense of the processes, [...]

Computer Reservations System in Hotel

That is why, it is obvious that blistering development of systems of this sort became possible due to the evolution of means of communication and discoveries in the field of digital technologies.

Recording Studio Equipment: Hardware and Software

The purpose of this report is to present the information on the necessary equipment to purchase; the justification of the equipment choices; the discussion of the equipment connectivity and the diagram; and the budget table [...]

Google Chrome Strategies

Chrome is well poised to remain the number one choice for web users because it is available in both desktop and mobile platforms.

Public Key Infrastructure System

The primary purpose of the paper is to evaluate the significance of implementation of the public key infrastructure in the working process and discuss strength and weaknesses of the system.

Watching TV Makes You Smarter?

Although it is true that watching TV and playing video games can be mentally stimulating activities, it is important to remember the value of selecting shows and video games that can help children accomplish the [...]

How to Stop Internet Crime?

While discussing the evolution of the cyberspace and providing the techniques to protect users from the Internet crimes, Hallam-Baker focuses his attention on the idea that the Internet should be strengthened with references to the [...]

The NBA 2K Game as the Element of Popular Culture

Despite the original aim of producing the series of popular video games NBA 2K is a popularization of basketball among the representatives of the modern situation, the release of the series also focuses on advertising [...]

Operating System and Applications Support

The hardware consists of devices that support input and output functions, provides an interface for users to interact with the computer or the software by enabling users to enter commands which are translated by the [...]

Microsoft Tips and Tricks

For instance the first tip highlights the usefulness of the control key to Microsoft Office Outlook. However, lessons drawn from the article can be applied to the latest versions of Microsoft office.

Computer Hardware Definition

Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.

Network Consultation for DesignIT Company

DesignIT will use Ethernet network design, which is small and suitable for the size of the company. The network architecture will allow DesignIT to provide network to serve all its users.

Firewalls for Corporate Usage

It gives a description of a scenario of a company with identified threats and a review of a firewall product that matches the risks. It has an extensive network divided into a number of subnets [...]

Presentation Importance in the Business

In my future presentations, I will consider some of the techniques mentioned in this article that include creating client newsletters, marketing postcards and presentation folders to enhance efficiency and exhibit a level or organization.

Making a PowerPoint Presentation

Tim Washer, attempts to highlight some of the issues that affect the effectiveness of a PowerPoint presentation and how one can solve these issues. In addition, Washer suggests that developing a story relevant to the [...]

Home Network: Hardware and Security Management

00, it is important to describe the required hardware and the network system; to select concrete items to be used for completing the home network; to discuss the approach to beck up devices, and to [...]

Computer Security

The main thing that people need to know is how this breach of security and information occurs and also the possible ways through which they can be able to prevent it, and that's why institutions [...]

Concepts of Networking

The word 'networking' is obtained from the word 'network', which, is formed by joining two English words namely; 'net' and 'work'. The latest invention of the use of the word networking is in the business [...]

Internet Piracy and SOPA Act

At the end of it all, internet piracy will hurt the same people who are profiting from it because they will have fewer materials to sell or distribute in the future.

Humanities and Computer Science Collaboration

Much attention has over the years been given to IS as a social science, and much has been published on the application of IS in the humanities, however, the gap in the reflection and theory [...]

Salesforce.com: Cloud Computing

The firm also faced the challenge of demonstrating to its clients that it was dependable and safe enough to manage their corporate data and applications remotely.

Virtual Machines and Tools to Manage Them

To start the conversion process, turn on the conversion wizard by first selecting and configuring the hardware and software of the physical machine to and by creating a destination folder to house the new virtual [...]

Apple’s Security Issue

A continuum of legal issues concerning consumer privacy and security have affected the demand of Apple phone and computer products in the consumer market, consequently prompting Apple Company to strategize on means of protecting information [...]

How to Build a Computer?

Preparation and Materials In order to build a personal computer, it is necessary to choose the performance that you want by considering the aspects such as the desired processor speed, the memory, and storage capacity. [...]

Process of Outsourcing Network Security

However, a company's network is supposed to be provided with a definitive filter in the form of a firewall. The latter can be a cumbersome task owing to the high level of risks involved.

