Computer Science essays

... samples in this category

Essay examples
Essay topics

Social and Ethical Implications of Internet Censorship

3 Pages 1568 Words
More than one-fourth of the planet's populace utilizes the Internet today, despite the fact that entrance to it is exceptionally uneven all through the world. The web has changed the manner by which individuals acquire news, direct business, speak with each other, mingle, and interface with open authorities (Kelly, Cook & Truong). However, most of the people look at the...

Laws on Human Trafficking in Dark Web Era

5 Pages 2160 Words
ABSTRACT This paper seeks to briefly analyses the various facets of the internet i.e. surface web, deep web and dark web, in addition to the mysterious and clandestine nature of the dark web which facilitates the perpetration of heinous offences, especially human trafficking, without the fear of being discovered. Further, the paper provides a bird’s eye view of the domestic...

How The Internet Affects Human Trafficking

4 Pages 1797 Words
There are many social issues faced by the criminal justice system in today's society. One of those issues is the evolution of the internet and how its helped create more crimes. Throughout the years the internet has evolved into something we use on a daily basis. It's no longer just something we use for research, but it's a way of...

Internet Privacy: Corporate Data Collection vs Individual Privacy Rights

4 Pages 1964 Words
“If you’re not paying for a product, then you are the product.” In the digital era where technology provides much easier access to information than before, questions can be answered with a simple Google search and click. On the other hand, free social media websites give users easier opportunities for communication and building connections with others all around the world....

Computerized Library Proposal

3 Pages 1495 Words
Introduction Computer development these days are growing rapidly. Different types of new software and computer systems have made human life even easier. It has produced a lot of latest programs and innovations compared to the older computer systems (Malazarte, 2019). This proposal is about finding a computing solution to computerize a library. The private higher institution is currently having a...

Review on JPA Based ORM Data Persistence Framework

4 Pages 2043 Words
Introduction: Object/Relational Mapping (ORM) is a method toward transforming information since the object-oriented model is hooked on the personal database model. Object-Oriented Programming (OOPs) remains founded happening units, while the social files management system (RDBMS) disreputable arranged families and fields towards stock information. Designed for a creator, separated charting sheet denounces the difficulty of the boilerplate cipher [1]. ORM hush-up...

DNA-Genetic Encryption Technique

4 Pages 1774 Words
Abstract In this paper , we propose the technique of DNA-Genetic Encryption (D-GET) to make the technique more reliable and less predictable. In this process, any form of digital data is binarized and transformed into DNA sequencing, reshaping, encrypting, crossover, mutating and then reshaping. D-GET 's main stages are repeated three times or more. Encrypted data is transmitted in a...

Python's Evolution: From Inception to Advancement

5 Pages 2085 Words
Python programming language stands out as a boastful yet simple language in the programming sphere. In my last two years as a programmer, Python has emerged as my go-to programming language whenever I want to complete any task from automation of my spreadsheets, scraping sites and even doing simple school projects such as data analysis. The programming language enjoys huge...

The Payload Effect Of Virus

3 Pages 1488 Words
Abstract Viruses are a very important topic among technology users, especially computer users. Viruses have many different intended functions. I will be covering virus payloads and what areas these viruses’ effect. Data files (delete or collect), spreading across multiple computers, spam email that contains different types of viruses, and viruses that enable backdoor access. Data files is where my focus...

Plant Leaf Disease Detection Using Machine Learning

3 Pages 1398 Words
Abstract When plants and crops are affected by pests it affects the agricultural production of the country. Usually farmers or experts observe the plants with naked eye for detection and identification of disease. But this method can be time processing, expensive and inaccurate. Automatic detection using image processing techniques provide fast and accurate results. This project is concerned with a...

The Complexity of DNA Fingerprinting

2 Pages 943 Words
Introduction DNA fingerprinting, also known as DNA profiling, is a powerful technique used in forensic science to identify individuals based on their unique genetic makeup. Developed in the mid-1980s by Sir Alec Jeffreys, this method has revolutionized the field of forensic analysis, offering an unprecedented level of accuracy in criminal investigations, paternity cases, and identification of remains. The peculiarities of...

Effective Teamwork in IT & Computing Industry

3 Pages 1519 Words
Introduction The overall purpose of this essay is discussing the importance of effective teamwork in information technology and the computing industry. In order to do this, I will be discussing the following: Eventuality of your work mattering, Unity within the workplace, clear and concise structure, risk taking and feedback as well as personal growth. I will be analysing these highlighted...

