Computer Science Essays

49 samples found
essays on this Topic
Subject: Technology
Pages: 3
Words: 670
Rating: 4,7

Threats and future of cybersecurity

Security Issues with Ubiquitous Data, Mobile Devices, and Cybersecurity Considerations There have been a number of operational concerns on ubiquitous applications and data which have been…

View full sample
Subject: Political
Pages: 2
Words: 553
Rating: 4,7

Government and national security

It is the responsibility of the government to protect the state and the citizens it governs against any type of national crises using the various power…

View full sample
Subject: Technology
Pages: 4
Words: 1097
Rating: 4,5

Ways in which reseach can contribute to theory

Ellis and Levy (2008) argue that a well structured and research-worthy problem statement is the mainstay of a research. The problem statement is grounded in the…

View full sample
Subject: Technology
Pages: 3
Words: 749
Rating: 4,5

Target data breach

Cyber law Principles In December 2013, Target corporation one of the largest retailers in the U. S was hacked. In that event, it lost more than…

View full sample
Subject: Technology
Pages: 5
Words: 1373
Rating: 4,9

Cloud computing

Summary of the Points made by the Authors In his text titled Introduction to digital literacy, Bowles (2013) discusses some of the outstanding benefits of cloud…

View full sample
Subject: Technology
Pages: 6
Words: 1747
Rating: 4,5

Technology system protection and prevention

Abstract With advancement in computing technology comes the threat of malware and intruders. This paper seeks to explore mechanisms that can be used to protect and…

View full sample
Subject: Technology
Pages: 3
Words: 636
Rating: 4,8

Hardening the machines

Data security has always been an area of concern since the advent of computers and internet technologies. Information and data, which is stored in computer systems,…

View full sample
Subject: Technology
Pages: 3
Words: 753
Rating: 4,7

Online algorithms

Algorithms are important in information technology computations which help with problem-solving.  Notably, computers are designed to solve problems. The process of creating these solutions is based…

View full sample
Subject: Technology
Pages: 5
Words: 1404
Rating: 4,7

Research proposal: blockchain and cryptocurrency

Introduction and motivation Technological developments over the years have created ingenious ways of holding business transactions in safe and secure ways. One of the latest technological…

View full sample
Subject: Technology
Pages: 5
Words: 1411
Rating: 4,5

Security self-assessment for the United States army

Technology is dynamic. The Modus operandi of innumerable activities has transformed gradually due to the inescapable influence brought about by technology. More people are increasingly shifting…

View full sample
Subject: Technology
Pages: 2
Words: 550
Rating: 4,9

Virtual worlds     

The paper is an examining of the role virtual reality is playing in nursing. Just as it is the case in other fields, virtual reality is…

View full sample
Subject: Technology
Pages: 2
Words: 598
Rating: 4,9

Exploratory essay on the internet

Question 1 The Internet should be censored to some extent. Although the internet provides unmeasurable amount of information it’s sometimes misused to spread hate, induce violent…

View full sample
Subject: Technology
Pages: 4
Words: 1205
Rating: 4,8

Security in computing system

Improving Software Security Software security has been a primary concern because of the frequent cases of computer malware that corrupts the system and destroys the data….

View full sample
Subject: Business
Pages: 7
Words: 1753
Rating: 4,7

How technological advances benefit and challenge financial accounting

Abstract The advancement of modern technology has resulted in business organizations improving their security of financial and management data through various computer software applications. This report…

View full sample
Subject: Technology
Pages: 2
Words: 583
Rating: 4,8

How cybersecurity affected the world?

Summary and Purpose Of Study The article creates the need to consider behavior change as the main factor influencing cyber security. The theory of planned behavior…

View full sample
Subject: Technology
Pages: 3
Words: 793
Rating: 4,9

Video games and creativity

Section 1 The peer-reviewed article studies the correlation between use of information technology among children and creativity. The hypothesis for this experiment was that the internet,…

View full sample
Subject: Technology
Pages: 3
Words: 878
Rating: 4,5

Psychological and emotional effects of cyberstalking

Introduction Cyberstalking pertains to the use of technology to pursue an individual severally to the point that the pursuit induces fear and discomfort in them. Stalking…

View full sample
Subject: Technology
Pages: 2
Words: 575
Rating: 4,6

Application security

Introduction Different encryption methods are implemented for security reasons to prevent the access of sensitive information and two examples of such methods include computer encryption programs,…

View full sample
Subject: Technology
Pages: 4
Words: 1082
Rating: 4,7

Wireless communications

Introduction Wireless communications have allowed for the transmission and exchange of data between devices and individuals who are widely spread over a given geographical area. Mobile…

View full sample
Subject: Health Care
Pages: 5
Words: 1305
Rating: 5,0

Argumentative essay on HIPAA

HIPAA regulations HIPAA is an act that was instituted in 1996 and it mandated the health and human services (HHS) department to come up with regulations…

View full sample

FAQ

Find more samples:
Related topics