Computer Science Essay Examples and Topics. Page 3

399 samples

Resolving Software Problem: Timberjack Company

The former thought that it would be more efficient to outline the scope and directions of the software project in just few pages and give it to specialists which would realize it.
  • Pages: 3
  • Words: 838

User Interface Design of Digital Do It Yourself

Information technology has grown up a lot and a number of trends in different fields are changed due to the rapid growth of information technology. DIY is specially designed keeping in mind the needs and [...]
  • Pages: 3
  • Words: 911

Software Size Measurement Methods

As for the case of software estimation, I have been enlightened that the key to credible software sizing is to use a variety of software sizing techniques and not rely on a single source or [...]
  • Pages: 4
  • Words: 1170

Nanotechnology: Dream or Reality Future?

Research and technology development at the atomic, molecular, or macromolecular levels, in the length scale of approximately 1-100 nanometer range, to provide a fundamental understanding of phenomena and materials at the nanoscale and to create [...]
  • Pages: 7
  • Words: 1802

Why Writing Software is Expensive?

There is no need to elaborate on the fact that this generation is witness to one of the greatest explosions of knowledge in the history of human existence.
  • Pages: 6
  • Words: 1593

Information Systems Management. Network Topologies

In this topology, a device wanting to communicate with other devices in the same network sends a message to the backbone cable, which all the devices see, but it's only the intended recipient that gets [...]
  • Pages: 2
  • Words: 551

How Computers Negatively Affect Student Growth

Accessibility and suitability: most of the school and student do not have computers that imply that they cannot use computer programs for learning, lack of availability of internet facilities' availability also makes the students lack [...]
  • Pages: 2
  • Words: 611

Windows XP Operating System’s Installation Process

The windows XP installation will continue without interference since you are installing from a full version windows XP CD. The installation will restart the computer and this time it will take you back into the [...]
  • Pages: 2
  • Words: 522

An IaaS Management Architecture

With these systems in place, the solution is capable of handling a wide range of tasks typical for the architecture. The following paper provides an overview of the architectures used in a solution described in [...]
  • Pages: 9
  • Words: 850

Software Architecture and Its Styles in Examples

The purpose of software architecture is to solve issues and design problems beyond the basic algorithms and data structures used in software instead of focusing on structural phenomena.
  • Pages: 4
  • Words: 1244

Supercomputer Design, Hardware and Software

The advantage of shared memory is that it implies the existence of a unified space from which all the necessary data can be retrieved; however, different processors usually need access to certain kinds of data [...]
  • Pages: 7
  • Words: 1960

Information About Network Devices

A solid router capable of managing the network of a small business, in case the four ports it is equipped with will be enough.
  • Pages: 2
  • Words: 560

DELL and HP Machines Comparison

The two brands are known to produce good quality machines, and consumers prefer these models over the rest of the models in the markets.
  • Pages: 2
  • Words: 598

Kai-Fu Lee Restores China’s Technology Leadership

A recent reconsideration of the role of China in the evolution of technology has revealed, though, that the Chinese organizations still deliver innovative products; however, because of the competition with the Western brands of a [...]
  • Pages: 4
  • Words: 1145

How to Reformat a Hard Drive?

The major reason as to why the formatting is done is in order to free the contents of the disk so that it can be used for other data. Soft disk drive: a disk for [...]
  • Pages: 6
  • Words: 1699

Data Life Cycle Management

The most important part of the testing is the creation of the queries as it would benefit the integrity of the database.
  • Pages: 2
  • Words: 564

Business Software Quality and Reliability

The only way to mitigate this contributor is to provide the developers with training sessions and peer-review the system with the help of experts in the field.
  • Pages: 3
  • Words: 867

Intelligent Input/Output Technologies

As it is mentioned above, the concept of I2O hardware architecture was developed by the Intel Corporation. This section is intended to compare the most significant advantages and disadvantages of I2O techniques.
  • Pages: 2
  • Words: 537

Applied E-Systems and Pervasive Computing

However, the mobile interface is the graphical enhancement that allows individuals to interact with their device and communication infrastructure. In contrast, the mobile interface is a program that links the software and hardware.
  • Pages: 5
  • Words: 1412

Microsoft Operating Systems on Trial

The incompatibility of older software and the enhanced capabilities of the new operating system in some cases force users to upgrade to perform their job, meaning that they would not have a choice but receive [...]
  • Pages: 2
  • Words: 561