Apple Incorporation Pestle Analysis

2 Pages 890 Words
Apple Inc. established in April 1976 by its founder Steve Jobs with an aim to produce and sell electronic devices (including computers, laptops, phones & tablets) they have extended their services to both consumers and companies. Apple has become largest company in the USA and one of the top companies in the world. PESTLE Analysis Impact of Political Factors on...

Fake News In Digital World

2 Pages 1025 Words
Within today’s society of the digital age, people have discussed a topic that some may find to be alarming or controversial. The topic of “Fake News” has surfaced throughout the digital age, there are numerous reasons why fake news is considered a “dangerous” topic. To some people it can be something silly like aliens crash landing on earth, while to...

Internet Privacy Issues And Precautions To Avoid Them

2 Pages 748 Words
Almost everyone in today’s generation is familiar with the internet and its use. A large number of users however are not aware of the security problems they are facing. It is important to know exactly where your information goes and who can see it. From all the evidence I’ve seen regarding internet security, my considered opinion is that it should...

Apple Executive Summary Essay

4 Pages 1855 Words
Executive Summary Apple is an American global innovation organization, headquartered in Cupertino, California, which designs, builds and markets mobile phones, hardware, computer programming, and online administration. They are the leading mobile phone manufacturer in the world and generated sales of $ 229.234 billion in 2017. According to Haslam et al. (2013) On the extraordinary initiative of the late Steve Jobs,...

Human Anatomy Learning Systems Using Augmented Reality

1 Page 407 Words
The development of Augmented Reality (AR) technology in this era of modernization has made a huge impact in the education field specifically in the anatomy learning system of human organs. AR in education enables those professionals to have a short learning process as it helps users to explore objects in real terms of anatomy. The main goal of AR in...

Censorship On The Internet: Schools And The Role Of Parents

4 Pages 1725 Words
College English, Period 8 Censorship is the prohibition of any content that is considered to be threatening or unacceptable by society (Burress 23). It occurs in many different aspects of life. Despite the different forms and amount of censorship, everyone is affected by it. Whether it is withheld information from the news, or avoiding a specific topic at the family...

Cyber Bullying Could Get People To Suicidal Thoughts

5 Pages 2122 Words
Internet or online harassment is one of the kinds of cyber bullying. It is usually the use of the internet to harass, threaten, or maliciously embarrass the victim. It can engage behaviors such as, encouraging others to send the victim unsolicited and/or threatening emails or to overwhelm the victim with email messages, spreading rumors, sending negative messages directly to the...

Library Economics Aspects

1 Page 537 Words
A Dictionary of Accounting defines ‘appraisal’ as “the assessment of alternative courses of action with a view to establishing which action should be taken. Appraisals may be financial, economic, or technical in emphasis” and ‘feasibility study’, as “an investigation to determine which of a range of decisions is likely to give a satisfactory return in a financial appraisal or economic...

Legal Issues Around Cyber Bullying

3 Pages 1232 Words
Reviewed double_ok
Internet bullying, more commonly referred to as cyberbullying represents the use of the internet or mobile device to intimidate, harass, or inflict harm to others. Although bullying has been common in society, it has in recent times moved from learning institutions to social platforms such as Twitter, Facebook, emails as well as mobile text messages. Cyberbullying has harmful consequences on...

Why is Data Privacy Important

2 Pages 1127 Words
Data privacy is defined by Techopedia as information that contains private and usually personal data about an individual. (Techopedia) Being able to properly and secure this data is an important factor that the government, business and individuals that must be considered and be taken seriously. This is because the data stored contains personal information that is highly confidential and with...

Apple Supply Chain: Planning, Challenges, Strategies And Contributions

4 Pages 1792 Words
Executive Summary This report detailed examine of Apple Inc. in contest of managing strategy like how Apple company produce its products, from where they buy their raw materials, how their supply chain works, and finally what will be its sustainability in the future. Introduction Apple Inc., once in the past Apple Computer, Inc. was established by Steve Jobs, Steve Wozniak...

The Relationship Between Procrastination And Wellbeing

3 Pages 1184 Words
It might be hard to believe, but procrastination did not rise because of the Internet. It started during ancient civilizations where people have struggled with habitual hesitation. Around 800 B.C., the Greek Poet Hesiod wrote the following: “Do not put off your work until tomorrow and the day after. For the sluggish worker does not fill his barn, nor the...

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most
Place an order

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via support@edubirdie.com.

Check it out!