Computer Science Essay Examples and Topics. Page 4

462 samples

Network Consultation for DesignIT Company

DesignIT will use Ethernet network design, which is small and suitable for the size of the company. The network architecture will allow DesignIT to provide network to serve all its users.
  • Pages: 8
  • Words: 1625

Firewalls for Corporate Usage

It gives a description of a scenario of a company with identified threats and a review of a firewall product that matches the risks. It has an extensive network divided into a number of subnets [...]
  • Pages: 2
  • Words: 619

Making a PowerPoint Presentation

Tim Washer, attempts to highlight some of the issues that affect the effectiveness of a PowerPoint presentation and how one can solve these issues. In addition, Washer suggests that developing a story relevant to the [...]
  • Pages: 2
  • Words: 572

Home Network: Hardware and Security Management

00, it is important to describe the required hardware and the network system; to select concrete items to be used for completing the home network; to discuss the approach to beck up devices, and to [...]
  • Pages: 3
  • Words: 829

Internet Piracy and SOPA Act

At the end of it all, internet piracy will hurt the same people who are profiting from it because they will have fewer materials to sell or distribute in the future.
  • Pages: 2
  • Words: 559

Humanities and Computer Science Collaboration

Much attention has over the years been given to IS as a social science, and much has been published on the application of IS in the humanities, however, the gap in the reflection and theory [...]
  • Pages: 12
  • Words: 3679

Salesforce.com: Cloud Computing

The firm also faced the challenge of demonstrating to its clients that it was dependable and safe enough to manage their corporate data and applications remotely.
  • Pages: 2
  • Words: 553

VMware Services Basic Requirements

Processor requirements can be greater if the database operates on the same computer.vCentre server also requires a minimum of 4GB RAM.
  • Pages: 2
  • Words: 577

Virtual Machines and Tools to Manage Them

To start the conversion process, turn on the conversion wizard by first selecting and configuring the hardware and software of the physical machine to and by creating a destination folder to house the new virtual [...]
  • Pages: 2
  • Words: 582

Apple Still Has a Privacy Problem

A continuum of legal issues concerning consumer privacy and security have affected the demand of Apple phone and computer products in the consumer market, consequently prompting Apple Company to strategize on means of protecting information [...]
  • Pages: 5
  • Words: 1504

Internet Censorship: Blocking and Filtering

It is the obligation of the government to protect the innocence of the children through internet censorship. In some nations, the government uses internet blocking and filtering as a method to hide information from the [...]
  • Pages: 4
  • Words: 1097

Adobe Corporation Interactive Installation

This is one of the things which make this installation attractive to the users. The interactive installation discussed in this paper is a good example of such media.
  • Pages: 4
  • Words: 1099

The Multics Operating System Project

The architect linked "the file system with the memory access system". The Stratus VOS operating system had relied on "Multics to design its internal and external features".
  • Pages: 4
  • Words: 1156

Computer Security – Information Assurance

Some of the health care information stored in shared computers is sensitive, and it calls for health care practitioners to use a two-factor authentication to make sure that other users do not access the information. [...]
  • Pages: 4
  • Words: 1159

Two Greatest Hacking Systems in the USA

Appropriating intellectual output of someone else is also a computer malpractice that is intolerable. Generally, Computer malpractice is seen when a person shows hasty and careless conducts or behaviors when making use of computer systems.
  • Pages: 3
  • Words: 950

Network Security and E-Business

The introduction of e-businesses has resulted to the need to modify the computer security systems from keeping the unwanted users away, but enabling the targeted people to access the network.
  • Pages: 7
  • Words: 2184

Information Security: User’s Responsibility

The purpose of this project is to investigate the role played by information users in information security management. Why do employees engage in security-related risks that lead to breach of information security in the contemporary [...]
  • Pages: 3
  • Words: 832

Homomorphic Encryption: Communication and Security

Public cloud providers need the intervention of homomorphic encryption to promote security on the access of information. The access of information on the Internet may be dangerous because other competitors may be able to access [...]
  • Pages: 3
  • Words: 845

Emergency Communications Program

The first component of the plan entails training a group of employees in the identification of the internal and external constituents to be included in the evaluation of the terrorist threat.
  • Pages: 4
  • Words: 974

Information Security Basics

An important aspect of malware code is that it is installed in a computer without the consent of the owner of the computer.
  • Pages: 6
  • Words: 1762

Digital Evidence Presentation

The technology of the drive relates to the manner used to store data or the method of connecting to other computer-system parts, like the motherboard.
  • Pages: 10
  • Words: 3210

Evaluation of the BackTrack Software Suite

According to the reviews, BackTrack can be easily used in the commerce environments because of the open access to the tools, and BackTrack is "good for web application assessment", and it is "perfect for penetration [...]
  • Pages: 3
  • Words: 873

Cryptology and Data Protection

The key will be used to encrypt data for sending to the warehouse and the same key will be used to decrypt data on receipt from the warehouse.
  • Pages: 3
  • Words: 955

Low-Power Microcontrollers

Power supply from portable batteries has a significantly low voltage component, which affects the efficiency of the supply and the ability of the devices to adapt to the capabilities of the batteries.
  • Pages: 3
  • Words: 883

Is Thunderbolt the Real Deal?

