Computer Essays: Free Topic, Sample and Examples

Computer Security
Question oneUnixUnix operating system uses a three level basic access control mechanism to protect files. There are three basic access control namely; User (u) which gives the specific user most likely the file or directory owner. Second is group (g) which gives the specific user that belongs to a similar group as a file and lastly others (o) which represents the other system users. One can select three modes of access rights with each individual class namely execute, write and read which are checked ...
Read Text
Computer Theory
FINITE AUTOMATOAn FA is a 5-tuple  , whereQ: Finite set of states : Finite input alphabet : Transition function Start stateF: Set of final statesFinite state automaton is also known as a finite state machine (FSM). In its basic meaning, the finite number of states and the transitions between them in nature of their actions make up the model on which the state machine is defined. Automaton is a singular form of automata. Kohavi (1986) in computer science, 'Automata' refers to the study of Abstract ...
Read Text
Computer Audio
9 December 2009Computer Audio TechniquesThe aim of this report is to focus on production procedure, audio techniques, practical work and analysis of technical requirements.The number of people who are listening to music and other audio sounds has continuously increased in the current century. Many people employ different means to listen and utilise different approaches in production of music and audio such as the use of personal computers (PC). PC is unique technological equipment that has extensive ...
Read Text
Effective Protect Computer Systems from Computer Viruses
The paper "Effective Protect Computer Systems from Computer Viruses" is a delightful example of a term paper on information technology. Computer viruses are computer programs that replicate themselves and infect computer program systems by merely attaching to any file types, and are spread by using infected files in other computers. The main function of computer viruses is to reproduce, interfere, distort, delete and corrupt normal computer operations. There are different categories of computer ...
Read Text
Computer Networks
The paper "Computer Networks" is a great example of a report on design and technology. A computer network is a group of computers which are linked together. Computer networking involves the integration of various computers through wireless connections or through the use of cabling systems. This is aimed at enhancing telecommunication and information sharing between different computer users who are connected to the network. These computer integrations are achieved through the use of the web server ...
Read Text
Computer Security
The paper "Computer Security" is a wonderful example of an assignment on logic and programming. Evaluation of a software system is a fundamental aspect of ensuring that the system meets the user requirements specified in its system requirements specification document. To achieve this, an analysis of the whole functionalities contained in a system is done. In addition, evaluation of the security details contained in the system should also be analyzed (Biffl et. al 102). Functionalities are the unique ...
Read Text
Cyber Security, Network and Computer Systems Administrators, and Computer Programmer
The paper "Cyber Security, Network and Computer Systems Administrators, and Computer Programmer" is an excellent example of an annotated bibliography on the information technology. This annotated bibliography reviews five sources for the following three occupations: Cyber Security, Network and Computer Systems Administrators, and Computer Programmer. Careers in the growing field of information technology services: Beyond the Numbers: U.S. Bureau of Labor Statistics. (2013). Retrieved October ...
Read Text
Computer Crimes
The paper "Computer Crimes" is an outstanding example of an essay on technology. Computers are the gadgets that have made the road to global technological advancement move several miles. Combined with the use of the internet that brings people together allowing communication and exchange of information from different parts of the world just by the touch of the mouse, there is much in terms of both vices and virtues that this technology has brought amongst its users. It is reported that each year, ...
Read Text
Computer Networks
QUESTION ONE2 points: Compare and contrast the go-back-N recovery method with the selective retransmission error recovery method. The GO-BACK-N error recovery method and the selective retransmission error recovery method are methods of data transmission that uses time-outs and acknowledgement signals to achieve reliable transmission of data over un-reliable network service, commonly the internet. An acknowledgement is a message sent by the receiver to the transmitter to indicate that it has correctly ...
Read Text
Computer Security
Computer SecurityIntroductionSeveral businesses are required to allow authorized access from distinctive security domains. This is simply because new data applications exists, which introduces very complex to data security administrators. The worldwide web and the internet provides alternative means which enable the sharing and collection of data with unlimited flexibility and convenience, several threats as well as challenges are presented (Allen 76).Computer security is the sub-section of computer ...
