Computer Science Essay Examples and Topics. Page 4

399 samples

Computer Safety: Types and Technologies

The OS of a computer is a set of instructions communicating directly to the hardware of the computer and this enable it to process information given to it.
  • Pages: 10
  • Words: 2917

Video Games Impact on Peoples Lives

These games have had a great influence in the minds of people, especially the children who have stopped playing the usual games on the fields to sticking on the computer and television screens playing video [...]
  • Pages: 12
  • Words: 3703

Prezi vs. PowerPoint

In making presentations, the choice of presentation software to be used will be dictated by the amount of information the presenter wishes to pass to the audience, as well as the format of data the [...]
  • Pages: 6
  • Words: 1702

Information System

Office automation systems in this type of information system, tools or electronics improve on the efficiency of the employees and reduce the amount of work in an organisations office.
  • Pages: 2
  • Words: 660

Information systems: safety of wireless networks

This paper provides an analysis case study in Australia concerning the security issues during the deployment of wireless networks for organizations and overview of the effect of "war driving" and 'war chalking" on the uptake [...]
  • Pages: 7
  • Words: 1880

Evaluating Security Software

Some of the antispyware software examples include; MacAfee internet security and Kaspersky internet security. The antispyware software examples are Webroot secure anywhere antivirus and stozilla.
  • Pages: 2
  • Words: 533

How Infographics Make it Easier to Receive Information

Some of the limitations to the use of images in infographics include the visual impairment of the intended subjects, lack of clarity in the presentation of the message, and existing personal viewing preferences such as [...]
  • Pages: 19
  • Words: 5180

Ethics in Computer Hacking

Hacking by no means follows ethics; the infiltration is to the benefit of hacker and loss of users of computer system, network or website.
  • Pages: 2
  • Words: 655

Security Technology Evaluation of Bank Solutions

However, through the utilization of the power of performance efficiency of decentralized systems and the possibility of elimination of distance through virtual connectivity of users, the centralized solution is the best choice for the data [...]
  • Pages: 5
  • Words: 1485

Computer Forensics and Investigations

It is crucial in the investigation of crimes that are related to the manipulation of computer systems. For digital evidence to be admissible in court, investigations should be conducted in a manner that adopts the [...]
  • Pages: 3
  • Words: 798

Basic Operations of Computer Forensic Laboratories

All computer forensic laboratories in the US have to adhere to the national standards before they could be certified. Standard computer forensic equipment is used to support standard procedures and conditions in the laboratories.
  • Pages: 3
  • Words: 834

Unified Modeling Language (UML)

UML was created to be used in modeling of software intensive systems by use of diagrammatic models making it easy to introduce more objects to an existing project.
  • Pages: 2
  • Words: 616

Technology of Human Resources and the Human Systems

The invention of printing, the slide ruler, the mechanical calculator, analog devices as well as algorisms between 0 CE and 1700s all culminated to the development of the computer by the start of the 1800s.
  • Pages: 5
  • Words: 1355

The Computer Microchip Industry

For instance, the company can decide to focus on durability and by doing so, the company will have a competitive advantage in the market.
  • Pages: 3
  • Words: 938

Network Security and Its Importance in Computer Networks

In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other [...]
  • Pages: 6
  • Words: 1670

PC Models Comparative Analysis

Design features are also quite strong in two of the computers; the 27inch Apple iMac as well as the HP Touchsmart.
  • Pages: 4
  • Words: 1184

The Role of Intranet in Health and Human Services Organization

Privacy is the rights and responsibilities of an individual or organization with respect to the collection, use, retention, and disclosure of personal data. Individuals ought to be empowered to control the collection, use, and distribution [...]
  • Pages: 4
  • Words: 982

Open Source Systems: the Risks and Ethical Issues

In this paper, the risks and ethical issues associated with open-source systems are outlined and additionally, a one-page audit plan for an open-source system for Global Airline Co.prepared in order to boost the company's confidence [...]
  • Pages: 4
  • Words: 1261

Information Networking as Technology

Mozilla Firefox, Opera mini, and Seamonkey are the three web browsers covered in this project paper. Opera mini browser is by far better than Mozilla Firefox is; Opera mini is very efficient in terms of [...]
  • Pages: 2
  • Words: 591

Digital Technology – The Use of the Internet

Looking back, in retrospect, the computer that I first encountered was incomparable to the computers of today. The ultimate advancement in computer technology, for me, was the mainstream use of the internet.
  • Pages: 2
  • Words: 571

Security System: Information and Property within Business

Information security system Business information may include but not limited to information on employees, consumers, commodities offered, financial status of the business, business policies and also future plans of the business hence such information should [...]
  • Pages: 3
  • Words: 979