Nintendo Game Innovation: Wii’s Principles

In this case, it has to be mentioned that Sony's PlayStation was paying substantial attention to the quality of the image, sound, and speed of the processor to build a perception of one of the [...]
  • Pages: 3
  • Words: 820

Graphic Card Industry and Evolution

A graphic card, usually, referred to as a video card or a graphic accelerator card is an electronic circuit installed on the motherboard inside the central power unit, mostly on Laptops and desktop computers.
  • Pages: 8
  • Words: 2193

Radix Sort Algorithm, Its Logic and Applications

The sorting process starts from the rightmost digit based on the key or the positions of the numbers being sorted. LSD radix sorts the integers from the least to the most significant digit.
  • Pages: 3
  • Words: 823

Network Administration and Its Importance

The term "typology" is used to define the geometric arrangements of the computers in a given network. The term network administration refers to the process of monitoring, maintaining, and upgrading computer systems and infrastructures in [...]
  • 5
  • Pages: 5
  • Words: 1413

Nintendo Wii as an Innovative Product

The paper aims at analyzing the case and answering the questions regarding the nature of the innovation, aspects of the value proposition, and details of the used business model.
  • Pages: 4
  • Words: 879

Informatics as an Approach and a Theory

The multidisciplinary approach to informatics, in my view, has led to the many different definitions of informatics as professionals use the lens of individual disciplines or fields of expertise to make sense of the processes, [...]
  • Pages: 3
  • Words: 866

VSphere Computer Networking: Planning and Configuring

In order to successfully configure vSphere networking, it is prudent to begin the procedure by establishing the capabilities of a vSS. VM ports and VMkernel ports are the two types of distinct connections in this [...]
  • Pages: 2
  • Words: 604

Recording Studio Equipment: Hardware and Software

The purpose of this report is to present the information on the necessary equipment to purchase; the justification of the equipment choices; the discussion of the equipment connectivity and the diagram; and the budget table [...]
  • Pages: 5
  • Words: 1500

Modern Technology: Development and Effects

It has made the daily functions easier and more practical, as the software programs, internet and stored memory have extended the use of information and understanding.
  • Pages: 2
  • Words: 559

Public Key Infrastructure System

The primary purpose of the paper is to evaluate the significance of implementation of the public key infrastructure in the working process and discuss strength and weaknesses of the system.
  • Pages: 3
  • Words: 843

Watching TV Makes You Smarter?

Although it is true that watching TV and playing video games can be mentally stimulating activities, it is important to remember the value of selecting shows and video games that can help children accomplish the [...]
  • Pages: 3
  • Words: 891

How to Stop Internet Crime?

While discussing the evolution of the cyberspace and providing the techniques to protect users from the Internet crimes, Hallam-Baker focuses his attention on the idea that the Internet should be strengthened with references to the [...]
  • Pages: 3
  • Words: 840

Operating System and Applications Support

The hardware consists of devices that support input and output functions, provides an interface for users to interact with the computer or the software by enabling users to enter commands which are translated by the [...]
  • Pages: 2
  • Words: 540

Microsoft Tips and Tricks

For instance the first tip highlights the usefulness of the control key to Microsoft Office Outlook. However, lessons drawn from the article can be applied to the latest versions of Microsoft office.
  • Pages: 2
  • Words: 557

Firewalls for Corporate Usage

It gives a description of a scenario of a company with identified threats and a review of a firewall product that matches the risks. It has an extensive network divided into a number of subnets [...]
  • Pages: 2
  • Words: 619

Home Network: Hardware and Security Management

00, it is important to describe the required hardware and the network system; to select concrete items to be used for completing the home network; to discuss the approach to beck up devices, and to [...]
  • Pages: 3
  • Words: 829

Computer Security and Computer Criminals

The main thing that people need to know is how this breach of security and information occurs and also the possible ways through which they can be able to prevent it, and that's why institutions [...]
  • Pages: 3
  • Words: 1026

Internet Piracy and SOPA Act

At the end of it all, internet piracy will hurt the same people who are profiting from it because they will have fewer materials to sell or distribute in the future.
  • Pages: 2
  • Words: 559

Humanities and Computer Science Collaboration

Much attention has over the years been given to IS as a social science, and much has been published on the application of IS in the humanities, however, the gap in the reflection and theory [...]
  • Pages: 12
  • Words: 3679