Read Text
Computer Vision
AbstractThis lab experiment seeks to illustrate how visual-based search can be obtained using matlab programme. It outlines the stepwise development of an improved matlab code that searches through a base of images and matches the images in the order of similarity starting with the most similar to the least similar. The lab report concludes on the likelihood of reliability of matlab in this application and shows that sites and situations that require this kind of search can rely on malab for development ...
Read Text
Computer-Mediated Clinical Consultations: the Impact of the Computer
The paper "Computer-Mediated Clinical Consultations: the Impact of the Computer" is a great example of a term paper on information technology. Hospital staffs spend 25% of their time collecting and record data from patients to inform preventive action. Consequently, the process is cumbersome and provides no guarantee on the quality of data collected. Also, the safety of the data gathered and its availability for retrieval so that the doctor makes reference to it posses extra challenges. These led ...
Read Text
Computer Architecture
1. Solutions to Avoid problems in software Development1. Use of formal Method of Software Specification.This is the representation of software requirement using mathematical techniques to avoid use of natural language like English. This helps in eliminating ambiguity in specification when it is done using the natural language. They also enable for easiness in validation because validation can be done against the formal methods of software specification. Formal methods are viewed to be costly due ...
Read Text
Privacy in Computer Science
The paper "Privacy in Computer Science" is an outstanding example of an essay on technology. Privacy, in conventional terms, is the keeping of some important thing in seclusion and from unwanted contact. In essence, it is the keeping of important property in a place where it may not be located by particular people. In computer science, privacy refers to the availing of data only to those deemed as authorized through security features afforded through various means like passwords, applications, and ...
Read Text
Basics of a Computer System
The paper "Basics of a Computer System" is a good example of an essay on information technology. A typical home-based computer system has a Central Processing Unit (CPU), a monitor, a keyboard, a mouse, etc. The CPU is the brain of a computer which does all the computation works inside based on the inputs provided through the keyboard or mouse and will display the results on the output through the output devices such as the monitor or printer. The input (keyboard, mouse) and output (monitor, printer) ...
Read Text
Computer Aided Desigen
Part 1CAD SoftwareThere are two types of computer-aided design (CAD) software of generic type available for use by mechanical engineers namely 2D and 3D computer graphics software. 2D Computer Graphics SoftwareThe 2D computer Graphics software enables users of CAD system to develop two-dimensional geometric models that are used in generating computer-based digital images. The software is mainly applied in the development of drawn or printed applications. The 2D CAD software generates an electronic ...
Read Text
Report In Computer System
Cloud computing system for Anglia CloudIntroductionThis paper is a report for the board of Anglia Cloud explaining the idea, benefits and dangers of cloud computing as well as recommendations of computers, printers, broadband internet connection, network hardware, and network topology suitable for the system.Meaning of cloud computingCloud Computing is a concept that describes provision of IT resources via a network, usually, the internet. Velte et al (2009, p. 4) have stated that cloud computing ...
Read Text
Computer Networks Problem Solving
The paper “Computer Networks Problem Solving” is a  forceful variant of assignment on information technology. Socket API is a service model that works on the TCP protocol of the application layer. Sockets are defined as the created endpoints on both the sender and receiver that establish a service. Each socket is comprised of a host IP address and a 16-bit number that is local to the particular host otherwise referred to as a port. The TCP connection management employs the use of ...
Read Text
Can Traditional Personal Computer Vanish
The paper “Can Traditional Personal Computer Vanish?”  is a controversial example of a case study on information technology. Computer technology has been evolving steadily since the invention of an integrated circuit by Robert Noyce and Jack Kilby in 1958. Every part of the computer has been changing with new advancements being reported in the market one after another in a systematic manner. The development of the first personal computer in 1981 by IBM was initially considered as ...
Read Text
Computer Assisted Learning Language CALL
The paper "Computer Assisted Learning Language CALL" is a perfect example of an annotated bibliography on education. As a result of computer development, many universities and colleges have recognized computer literacy as one of the requirements among students. Over the years, the use of computers in learning has increased in every level of education. Currently, many students are using computer assistance to solve educational problems and achieving the task faced at school or even in the workplace ...
Read Text
Contact Us