The Thunderbolt technology storage devices provide an opportunity for manufacturers to continue in the process of providing both professionals and consumers with quality devices.
  • Pages: 3
  • Words: 759

Security in the Information Communication Technology

These include adapting the users to the system and getting the involvement of users through soliciting their input on ways of advancing the system. The corporate governance of the information security ought to begin from [...]
  • Pages: 12
  • Words: 3185

Adrian Lamo’s Hacking: Is It Right?

The example of Galileo introduces a theory about the construction of the Solar System that was the target of interest of the well-known scientist.
  • Pages: 2
  • Words: 602

Video Game Effects: Good or Bad?

Given the fact that there is indeed a logically sound rationale to such a suggestion, throughout the course of conducting my study, I remained thoroughly observant of the article's classification-related suggestions, in regards to the [...]
  • Pages: 4
  • Words: 1290

Cloud Computing in Network Security

In contrast, in cloud computing, the cloud provider encrypts customer's data before it is stored in the cloud. Identity and Access Management is another protocol that can be used to manage users accessing data in [...]
  • Pages: 5
  • Words: 1393

Information systems (IS) development

In the development of the information systems, the first stage is to describe and model the real problem that provides the need for the system.
  • Pages: 8
  • Words: 2279

Strategy And Controls In Information Security

An attack could comprise any of the following categories or a combination of any of them: Fabrications, which means adoption of some deceptions to play a trick on the unaware users of a system; Interruptions, [...]
  • Pages: 4
  • Words: 1319

MANETs Security Issues and Solutions

In addition to this, the physical security of nodes in a MANET cannot be guaranteed since unlike in traditional wireless networks, nodes in a MANET may exist in hostile environment where a node can be [...]
  • Pages: 10
  • Words: 2970

Systems and Network Security

In addition to monitoring the users of a system the Windows Server 2003 platform allows the administrator of the system to audit activity on the system by observing the system logs.
  • Pages: 15
  • Words: 3812

Security on Windows Server 2008

During execution, the process is given an access token that identifies it to the rest of the system and quite often this token will be the same as the user account that started the process.
  • Pages: 8
  • Words: 2319

Security Vulnerabilities in Software

This is a problem that has resulted from failure of the system, in the engineering processes which allocate the requirements of the system.
  • Pages: 2
  • Words: 720

Internet Key Exchange Protocol

On the other hand, a symmetric data encryption, also referred to as conventional data encryption, uses a common key to encrypt and decrypt data.
  • Pages: 3
  • Words: 828

Home Office: Network Attack Protection

In conclusion I believe that this kind of firewall is the best for small office as it is easy to install, affordable and it has all the security fractures ranging from IP management, to prevention [...]
  • Pages: 2
  • Words: 631

Information security in Small Scale Enterprises

With the physical security set-up, the management should now focus on technological aspects of the security plan, this are the process and procedures security maintenance to ensure that the information of a company is secure [...]
  • Pages: 8
  • Words: 2227

System Administrator Duties

Some of the core issues that the system administrator needs to keep users abreast of include: security of the systems and networks in use, user policies on the acceptable conduct, policy on the system backup [...]
  • Pages: 6
  • Words: 1613

Media Power and Post Modernity

There is a written text on the top of the photo with the name and model of the car. The written text on top of the people in the advert is similar to that of [...]
  • Pages: 8
  • Words: 2275

The Replica Data Security

The users and owners of the data have to be sure that the information is not vulnerable to hacking. This necessitated the development of data security software that is capable of limiting the total loss [...]
  • Pages: 4
  • Words: 1082

Intel and Advanced Micro Devices

Of the two companies, AMD was the first to introduce a 64-bit chipset with a clocking capability measurable in gigahertz. Although Intel chips resist over-clocking, the location of the L2 cache memory facilitates faster memory [...]
  • Pages: 2
  • Words: 547

Ethical Hacking: Bad in a Good Way

Introduction of personal computers led to the increase in the number of hackers as well as hacker targets were widened. Many hackers lack the skills to damage network systems in a major way.
  • 3
  • Pages: 6
  • Words: 1718

Putting Play to Work in Games of Empire

This editorial scrutinizes the workforce of digital games, the contentment and capacity of game invention, the predicaments facing this industry and the novel ideas that affect the firm.
  • Pages: 2
  • Words: 574

Hacking: Social Engineering Online

The information is fed to the main web site that's runs the hacking software, where the information is sorted according to various numbers.
  • Pages: 2
  • Words: 721

