Computer Science Essay Examples and Topics. Page 2

399 samples

Computer Science: Threats to Internet Privacy

Allegedly, the use of the Internet is considered to be a potential threat to the privacy of individuals and organizations. Internet privacy may be threatened by the ease of access to personal information as well [...]
  • Pages: 4
  • Words: 1100

Homomorphic Encryption: Communication and Security

Public cloud providers need the intervention of homomorphic encryption to promote security on the access of information. The access of information on the Internet may be dangerous because other competitors may be able to access [...]
  • Pages: 3
  • Words: 845

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Pages: 6
  • Words: 1864

Comparison Between two Operating Systems

Windows XP ensures that any free memory in the RAM is allocated to a certain process so as to help in improving the performance of the operating system.
  • Pages: 19
  • Words: 5256

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Pages: 10
  • Words: 2970

Information security in Small Scale Enterprises

With the physical security set-up, the management should now focus on technological aspects of the security plan, this are the process and procedures security maintenance to ensure that the information of a company is secure [...]
  • Pages: 8
  • Words: 2227

Video Games Impact on Peoples Lives

These games have had a great influence in the minds of people, especially the children who have stopped playing the usual games on the fields to sticking on the computer and television screens playing video [...]
  • Pages: 12
  • Words: 3703

Information Retrieval Methods

The search mechanism is the system that allows for the searching of the database for the retrieval of the information stored in it.
  • 4
  • Pages: 10
  • Words: 2493

The use of video games in the modern world

The industry of video games has developed in the recent past, and this has created a lot of competition. The video have plenty of benefits games in the modern world.
  • Pages: 3
  • Words: 780

Ada Lovelace: Scientific Contributions

Unlike her contemporaries, she emphasized the harmony between machines and humanity, making her one of the key innovators in the history of technological advancements.
  • Pages: 1
  • Words: 283

In-House vs. Outsourced IT Solution

The components of the source, the vendors, and the origin of the software-intensive system are the key drivers of the outcomes of a component sourcing option.
  • Pages: 2
  • Words: 617

MetaSpace: The Proposed Internet-Based Design

The different additional features to be introduced by MetaSpace, the risks and solutions associated with it, and how the identified potential vulnerabilities will be solved form the basis of discussion for this paper.
  • Pages: 10
  • Words: 2770

Digital Certificate Management

The paper focuses on the process of issuing and managing digital certificates, discussing the weaknesses and vulnerabilities of different methods and the issues with revoking certificates, and possible remedies.
  • Pages: 4
  • Words: 1223

Balancing Hardware Needs and Budget

Activities that require a computer in my life include: Communicating with others through email and messaging apps Researching and gathering information online Writing papers and documents Creating and editing presentations Managing my schedule and to-do [...]
  • Pages: 1
  • Words: 286

Pipeline Hazards in Computer Architecture

Therefore, branch instructions are the primary reasons for these types of pipeline hazards to emerge. In conclusion, it is important to be able to distinguish between different pipeline types and their hazards in order to [...]
  • Pages: 1
  • Words: 306

Linked Lists as a Data Structure

The linked list begins with a HEAD, which designates the beginning or the location in memory of the first node. The pointer to the list's first node is found in the circular linked list's last [...]
  • Pages: 2
  • Words: 591

Computational Models or Protocols of E-Work

The product holon ensures the quality and correct fabrication of a product by holding the product and process knowledge and providing consistent and updated information to the other holons.
  • Pages: 4
  • Words: 1432

Data- and Knowledge-Driven Decision Support Systems

AI should be able to enhance its capability through the format of data-driven DSS, which opens a gateway to proceed with subsequent steps of CCT to deliver a high level of functionality and decision support.
  • Pages: 2
  • Words: 551

Aspects of Self-Emission Light Sources

These variables are the degrees between the direction of light and the x, y, and z axes. Lastly, the intensity of the light emitted is the variable.
  • Pages: 1
  • Words: 286

The Systems Analyst Profession

The profession of a system analyst in the modern labor market is one of the most demand due to the rapid development of information technology.
  • Pages: 3
  • Words: 909