Internet Censorship

It is the obligation of the government to protect the innocence of the children through internet censorship. In some nations, the government uses internet blocking and filtering as a method to hide information from the [...]

Computer’s Memory Management

Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.

Computer Science: Threats to Internet Privacy

Allegedly, the use of the Internet is considered to be a potential threat to the privacy of individuals and organizations. Internet privacy may be threatened by the ease of access to personal information as well [...]

The Multics Operating System Project

The architect linked "the file system with the memory access system". The Stratus VOS operating system had relied on "Multics to design its internal and external features".

Computer Security – Information Assurance

Some of the health care information stored in shared computers is sensitive, and it calls for health care practitioners to use a two-factor authentication to make sure that other users do not access the information. [...]

QR Codes Overview

QR codes platforms need to be made more secure to reduce security threats which users are exposed to. Some users are directed to malicious content and websites whenever they scan these codes.

Two Greatest Hacking Systems in the USA

Appropriating intellectual output of someone else is also a computer malpractice that is intolerable. Generally, Computer malpractice is seen when a person shows hasty and careless conducts or behaviors when making use of computer systems.

Network Securities Management

The introduction of e-businesses has resulted to the need to modify the computer security systems from keeping the unwanted users away, but enabling the targeted people to access the network.

Storytelling about Computers

The CPU of the computer determines the ultimate performance of a computer because it is the core-processing unit of a computer as shown in figure 2 in the appendix.

Information Security: User’s Responsibility

The purpose of this project is to investigate the role played by information users in information security management. Why do employees engage in security-related risks that lead to breach of information security in the contemporary [...]

Explanation of Homomorphic Encryption

Public cloud providers need the intervention of homomorphic encryption to promote security on the access of information. The access of information on the Internet may be dangerous because other competitors may be able to access [...]

Emergency Communications Program

The first component of the plan entails training a group of employees in the identification of the internal and external constituents to be included in the evaluation of the terrorist threat.

Information Security Basics

An important aspect of malware code is that it is installed in a computer without the consent of the owner of the computer.

Digital Evidence Presentation

The technology of the drive relates to the manner used to store data or the method of connecting to other computer-system parts, like the motherboard.

Sources of Digital Forensic Data

With live system data, the aim of the investigator is to capture information concerning volatile data that may disappear when a device powers off or it is disconnected from the network.

Evaluation of the BackTrack Software Suite

According to the reviews, BackTrack can be easily used in the commerce environments because of the open access to the tools, and BackTrack is "good for web application assessment", and it is "perfect for penetration [...]

Cryptology and Data Protection

The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse.

Low-Power Microcontrollers

Power supply from portable batteries has a significantly low voltage component, which affects the efficiency of the supply and the ability of the devices to adapt to the capabilities of the batteries.

Is Thunderbolt the Real Deal?

The Thunderbolt technology storage devices provide an opportunity for manufacturers to continue in the process of providing both professionals and consumers with quality devices.

Security in the information communication technology

These include adapting the users to the system and getting the involvement of users through soliciting their input on ways of advancing the system. The corporate governance of the information security ought to begin from [...]

Adrian Lamo’s Hacking

The example of Galileo introduces a theory about the construction of the Solar System that was the target of interest of the well-known scientist.

Information System Design

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.

Human computer interface

The conferences will not require members to be there in person as the events can be transmitted to people in their homes and they can make suggestions too.

Video Game Effects

Given the fact that there is indeed a logically sound rationale to such a suggestion, throughout the course of conducting my study, I remained thoroughly observant of the article's classification-related suggestions, in regards to the [...]

IBM IT Security

This is achieved through data security strategy and assessment that in turn assists in the development of a risk-balanced security strategy.

Cloud Computing in Network Security

In contrast, in cloud computing, the cloud provider encrypts customer's data before it is stored in the cloud. Identity and Access Management is another protocol that can be used to manage users accessing data in [...]

Dependency on Computers

For example, even the author of this paper is not only using the computer to type the essay but they are also relying on the grammar checker to correct any grammatical errors in the paper. [...]

Strategy And Controls In Information Security

An attack could comprise any of the following categories or a combination of any of them: Fabrications, which means adoption of some deceptions to play a trick on the unaware users of a system; Interruptions, [...]