Computer Science Essay Examples and Topics. Page 3

483 samples

Impact and Types of Networks

The demerit of this kind of network is that if the server is faulty the entire network will be brought to a halt.
  • Pages: 2
  • Words: 713

LAN Design for Return2Fender Company

This necessitates the requirements of ensuring a network is designed to link all the offices without compromising performance for the sake of business enhancement and continuity.
  • Pages: 5
  • Words: 1247

Information Technology Infrastructure

Anything to be communicated like a message starts at the application layer with the top layer and moves down the OSI layers to the bottom layer which is the physical layer.
  • Pages: 3
  • Words: 1261

Hubs and L2 Switches in IEEE 802.3 Based Network

But there are some differences in the behavior of hubs and switches in the network of such kind. They transfer data and frames between nodes on the local network segments, and in some cases correct [...]
  • Pages: 3
  • Words: 923

DSL Technologies and Other Internet Networks

Identifiers are placed on the headers of the packets and this enables the switches on the network to correctly recognize the packet and be able to foreword it to the correct switch within the network.
  • Pages: 3
  • Words: 804

Computer Network: Electronic Mail Server

In practice, the major problem of sending messages to various different email addresses is typically solved by entering a list of multiple addresses separated by comma within the "To", "BCC", or "CC" fields of the [...]
  • Pages: 20
  • Words: 5456

Digital Systems Virtual Local Area Network

A VLAN saves the situation of the user when the network gets so large and is encountering much traffic. Frame tagging is the criteria used to determine the logical grouping of nodes into a VLAN.
  • Pages: 3
  • Words: 827

Java Engagement for Teacher Training Workshop

Advanced Placement is one year course in which the college board gives two exams in computer science to students in high school9namely.the division between computer science A and AB, A is part of the content [...]
  • Pages: 2
  • Words: 629

International Uses of Relational Technology

To begin with, it should be stated that the development of the IT sphere and the spread of communication technologies have changed the image of business management essentially.
  • Pages: 2
  • Words: 534

Reverse Engineering for Software Maintenance

To reduce the possibility of errors set up during the change process, the software engineer has to know the system amply well so the changes which he made to the source code have expected consequences.
  • Pages: 14
  • Words: 4361

Peer-to-Peer Computing Technology

Complexity This is another important issue the developers of the routing have to keep in mind. Napster is an important application of the peer to peer routing systems.
  • Pages: 9
  • Words: 2863

The New Software Implementation

The new software had to organize the work of three teams: the PM team, equipment reliability team, and information and communications technology team.
  • Pages: 2
  • Words: 576

Overview of Computer Languages – Python

A computer language helps people to speak to the computer in a language that the computer understands. Also, Python Software Foundation, which is a not-for-profit consortium, directs the resources for the development of both Python [...]
  • Pages: 3
  • Words: 818

Integrated Computation and Communication

Industrial edge computing, which requires more time, can optimize data, computation, and storage resources through smart gateways and local clouds. As a supplement, industrial edge computing can ensure interoperability, self-optimization, and reduction of industrial clouds' [...]
  • Pages: 1
  • Words: 265

Computers and Transformation From 1980 to 2020

The humanity dreams about innovative technologies and quantum machines, allowing to make the most complicated mathematical calculations in billionths of a second but forgets how quickly the progress of computers has occurred for the last [...]
  • 5
  • Pages: 3
  • Words: 1058

The Idea of Quantum Computing at D-Wave

The most important point about the idea of quantum computing at D-Wave is that the company quickly realized the marketing potential of it and took over the quantum computing market.
  • Pages: 4
  • Words: 1150

Michael Dell and Andy Grove: A Comparison

One of the challenges and resistance that Dell faced was in the application of the customer-based strategy in the organization since some of the managers who opposed this approach forced their views on the customer.
  • Pages: 3
  • Words: 852

Problems of the Existing Gaming Industry

This creates a barrier in the communication between a generation that is game-centered and people who do not spend as much time in front of the screen. Younger people are more susceptible to the influence [...]
  • Pages: 2
  • Words: 574