The Amazon Web Service Key Features

When it comes to the hardware of the AWS system, there are various concepts that a reader must understand to comprehend the configurations of the Amazon application.
  • Pages: 6
  • Words: 1505

The Triumph of the Nerds Video Analysis

It highlights the different factors that led to the fallout between IBM and Microsoft and how different working cultures influenced the success of the two companies.
  • Pages: 3
  • Words: 894

Sampling Resolution and Quantization

The spatial resolution of a digitized image is affected by the sampling rate, whereas the amount of grey levels in a digital snapshot is controlled by the quantization level.
  • Pages: 2
  • Words: 565

Why Linux Is Better Operating System Than Windows

The second reason why Linux is better is the relative reliability of the system and its resistance to hacker attacks, which is also due to the branched principle of individual encoding of each particular OS. [...]
  • Pages: 1
  • Words: 284

Review of High Tech Crime Investigation

The difference between these aspects is that the file header is the internal part of how the file is perceived by the device, and the file extension is an external indicator for the user that [...]
  • Pages: 4
  • Words: 1171

The AutoCAD Software: Annotation and Tex

In relation to AutoCAD software, annotation as well as text aids in clarification and communication on the manner in which different types of information are displayed on drawings.
  • Pages: 1
  • Words: 282

Choosing a Server for a Company

A server is a computer that is used to share resources and manage processes across a network, and it frequently connects to the internet to assist remote users.
  • Pages: 1
  • Words: 288

Logic and Design: Flowcharts and Pseudocode

The basic understanding of logic and design is that processes should be presented in a way that demonstrates certain algorithms, i.e.the description of a process should be precise and should contain detailed instructions on what [...]
  • Pages: 2
  • Words: 590

Mobile Computing Technology and Accounting

Issues addressed include importance of the concept in the businesses today, the effects of mobile computing on accounting as well as business system, the relation of the technology with emerging technology and the future impact [...]
  • Pages: 2
  • Words: 657

Google Technologies That Are Currently Developing

One of the areas that Google invests in and promotes is self-driving automobiles. The company is working with the Renewable Energy Buyers Alliance to promote legislative changes that simplify corporate procurement of wind and solar [...]
  • Pages: 9
  • Words: 2681

Acquiring Knowledge About Computers

One of the key features of A.I.U.'s learning platform is the use of the Gradebook. The best feature of the instant messaging tool is the fact that it is easy to install with no additional [...]
  • Pages: 8
  • Words: 1930

Recommender Systems: Techniques and Uses

Consumers can have access to so many items on sale over the internet and recommender systems are there to help them make the right choice or pick according to their liking after they have inputted [...]
  • Pages: 4
  • Words: 1332

Software Engineering Online Learning Center

However, it is not easy to tell what the website is promoting just by the look of the homepage and thus, visitors with less time might not be interested to click to the sub-sections and [...]
  • Pages: 3
  • Words: 858

IDS Deployment: Purpose and the Degree of Risk

Among the reasons behind the use of an Intrusion Detection System in the company are in relation to access control. In addition to that it would be wise for the administrator to develop and enforce [...]
  • Pages: 3
  • Words: 900

Microcontroller Comparison Report

The microcontroller is therefore a very crucial device that largely determines the fulfillment of the objective of the system, provided the right algorithms are set in the programming stage.
  • Pages: 9
  • Words: 1888

Learning Outcomes: Digital Basics

The basic principle in digital basics is that electronic/computer engineers and technicians can be able to use the same design used in a light switch to create an electronic switch with the capacity to produce [...]
  • Pages: 2
  • Words: 553

Database and Data Warehousing for Smart Buy

The motivation for this proposal is that a data warehouse will enable Smart Buy to optimally exploit the potential of business intelligence in boosting its sales and on cutting down unnecessary expenditure.
  • Pages: 8
  • Words: 1686

Majoring in Computer Science: Key Aspects

Computer Science, abbreviated as CS, is the study of the fundamentals of information and computation procedures and of the hands-on methods for the execution and application in computer systems.
  • Pages: 3
  • Words: 854

