Computer Science essays

... samples in this category

Essay examples
Essay topics

Net Neutrality Meaning for Amazon Service

3 Pages 1444 Words
Amazon is a company known for its online services to purchase items and get them delivered to your house, being very convenient and appealing to a wide range of customers. However, they also provide other services, such as cloud computing services, streaming videos, audiobooks, software games, and produce consumer products (such as Alexa), and more (Amazon, 2018). Because of this,...

Net Neutrality: Purpose and Potential Consequences

1 Page 585 Words
While using the Internet, one can encounter that some sites have a slower loading speed as compared to others. In most cases, this can be attributed to Internet restrictions. Net neutrality is, therefore, a principle that states governments and Internet providers should eliminate all restrictions on consumers’ access to networks participating in the Internet. Net neutrality is aimed at eliminating...

Advantages and Disadvantages of Post-Quantum Cryptography as a Possible Solution to the Crypto Apocalypse

6 Pages 2813 Words
Due to the widespread adoption of various digital technologies, sharing of digital information has become a vital aspect of people’s lives. Through the Internet, one can have access to their personal medical records, financial data and carry out transactions online. As a result of this, information security is now considered pivotal in ensuring that one does not become a target...

The World Wide Web: Creator's Expectations and Disappointing Reality

2 Pages 696 Words
The World Wide Web turned 30 on Tuesday, March 12, 2019. The birthday celebration was held at CERN, the European Organization for Nuclear Research near Geneva. This is where the Web was born. In March 1989 a young computer expert working at CERN, by the name of Tim Berners – Lee, had new ideas about open access computing system with...

Computer Graphics: An Overview of Highlights

5 Pages 2223 Words
Computer graphics are pictures and films created using computers. Usually, the term refers to computer-generated image data created with the help of specialized graphical hardware and software. It is a vast and recently developed area of computer science. The phrase was coined in 1960, by computer graphics researchers Verne Hudson and William Fetter of Boeing. It is often abbreviated as...

The Effects of the Internet on Education on the Example of Personal Experience

3 Pages 1182 Words
I strongly believe that the Internet is very important for modern education. A number of positive effects that it gives create a favorable environment for high-quality, comprehensive and comfortable education of the modern generation. I am going to base my position in this essay on the example of personal experience and how the Internet has influenced me personally as a...

The Restoring Internet Freedom Act: A Way to Return to Net Neutrality

2 Pages 741 Words
Not exactly a year prior, the web was flooded with support for net neutrality. In any case, in 2018, the deceivingly-named ‘Restoring Internet Freedom’ bill adequately revoked the first laws that instituted net neutrality in any case because of a move in political power among the FCC seats. Presently, in any case, Senate Democrats have presented another bill that could...

Data Mining and Its Security

6 Pages 2945 Words
Data mining is primarily used today by companies with a strong consumer focus - retail, financial, communication and marketing organizations. It enables these companies to determine relationships among 'internal' factors, such as price, product positioning or staff skills, and 'external' factors, such as economic indicators, competition and customer demographics. And, it enables them to determine the impact on sales, customer...

Difference Between Open Source Software and Proprietary Software

2 Pages 1068 Words
The purpose of this essay is to analyze open source software and proprietary software, and as a result, to determine how they differ from each other. Open source which means copyright holder grants the user to design, modify its content, redistributes the system or application for users who are using it. By doing so legally, author has released a license...

Essay on Addiction as One of the Main Dangers of the Internet

2 Pages 944 Words
Nowadays with the development of technology people use the Internet for having access to plenty of information which can keep them entertained, up to date and being in contact with others in the social networks (Flora, 2015). Most people believe that they cannot continue their life without this technology. This statement has people lives addicted spending their time to use...

Is Internet Dating Harmful? Essay

2 Pages 913 Words
When someone hears the word love, images flood the mind of Shakespearian tragic tales, star crossed lovers; from moments of happy little accidents and fate, to first kisses and fairy-tale princess endings. Never until now, have we thought to add swiping left or right, ticking ‘yes’ or ‘no’, entering one’s requirements as a means to finding your true love. It...

Mining Medical Data: A Comprehensive Study

3 Pages 1381 Words
In the yesteryears, it was highly expensive to store and maintain information. However, due to the progression in the area of information gathering and WWW in the last couple of decades, it is a fact that, vast volumes of information or data are obtainable in electronic format. To store such huge volumes of data or information the database size is...

Why Do I Want to Study Cyber Security Engineering at TalTech Information Technology College? Essay

1 Page 625 Words
I humbly wish to further my educational career on the field of Cyber Security Engineering with TalTech Information Technology College. I sat down to look at our world from the past, present and visualize the future of information technology, how advance it has grown over the years. Everything in our day-to-day activities is computerize through the help of information technology,...

Should We Agree with Net Neutrality or Not?

4 Pages 2006 Words
According to Ted Thurn, director of Government Affairs at IREM “It is safe to say that technology encompasses almost every facet of our professional and personal lives” (Thurn). Can we trust our privacy to the Internet? What would happen if someone decided to know everything about us? With net neutrality people are more secure online and will enjoy all online...