Color Map Pattern Method

If as a result of the test, it will be possible to reconstruct the original image using the data that in the process of running the sequence was stored in an array.
  • Pages: 2
  • Words: 567

McAfee Labs Threats Report: August 2015

The authors of the report also note that the existence of TOR and Bitcoin significantly increases the capabilities of criminals to remain undetected.
  • Pages: 3
  • Words: 850

Importance of Software in the Manufacturing Industry

There are however several challenges that must be addressed for the manufacturing industry to be a success. The challenges that must be tackled are those to do with the costs of manufacturing and the time [...]
  • Pages: 4
  • Words: 999

Comparing Windows With Linux

The second one is the management of the multitasking ability of a computer while the third one is to service computer programs. The other difference is that windows is a closed source operating system while [...]
  • Pages: 2
  • Words: 598

Comparison of Apple Versus Windows Based Laptops

Windows 98 was released in 1998 and the second version of it was released in 1999. A more developed version of windows called windows vista was released in 2006 and its server was released in [...]
  • Pages: 6
  • Words: 1706

Hardware and Operating Systems

All the computer systems in a given campus will be connected to a server in the campus using Ethernet via a hub.
  • Pages: 6
  • Words: 2056

The Effectiveness of the Computer

The modern computer is the product of close to a century of sequential inventions. We are in the information age, and the computer has become a central determinant of our performance.
  • Pages: 4
  • Words: 1225

Evaluation of Macbook Laptop

The level can be as high as 160 GB hard disk which is double the original in the case of the black Mac Book.
  • Pages: 2
  • Words: 644

Satisfaction With a Transitional Nursing Home Project

The abstract does mention the dependant variable of the study viz.satisfaction with the transitional program; it does not, however, mention and discusses the various dimensions of the dependant variable that were measured in order to [...]
  • Pages: 6
  • Words: 1562

COMAIR and Business Information Systems

The next step is to develop a business information system able to consolidate relevant information that in turn can be used by management to make crucial and timely decisions.
  • Pages: 11
  • Words: 2991

Why to Choose Mac Over Windows Personal Computer

While the basic functionality of the operating system on a computer is the same, both operating systems differ in terms of their characteristics and the specific benefits that they provide to the end user.
  • Pages: 11
  • Words: 3056

Agent Technology & MANET

The MANET, therefore, has the option of connecting to the entire network or it may as well assume the operation of the fashion of the standalone.
  • Pages: 6
  • Words: 1746

Gaming Industry: FIFA 09 Analysis

The advertisement which will be analyzed in this paper is of FIFA 09, the game is a sequel to the FIFA series which is released by EA sports each year.
  • Pages: 2
  • Words: 333

Routers and Switches Technology Review

These ports have connectors and are used to provide connections to different computers and servers, to electrical circuits to divert power, and also in display illumination circuits where a number of LEDs and lights are [...]
  • Pages: 2
  • Words: 553

Fiber Optics: Principles and Practices

CDs and DVDs are two types of Optical storage, which are low cost, removable, optical storage media. Fibre optics and Optical storage devices have changed the phase of data transfer and storage, communication and medical [...]
  • Pages: 2
  • Words: 831

Resolving Software Problem: Timberjack Company

The former thought that it would be more efficient to outline the scope and directions of the software project in just few pages and give it to specialists which would realize it.
  • Pages: 3
  • Words: 838

User Interface Design of Digital Do It Yourself

Information technology has grown up a lot and a number of trends in different fields are changed due to the rapid growth of information technology. DIY is specially designed keeping in mind the needs and [...]
  • Pages: 3
  • Words: 911

Software Size Measurement Methods

As for the case of software estimation, I have been enlightened that the key to credible software sizing is to use a variety of software sizing techniques and not rely on a single source or [...]
  • Pages: 4
  • Words: 1170

Nanotechnology: Dream or Reality Future?