Salesforce.com: Cloud Computing

The firm also faced the challenge of demonstrating to its clients that it was dependable and safe enough to manage their corporate data and applications remotely.
  • Pages: 2
  • Words: 553

Virtual Machines and Tools to Manage Them

To start the conversion process, turn on the conversion wizard by first selecting and configuring the hardware and software of the physical machine to and by creating a destination folder to house the new virtual [...]
  • Pages: 2
  • Words: 582

Apple Still Has a Privacy Problem

A continuum of legal issues concerning consumer privacy and security have affected the demand of Apple phone and computer products in the consumer market, consequently prompting Apple Company to strategize on means of protecting information [...]
  • Pages: 5
  • Words: 1504

Internet Censorship: Blocking and Filtering

It is the obligation of the government to protect the innocence of the children through internet censorship. In some nations, the government uses internet blocking and filtering as a method to hide information from the [...]
  • Pages: 4
  • Words: 1097

Computer Science: Threats to Internet Privacy

Allegedly, the use of the Internet is considered to be a potential threat to the privacy of individuals and organizations. Internet privacy may be threatened by the ease of access to personal information as well [...]
  • Pages: 4
  • Words: 1100

The Multics Operating System Project

The architect linked "the file system with the memory access system". The Stratus VOS operating system had relied on "Multics to design its internal and external features".
  • Pages: 4
  • Words: 1156

Computer Security – Information Assurance

Some of the health care information stored in shared computers is sensitive, and it calls for health care practitioners to use a two-factor authentication to make sure that other users do not access the information. [...]
  • Pages: 4
  • Words: 1159

QR Codes: Are They Efficient?

QR codes platforms need to be made more secure to reduce security threats which users are exposed to. Some users are directed to malicious content and websites whenever they scan these codes.
  • Pages: 2
  • Words: 580

Two Greatest Hacking Systems in the USA

Appropriating intellectual output of someone else is also a computer malpractice that is intolerable. Generally, Computer malpractice is seen when a person shows hasty and careless conducts or behaviors when making use of computer systems.
  • Pages: 3
  • Words: 950

Network Security and E-Business

The introduction of e-businesses has resulted to the need to modify the computer security systems from keeping the unwanted users away, but enabling the targeted people to access the network.
  • Pages: 7
  • Words: 2184

Information Security: User’s Responsibility

The purpose of this project is to investigate the role played by information users in information security management. Why do employees engage in security-related risks that lead to breach of information security in the contemporary [...]
  • Pages: 3
  • Words: 832

Homomorphic Encryption: Communication and Security

Public cloud providers need the intervention of homomorphic encryption to promote security on the access of information. The access of information on the Internet may be dangerous because other competitors may be able to access [...]
  • Pages: 3
  • Words: 845

Emergency Communications Program

The first component of the plan entails training a group of employees in the identification of the internal and external constituents to be included in the evaluation of the terrorist threat.
  • Pages: 4
  • Words: 974

Information Security Basics

An important aspect of malware code is that it is installed in a computer without the consent of the owner of the computer.
  • Pages: 6
  • Words: 1762

Digital Evidence Presentation

The technology of the drive relates to the manner used to store data or the method of connecting to other computer-system parts, like the motherboard.
  • Pages: 12
  • Words: 3210

Evaluation of the BackTrack Software Suite

According to the reviews, BackTrack can be easily used in the commerce environments because of the open access to the tools, and BackTrack is "good for web application assessment", and it is "perfect for penetration [...]
  • Pages: 3
  • Words: 873

Cryptology and Data Protection

The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse.
  • Pages: 3
  • Words: 955

Low-Power Microcontrollers

Power supply from portable batteries has a significantly low voltage component, which affects the efficiency of the supply and the ability of the devices to adapt to the capabilities of the batteries.
  • Pages: 3
  • Words: 883

Is Thunderbolt the Real Deal?

The Thunderbolt technology storage devices provide an opportunity for manufacturers to continue in the process of providing both professionals and consumers with quality devices.
  • Pages: 3
  • Words: 759

Security in the Information Communication Technology

These include adapting the users to the system and getting the involvement of users through soliciting their input on ways of advancing the system. The corporate governance of the information security ought to begin from [...]
  • Pages: 12
  • Words: 3185

Adrian Lamo’s Hacking: Is It Right?