Web Service Security: SAML and XACML

One reason for the development of this language can be traced to the need for a standard, generic and powerful access control and specification language.
  • Pages: 3
  • Words: 457

Comparison Between WiMax and LTE

The traditional mobile networks use the TDM and combination of the packet infrastructure that is partial, but with LTE and the WiMAX, they have simplified the network standards to the application of all- IP networks.
  • Pages: 7
  • Words: 1957

Mobile Devices and Convenience

Mobile devices that fulfill such requirements provide the merit of functionality optimization, mobile network security with the consequence of the reduction in costs associated with downtimes while not negating the privilege of reduced general costs [...]
  • Pages: 5
  • Words: 1618

Digital Information Technology

The nature of the configuration of the data path is also an important element in the design of data path and controller design.
  • Pages: 10
  • Words: 2653

Information Systems at WASS Film and Media

It is important for the business to asses the risks involved in new technologies and new ways of using information system for such will prepare managers and the owners of WASS Film and Media to [...]
  • Pages: 5
  • Words: 566

Advanced Data & Computer Architecture

Solid knowledge and understanding of the information architecture, access, storage mechanisms and technologies, internet mechanisms, and systems administration contribute to the complete knowledge of the whole system architecture.
  • Pages: 8
  • Words: 2275

Computer Hardware: Structure, Purpose, Pros and Cons

The main focus of the post is with respect to the security issues of web 2. 0 technologies is susceptible to is SQL injection attacks, which primarily entail the use of a code injection technique [...]
  • Pages: 3
  • Words: 961

Ethical Considerations in Information Technology

Some of these rules of ethics in security information include respect to matters of privacy and anonymity, taking responsibility, respect to intellectual property, and provision of diligent and professional services to principals and even acting [...]
  • Pages: 2
  • Words: 482

HTML GUI vs. Text Editors

The demand for access to the Internet has only continued to rise and this is because the Internet has been able to bring the whole world together.
  • Pages: 4
  • Words: 1252

Computer Technology: Databases

Databases are components of Information Systems that are used when the Information Systems have large amounts of a, especially when the interfaces in the Information System are interactive, and when users can access the system [...]
  • Pages: 2
  • Words: 576

The RAD Tutorials Under the Network Layer

In addition, the paper provides an evaluation of the tutorial and experience of the tutorials. There are various protocols and network architectures that can be used in the implementation of VPN, with the most common [...]
  • Pages: 2
  • Words: 583

Text Message Device Design Analysis

This report is a description of a project to design and install a text messaging device on the office door of the professor to enable them to communicate with students and other people that might [...]
  • Pages: 10
  • Words: 2485

Global Climate and Computer Science

In an attempt to discover the role technology can play in the research of climate change, several approaches have been recommended by the UN's Intergovernmental Panel on Climate Change.
  • Pages: 4
  • Words: 611

Machine Learning and Bagging Predictors

The aggregate uses the average of the single predictors, to improve the accuracy of prediction especially for unstable procedures such as neural sets, regression trees and classification trees.
  • Pages: 2
  • Words: 558

GNS3 and Explaining How to Work With It

GNS3 is a graphical network simulator, which provides a platform for the simulation of a complex network. It is a powerful tool for real labs and is used by network engineers as well as other [...]
  • Pages: 2
  • Words: 588

IP Addresses Running Out Problem

In response to the growing concerns regarding the exhaustion of numeric addresses in IP version 4, internet designers have sought to establish a long term solution to the problem by launching a new addressing format [...]
  • Pages: 3
  • Words: 826

Using Software Application Packages

The figure below shows the main window of a Microsoft Publisher application. In such a case, the seller or firm is the only producer of the product.
  • Pages: 5
  • Words: 1077

Concept Drifts and Machine Learning

The main theory that is used in explaining machine learning is referred to as the computational learning theory where the learning theory is focused on the probabilistic performance bounds of the learning algorithm because the [...]
  • Pages: 10
  • Words: 2774

Introduction to the Web Mining

Today World Wide Web has become an increasingly popular platform for storing, retrieving, and disseminating information as a result of the significant and rapid growth of Web data the knowledge available over the Internet.
  • Pages: 7
  • Words: 1857