Research and technology development at the atomic, molecular, or macromolecular levels, in the length scale of approximately 1-100 nanometer range, to provide a fundamental understanding of phenomena and materials at the nanoscale and to create [...]
  • Pages: 5
  • Words: 1802

Why Writing Software is Expensive?

There is no need to elaborate on the fact that this generation is witness to one of the greatest explosions of knowledge in the history of human existence.
  • Pages: 4
  • Words: 1864

Information Systems Management. Network Topologies

In this topology, a device wanting to communicate with other devices in the same network sends a message to the backbone cable, which all the devices see, but it's only the intended recipient that gets [...]
  • Pages: 2
  • Words: 551

Windows XP Operating System’s Installation Process

The windows XP installation will continue without interference since you are installing from a full version windows XP CD. The installation will restart the computer and this time it will take you back into the [...]
  • Pages: 2
  • Words: 522

Computer Science. Open Systems Interconnection Model

This model was originally created as the basis for crafting a universal set of protocols called the OSI Protocol Suite. The OSI then became a device for defining the networking and functioning of the OSI [...]
  • Pages: 3
  • Words: 427

Infrared Wireless Local Area Networks

In general, a client must be configured with the appropriate SSID to gain access to the wireless LAN. In OSA, the wireless device does not have a specific cryptographic key to allow for authentication with [...]
  • Pages: 2
  • Words: 739

An IaaS Management Architecture

With these systems in place, the solution is capable of handling a wide range of tasks typical for the architecture. The following paper provides an overview of the architectures used in a solution described in [...]
  • Pages: 9
  • Words: 850

Home Networks, Their Functions and Features

A home network is a small local area network that enables communication among two or more computing devices within a limited area of a home. Typical elements of a home network are a modem, a [...]
  • Pages: 18
  • Words: 552

Software Architecture and Its Styles in Examples

The purpose of software architecture is to solve issues and design problems beyond the basic algorithms and data structures used in software instead of focusing on structural phenomena.
  • Pages: 4
  • Words: 1244

Supercomputer Design, Hardware and Software

The advantage of shared memory is that it implies the existence of a unified space from which all the necessary data can be retrieved; however, different processors usually need access to certain kinds of data [...]
  • Pages: 7
  • Words: 1960

Information About Network Devices

A solid router capable of managing the network of a small business, in case the four ports it is equipped with will be enough.
  • Pages: 2
  • Words: 560

WiMax Technology Specific Aspects

Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of computer networks.
  • Pages: 7
  • Words: 2020

Kai-Fu Lee Restores China’s Technology Leadership

A recent reconsideration of the role of China in the evolution of technology has revealed, though, that the Chinese organizations still deliver innovative products; however, because of the competition with the Western brands of a [...]
  • Pages: 4
  • Words: 1145

Allocating a Personal Computer

I can confirm that the supervisor and the rest of the team at the CSD treat me as one of their colleagues and not just a temporary intern.
  • Pages: 3
  • Words: 855

Data Life Cycle Management

The most important part of the testing is the creation of the queries as it would benefit the integrity of the database.
  • Pages: 2
  • Words: 564

Computers and Web 2.0

The perspectives in which the online platform is expected in 2012 is undoubtedly different to that of 5 years before-thus the emerging of the brand Web 2.0.
  • Pages: 7
  • Words: 1973

Computer Games and Instruction

Even though the designs of the people in the game left much to be desired and most of the characters looked like the Pixar movie rejects, it was still a lot of fun to create [...]
  • Pages: 3
  • Words: 826

Media: Memex by Bush v. Dynabook by Kay & Goldberg

While both of the articles serve as examples of the prediction of future inventions widely used in the modern world, the ideas proposed by the authors have significant differences related to the specifics of their [...]
  • Pages: 2
  • Words: 554

Business Software Quality and Reliability

The only way to mitigate this contributor is to provide the developers with training sessions and peer-review the system with the help of experts in the field.
  • Pages: 3
  • Words: 867