Information Security: A Critical Discussion

In more complex terms, however, the concept of information security is often viewed under the lens of protecting data and complex information systems from unauthorized or illegal access, use, revelation, interruption, modification, examination, inspection, recording [...]
  • Pages: 2
  • Words: 757

Spreadsheet Errors in Management

The first type of quantitative errors is mechanical errors which are defined as simple mistakes such as typing a number in the wrong cell and mistyping of numbers. In order to facilitate detection of errors, [...]
  • Pages: 4
  • Words: 856

Video Games Impact on Peoples Lives

These games have had a great influence in the minds of people, especially the children who have stopped playing the usual games on the fields to sticking on the computer and television screens playing video [...]
  • Pages: 12
  • Words: 3703

Information System

Office automation systems in this type of information system, tools or electronics improve on the efficiency of the employees and reduce the amount of work in an organisations office.
  • Pages: 2
  • Words: 660

Applications of Intelligent Agents

Bots may also be used in tasks that require very high speeds that cannot be achieved by humans, or in situations where the emulation of human activity is needed, for instance, a company can use [...]
  • Pages: 2
  • Words: 541

Information systems: safety of wireless networks

This paper provides an analysis case study in Australia concerning the security issues during the deployment of wireless networks for organizations and overview of the effect of "war driving" and 'war chalking" on the uptake [...]
  • Pages: 7
  • Words: 1880

Evaluating Security Software

Some of the antispyware software examples include; MacAfee internet security and Kaspersky internet security. The antispyware software examples are Webroot secure anywhere antivirus and stozilla.
  • Pages: 2
  • Words: 533

How Infographics Make it Easier to Receive Information

Some of the limitations to the use of images in infographics include the visual impairment of the intended subjects, lack of clarity in the presentation of the message, and existing personal viewing preferences such as [...]
  • Pages: 19
  • Words: 5180

Ethics in Computer Hacking

Hacking by no means follows ethics; the infiltration is to the benefit of hacker and loss of users of computer system, network or website.
  • Pages: 2
  • Words: 655

Security Technology Evaluation of Bank Solutions

However, through the utilization of the power of performance efficiency of decentralized systems and the possibility of elimination of distance through virtual connectivity of users, the centralized solution is the best choice for the data [...]
  • Pages: 5
  • Words: 1485

Computer Forensics and Investigations

It is crucial in the investigation of crimes that are related to the manipulation of computer systems. For digital evidence to be admissible in court, investigations should be conducted in a manner that adopts the [...]
  • Pages: 3
  • Words: 798

Preparing a Computer Forensics Investigation Plan

However, if the information is thought to be contained in the permanent storage, then a computer has to be shut down before transporting it to a laboratory for forensic analysis. The first step in the [...]
  • Pages: 3
  • Words: 858

Basic Operations of Computer Forensic Laboratories

All computer forensic laboratories in the US have to adhere to the national standards before they could be certified. Standard computer forensic equipment is used to support standard procedures and conditions in the laboratories.
  • Pages: 3
  • Words: 834

Technology of Human Resources and the Human Systems

The invention of printing, the slide ruler, the mechanical calculator, analog devices as well as algorisms between 0 CE and 1700s all culminated to the development of the computer by the start of the 1800s.
  • Pages: 5
  • Words: 1355

Children’s Game Analysis Project: The Sims

Being aimed at showing the daily activities of the family, the game is great in considering the roles of the family members and the distinguishing those in accordance with the gender roles.
  • Pages: 2
  • Words: 563

The Computer Microchip Industry

For instance, the company can decide to focus on durability and by doing so, the company will have a competitive advantage in the market.
  • Pages: 3
  • Words: 938

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Pages: 6
  • Words: 1670

The Role of Intranet in Health and Human Services Organization

Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. Individuals ought to be empowered to control the collection, use, and distribution [...]
  • Pages: 4
  • Words: 982

Open Source Systems: the Risks and Ethical Issues

In this paper, the risks and ethical issues associated with open-source systems are outlined and additionally, a one-page audit plan for an open-source system for Global Airline Co.prepared in order to boost the company's confidence [...]
  • Pages: 4
  • Words: 1261

Information Networking as Technology

Mozilla Firefox, Opera mini, and Seamonkey are the three web browsers covered in this project paper. Opera mini browser is by far better than Mozilla Firefox is; Opera mini is very efficient in terms of [...]
  • Pages: 2
  • Words: 591

Digital Technology – The Use of the Internet

Looking back, in retrospect, the computer that I first encountered was incomparable to the computers of today. The ultimate advancement in computer technology, for me, was the mainstream use of the internet.
  • Pages: 2
  • Words: 571

Security System: Information and Property within Business

Information security system Business information may include but not limited to information on employees, consumers, commodities offered, financial status of the business, business policies and also future plans of the business hence such information should [...]
  • Pages: 3
  • Words: 979
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.