The example of Galileo introduces a theory about the construction of the Solar System that was the target of interest of the well-known scientist.
  • Pages: 2
  • Words: 602

Computer System Review and Upgrade

The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Pages: 6
  • Words: 1864

Video Game Effects: Good or Bad?

Given the fact that there is indeed a logically sound rationale to such a suggestion, throughout the course of conducting my study, I remained thoroughly observant of the article's classification-related suggestions, in regards to the [...]
  • Pages: 4
  • Words: 1290

Cloud Computing in Network Security

In contrast, in cloud computing, the cloud provider encrypts customer's data before it is stored in the cloud. Identity and Access Management is another protocol that can be used to manage users accessing data in [...]
  • Pages: 5
  • Words: 1393

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Pages: 8
  • Words: 2279

Strategy And Controls In Information Security

An attack could comprise any of the following categories or a combination of any of them: Fabrications, which means adoption of some deceptions to play a trick on the unaware users of a system; Interruptions, [...]
  • Pages: 4
  • Words: 1319

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Pages: 10
  • Words: 2970

Systems and Network Security

In addition to monitoring the users of a system the Windows Server 2003 platform allows the administrator of the system to audit activity on the system by observing the system logs.
  • Pages: 15
  • Words: 3812

Security Vulnerabilities in Software

This is a problem that has resulted from failure of the system, in the engineering processes which allocate the requirements of the system.
  • Pages: 2
  • Words: 720

Internet Key Exchange Protocol

On the other hand, a symmetric data encryption, also referred to as conventional data encryption, uses a common key to encrypt and decrypt data.
  • Pages: 3
  • Words: 828

Home Office: Network Attack Protection

In conclusion I believe that this kind of firewall is the best for small office as it is easy to install, affordable and it has all the security fractures ranging from IP management, to prevention [...]
  • Pages: 2
  • Words: 631

Open Source Project

However, factors such as; support, poor documentation, issues of proprietary software's and legal challenges have noted as major problems affecting the operations and success of Open Source Project The term "Open Source" is a common [...]
  • Pages: 18
  • Words: 4954

Information security in Small Scale Enterprises

With the physical security set-up, the management should now focus on technological aspects of the security plan, this are the process and procedures security maintenance to ensure that the information of a company is secure [...]
  • Pages: 8
  • Words: 2227

System Administrator Duties

Some of the core issues that the system administrator needs to keep users abreast of include: security of the systems and networks in use, user policies on the acceptable conduct, policy on the system backup [...]
  • Pages: 6
  • Words: 1370

Media Power and Post Modernity

There is a written text on the top of the photo with the name and model of the car. The written text on top of the people in the advert is similar to that of [...]
  • Pages: 8
  • Words: 2275

The Replica Data Security

The users and owners of the data have to be sure that the information is not vulnerable to hacking. This necessitated the development of data security software that is capable of limiting the total loss [...]
  • Pages: 4
  • Words: 1082

Intel and Advanced Micro Devices

Of the two companies, AMD was the first to introduce a 64-bit chipset with a clocking capability measurable in gigahertz. Although Intel chips resist over-clocking, the location of the L2 cache memory facilitates faster memory [...]
  • Pages: 2
  • Words: 547

Putting Play to Work in Games of Empire

This editorial scrutinizes the workforce of digital games, the contentment and capacity of game invention, the predicaments facing this industry and the novel ideas that affect the firm.
  • Pages: 2
  • Words: 574

Hacking: Social Engineering Online

The information is fed to the main web site that's runs the hacking software, where the information is sorted according to various numbers.
  • Pages: 2
  • Words: 721

Information Security: A Critical Discussion

In more complex terms, however, the concept of information security is often viewed under the lens of protecting data and complex information systems from unauthorized or illegal access, use, revelation, interruption, modification, examination, inspection, recording [...]
  • Pages: 2
  • Words: 757

Spreadsheet Errors in Management

The first type of quantitative errors is mechanical errors which are defined as simple mistakes such as typing a number in the wrong cell and mistyping of numbers. In order to facilitate detection of errors, [...]
  • Pages: 4
  • Words: 856

Globalization and Digitalization

The tools that are necessary in the technological exodus from the traditional mode to higher fashions have posed a challenge in the labor force in relation to the level of expertise.
  • Pages: 2
  • Words: 547