Intelligent Input/Output Technologies

As it is mentioned above, the concept of I2O hardware architecture was developed by the Intel Corporation. This section is intended to compare the most significant advantages and disadvantages of I2O techniques.
  • Pages: 2
  • Words: 537

Applied E-Systems and Pervasive Computing

However, the mobile interface is the graphical enhancement that allows individuals to interact with their device and communication infrastructure. In contrast, the mobile interface is a program that links the software and hardware.
  • Pages: 5
  • Words: 1412

Microsoft Operating Systems on Trial

The incompatibility of older software and the enhanced capabilities of the new operating system in some cases force users to upgrade to perform their job, meaning that they would not have a choice but receive [...]
  • Pages: 2
  • Words: 561

Nintendo Game Innovation: Wii’s Principles

In this case, it has to be mentioned that Sony's PlayStation was paying substantial attention to the quality of the image, sound, and speed of the processor to build a perception of one of the [...]
  • Pages: 3
  • Words: 820

Radix Sort Algorithm, Its Logic and Applications

The sorting process starts from the rightmost digit based on the key or the positions of the numbers being sorted. LSD radix sorts the integers from the least to the most significant digit.
  • Pages: 3
  • Words: 823

Graph Theory Application in Computer Science

Speaking about the classification of graphs and the way to apply them, it needs to be noted that different graphs present structures helping to represent data related to various fields of knowledge.
  • Pages: 4
  • Words: 1111

Ethical Responsibility: MS Excel and SPSS

The focus of the present paper is to illuminate several issues related to the MS Excel and SPSS software applications, and also to use a case scenario to discuss the ethical responsibilities associated with criminal [...]
  • Pages: 3
  • Words: 919

Human Computer Interaction: Types of Special Needs

The rapid growth of the information technology sector worldwide, with the accompanying rise and spread of the internet denotes the intensity of the challenge of meeting the special needs of persons who cannot use the [...]
  • Pages: 4
  • Words: 1227

Informatics as an Approach and a Theory

The multidisciplinary approach to informatics, in my view, has led to the many different definitions of informatics as professionals use the lens of individual disciplines or fields of expertise to make sense of the processes, [...]
  • Pages: 3
  • Words: 866

Computer Reservations System in Hotel

That is why, it is obvious that blistering development of systems of this sort became possible due to the evolution of means of communication and discoveries in the field of digital technologies.
  • Pages: 5
  • Words: 1316

VSphere Computer Networking: Planning and Configuring

In order to successfully configure vSphere networking, it is prudent to begin the procedure by establishing the capabilities of a vSS. VM ports and VMkernel ports are the two types of distinct connections in this [...]
  • Pages: 2
  • Words: 604

Information Technology Architecture

Each non-functional attribute or requirement of an information system makes it easier for employees to use the software in an effective manner.
  • Pages: 2
  • Words: 550

Modern Technology: Development and Effects

It has made the daily functions easier and more practical, as the software programs, internet and stored memory have extended the use of information and understanding.
  • Pages: 2
  • Words: 559

Public Key Infrastructure System

The primary purpose of the paper is to evaluate the significance of implementation of the public key infrastructure in the working process and discuss strength and weaknesses of the system.
  • Pages: 3
  • Words: 843

Watching TV Makes You Smarter?

Although it is true that watching TV and playing video games can be mentally stimulating activities, it is important to remember the value of selecting shows and video games that can help children accomplish the [...]
  • Pages: 3
  • Words: 891

How to Stop Internet Crime?

While discussing the evolution of the cyberspace and providing the techniques to protect users from the Internet crimes, Hallam-Baker focuses his attention on the idea that the Internet should be strengthened with references to the [...]
  • Pages: 3
  • Words: 840

Operating System and Applications Support

The hardware consists of devices that support input and output functions, provides an interface for users to interact with the computer or the software by enabling users to enter commands which are translated by the [...]
  • Pages: 2
  • Words: 540