Can You Make Real Friends on the Internet? Essay

4 Pages 1752 Words
Everyone needs friends but the question is why do we need friends? Whether we realize it or not, friends play a very important role in our lives. A friend is your support system away from your family. They are there through your sadness and happiness; they make the good times better and ease hard times. They are someone you can...

Enforcing Net Neutrality: Right or Not

1 Page 495 Words
To reap the benefits of the Internet and maximize its potential, we should adopt a balanced approach to regulating the Internet, leaving the industry to market forces and intervening only when necessary. Proponents of net neutrality argue that discrimination of Internet traffic by ISPs limits consumer choice and impedes innovation. They fear that without regulations, ISPs may be enticed to...

Wi-Fi and Its Importance for Modern Society

4 Pages 1777 Words
Wi-Fi is the name of a popular wireless networking technology. It uses radio waves to provide wireless high-speed Internet and network connections. There is a common misconception is that the term Wi-Fi is short for 'wireless fidelity', however this is not this is not true. Wi-Fi is a trademarked phrase which means IEEE 802.11x. Dr. O'Sullivan and his friends are...

How Are Information Systems Transforming Business, and Why Are They so Essential for Running and Managing a Business Today?

1 Page 509 Words
The manner in which businesses are done in the modern era have been altered a lot by the usage of information system in the firms all around the world. Information system has made processing faster in any firm. The data about inventory is available on the computers and the orders are processed over the computers and in this way the...

Argumentative Essay on the Necessity of Net Neutrality

1 Page 584 Words
In my opinion, the existence of net neutrality is necessary and extremely crucial. My argumentations can be illustrated in four aspects. They’re protecting freedom of speech, avoiding corporate censorship of speech, safeguarding consumer interests and maintaining fair competition for enterprises. To, ordinary citizens, freedom of speech is one of the significant democratic values. Net neutrality requires that Internet service providers...

The History of the Invention of the Internet: A Short Essay

1 Page 675 Words
Here we are in 2019, and we can’t even imagine our lives without the Internet. The Internet has become a huge part of our daily life. The Internet has brought knowledge and information on our tips. The Internet has made our life positive and easy. Gone the days when we had to go to a library to get some piece...

Overview of Data Collection Challenges

1 Page 535 Words
Adzeh (2014) describes data collection as putting together vital information to address evaluation questions identified by the researcher. Quantitative data collection focuses on random sampling and structural instrument. Quantitative data can be quantified and expressed as a number and are capable of being statistically evaluated. They produce outcomes that may be easy to compare, summarize or generalize (Gill, Stewart,Treasure &...

The Evolution of Information Systems Infrastructure

1 Page 410 Words
An information system is a set of computerized components that are used to collect, create and store data. Information systems are also used to transform data into information and distribute it to the right addresses. Due to their clear benefits, many organizations, businesses, institutions and companies have adopted them for business continuity purposes. Information systems have the right impact on...

Essay on the Use of Internet by Terrorist Organizations

6 Pages 2674 Words
The Internet has demonstrated to be a powerful means of communication that reaches people worldwide. The improvement of progressively advanced technologies has made a network with a worldwide reach, and generally low hindrances to entry. Internet innovation makes it simple to speak with relative obscurity, rapidly and adequately across borders, to a great gathering of people. The advantages of Internet...

The Internet and Its Impact on Society: An Essay

5 Pages 1496 Words
Introduction The internet, a revolutionary technology that has transformed the fabric of society, is a vast network connecting millions of computers globally, facilitating the exchange of information, ideas, and communication across the world. Since its inception in the late 20th century, it has evolved from a rudimentary system of interconnected networks designed for military and academic purposes to an indispensable...

Children's Cyber Security in Georgia

6 Pages 2651 Words
21 century is known as the technological era. Today, the whole civilized world is aware of the huge problem of digital technology through massive propaganda in different directions. The Internet has also contributed to the growth of community groups to meet the activities and demands of Internet communities. Generating Internet support and development starts from the 2000s in Georgia. According...

Essay About Internet Safety

4 Pages 1690 Words
Introduction In human life the computer has bought a lot of changes in the way of doing simple tasks and made human life easier. Its use in many fields like business, e-commerce and communication. If we talk about the major advantage of computers, it is the Internet. The Internet is the human successful invention. For humans it has made to...

Summary of Web Application Vulnerabilities

2 Pages 762 Words
In any software development life cycle the penetration testing phase plays an important role. Penetration testing is an approach which tests the security of a web application by making a conscious attempt to compromise the security of the application. It helps in preparing for any possible malicious attacks or avoid the potential breach of data at the hands of an...

Should Net Neutrality Be Embraced?

2 Pages 719 Words
Net is a group of at least two devices that can be used for communication. It consists of several dissimilar computerized systems linked by wireless or physical connections. All nets allow computers and or people to share resources and information. Net neutrality can be described as an idea in which the association between a person and the Internet’s content should...

Proper Applying of Cryptography to Software

3 Pages 1343 Words
Cryptography plays an essential role towards the construction of any secure system. If applied faultlessly, it can help us to maintain the confidentially of our data, authenticate data sources, and secure our data against any disallowed alternation. However, we often fall into the misuse of cryptography when it is inappropriately applied to our software. If not properly handled, cryptographic algorithm...

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most
Place an order

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via support@edubirdie.com.

Check it out!