Network Caching Overview and Analysis

The second importance of the application of caching in networking is a productivity increase in the end-users. This request is subject to the rules of filtering traffic that are employed by the server.
  • Pages: 11
  • Words: 2659

Lighting Techniques in 3D Animation

In distinction with 2D animation where every frame should be painstakingly painted and filled in with the required tints, lights, and shadows, lighting in 3D animation is performed by pointing the source of light, while [...]
  • Pages: 4
  • Words: 1122

Evaluation of Software: Oracle

On the other, hand, it can be stated that for the other part of the company's business, i.e, standard production, the functionality of the suite will be sufficient to perform satisfy all the needs of [...]
  • Pages: 2
  • Words: 704

Token-Based MAC Protocols: Wireless Networks

In the case of the wireless networks, the radio frequency in which the network is tuned is the only medium. The key difficulties of wireless data transmission are the encoding of the data, speed of [...]
  • Pages: 9
  • Words: 2448

Impact and Types of Networks

The demerit of this kind of network is that if the server is faulty the entire network will be brought to a halt.
  • Pages: 2
  • Words: 713

LAN Design for Return2Fender Company

This necessitates the requirements of ensuring a network is designed to link all the offices without compromising performance for the sake of business enhancement and continuity.
  • Pages: 5
  • Words: 1247

Computer Network: Electronic Mail Server

In practice, the major problem of sending messages to various different email addresses is typically solved by entering a list of multiple addresses separated by comma within the "To", "BCC", or "CC" fields of the [...]
  • Pages: 20
  • Words: 5456

Reverse Engineering for Software Maintenance

To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences.
  • Pages: 16
  • Words: 4361

Windows Vista Operating System

But, windows VISTA domain configuration is a group of computers managed together and it is mainly used by the users in the business field. Some of the strengths and weaknesses of Windows Vista are given [...]
  • Pages: 5
  • Words: 1686

The New Software Implementation

The new software had to organize the work of three teams: the PM team, equipment reliability team, and information and communications technology team.
  • Pages: 2
  • Words: 576

Overview of Computer Languages – Python

A computer language helps people to speak to the computer in a language that the computer understands. Also, Python Software Foundation, which is a not-for-profit consortium, directs the resources for the development of both Python [...]
  • Pages: 3
  • Words: 818

Integrated Computation and Communication

Industrial edge computing, which requires more time, can optimize data, computation, and storage resources through smart gateways and local clouds. As a supplement, industrial edge computing can ensure interoperability, self-optimization, and reduction of industrial clouds' [...]
  • Pages: 1
  • Words: 265

Michael Dell and Andy Grove: A Comparison

One of the challenges and resistance that Dell faced was in the application of the customer-based strategy in the organization since some of the managers who opposed this approach forced their views on the customer.
  • Pages: 3
  • Words: 852

Problems of the Existing Gaming Industry

This creates a barrier in the communication between a generation that is game-centered and people who do not spend as much time in front of the screen. Younger people are more susceptible to the influence [...]
  • Pages: 2
  • Words: 574

Color Map Pattern Method

If as a result of the test, it will be possible to reconstruct the original image using the data that in the process of running the sequence was stored in an array.
  • Pages: 2
  • Words: 567

Importance of Software in the Manufacturing Industry

There are however several challenges that must be addressed for the manufacturing industry to be a success. The challenges that must be tackled are those to do with the costs of manufacturing and the time [...]
  • Pages: 4
  • Words: 1145

What Is a Flash Drive

This is not found in the other mentioned drives and hence when storing information it would be easy to know the size of free space left.
  • Pages: 2
  • Words: 765

History of the Personal Computer: From 1804 to Nowadays

The Analytical engine was a far more sophisticated general purpose computing device which included five of the key components that performed the basic of modern computers. A processor/Calculator/Mill-this is where all the calculations were performed.
  • Pages: 5
  • Words: 1346

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Pages: 2
  • Words: 598

Hardware and Operating Systems

All the computer systems in a given campus will be connected to a server in the campus using Ethernet via a hub.
  • Pages: 6
  • Words: 2056