Computer Essay Topics

Discussion Question

1. Briefly describe Moore law. What are the implications of this law? Are there any practical limitations to Moore law? Moore’s Law is a hypothesis stating that transistor densities on a single chip double every two years. Moore’s law describes a long-term trend in the history of computing hardware. The number of transistors that can… View Article

Human Computer Interface

According to Nicky Danino(2001), Human Computer Interaction(HCI) is defined as ‘the study, planning, and design of what happens when a person and a computer work together’. HCI consist of three parts that is the user, the computer and the interaction involved between the user and the computer. Therefore I am going to evaluate the company… View Article

Do We Depend Too Much on Computers

As civilization advances we depend more and more upon our invention. There is technology that saved many lives, as well as the one that have destroyed whole cities. Good morning members of the jury, parents, teachers and students. My name is Hugo Mendoza and I will talk about dependency on computers. I choose it because… View Article

Impact of Computer Technology

Man is no longer living in the Age of the Machine, but in the Technological Revolution. He is no longer replaced by machines, but by micro chips built together to form what we call a computer. As a creation of man, it was made to add convenience to his life. However, in the current situation… View Article

Lending System

a. Description of the System As the world moves a global competitive and more complex electronic place, lots of establishments still are using the old way of doing process. The best thing to consider is the assurance that the clients are getting the satisfaction of the services provided by the company and also the creating… View Article

Network Security

You are interested in starting your own Music Store, QualitySounds, in a suburban area of your town. You need to design and build a network and computing solution for your stores. You have done some initial planning and you will start with two stores (but you plan to add two more stores across town within… View Article

Enterprise Data Storage

Data Storage is generally divided into two; one is customer storage, which only uses typical disk drives, flash drives or local hard disk in PC or in laptop. While Enterprise Data Storage is the mainly use for large enterprise storage for big industry or company. The data that is being stored in this centralize storage… View Article

Technology in the Classroom

Time after time we hear everywhere comments from grandparents, parents, brothers and sisters saying that ‘things were so much different when we were in school at your age, and now a days kids are just staring at screens and pushing buttons and now family time includes having your phone with you at all times and… View Article

Trends in Business Communication

Over the past two decades technology has advanced rapidly, bringing substantial change in how people communicate in business. While traditional methods of communications such as formal letters and business meetings still take place, even these types of communications have changes dramatically. With the rise of personal computers and the internet in the early 1990’s, nearly… View Article

The Computer Vision Syndrome

Close to 150 million people sit in front of a computer monitor each day. Many of them spend more than two hours at a time, focusing on screens as they complete work projects, blog, or just surf the web. If a significant portion of your day involves computer time, you may be at the risk… View Article

Cloud Computing Technology

INTRODUCTION Cloud computing is Internet (“cloud”) based on development and use of computer technology (“computing”).It is a style of computing in which dynamically scalable and often virtualised resources are provided as a service over the internet.Users need not have knowledge of, expertise in, or control over the technology infrastructure “in the cloud” that supports them…. View Article

Encryptions

In this report I have discussed that the encryption technology is necessary for citizens to protect their privacy and security when using computer networks. Otherwise, medical records, credit card numbers, trade secrets, as well as personal communications relayed over computer networks are not safe from prying eyes. Also I have presented an arguments in favor… View Article

Classifying Computers

According to the Global Census, forty-four million households, or forty two percent, had at least one member who used the Internet at home in 2000. Today, more family members in the world use computers. Most people are aware of the desktop computers which can be found in the home and in the workplace. What are… View Article

Computerized Enrollment System

Improvement in computer world means the act of making new arrangement or style of doing work, activities, and processes efficiently, effectively and faster from the past, that brings convenient to the people. Improvement is an opportunity for every one and in any organizations, the researchers want to have a part in this improvement either it… View Article

Controversial Issue in the It Field

The problem is that people don’t really know or think there is a difference between network administrator and system administrator. Just because they have administrator in the name does not mean they do the same thing. When u go to school u have to pick one or the other because one degree is not going… View Article

Cuckoo’s Egg Analysis Paper

The Cuckoo’s Egg book is well written by Cliff Stoll. It was something like reading a horror story book. It was creepy, suspense, curiosity and scary too. The hacker every time breaks into a military system seemed to be like a ghost entering into the house and not like a thief. We know thief will… View Article

Cybercrime Definition

What is this Cyber crime? We read about it in newspapers very often. Let’s look at the dictionary definition of Cybercrime: “It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money”. Mr…. View Article

CyberCrime Law

The Cybercrime Law of the Philippines (also known as the Cybercrime Prevention Act of 2012 or Republic Act 10175) is a newly-signed act that gives us a true legal tool to combat cybercrime. A better definition is given by a press release from the Senate, a part of which says, “The Cybercrime Prevention Act lays… View Article

Covering data protection and sharing

In my setting all information collected and held regarding pupils who are in attendance is kept safe and secure by using passwords on the computer and it can only be accessed by those who are in charge of it. Educational records kept in each classroom are locked into cupboards with padlock, and only senior staff… View Article

Haptic Technology

Haptic is the “science of applying tactile sensation to human interaction with computers”. The sensation of touch is the brains most effective learning mechanism –more effective than seeing or hearing –which is why the new technology holds so much promise as a teaching tool. With this technology we can now sit down at a computer… View Article

Nanotechnology Uses to Enhance Computer Performance

Although the core concepts of nanotechnology were introduced in the early 1950’s, nanotechnology was not properly introduced to the world until 1974. That was the year a Japanese scientist, named Tanigushi, coined the word “nanotechnology”. Nanotechnology refers to the constructing and engineering of systems at the atomic level. “Nanotechnology will be the major technology in… View Article

Teaching Situation

A1a. Teaching Situation The teaching situation in the video was a typical computer lab type of classroom. The tables were arranged around the perimeter of the room as well as an aisle in the middle with two long tables. Computers were placed on top of the tables with a adequate spaces in between to allow… View Article

Accounting & information Technology

How the process of computerising accounting information systems (AIS) and telecommunicating accounting information over the web actually help the accounting functions in an organisation operating globally? However, the counter-claim is that the breaching of the security of such systems will be a great risk that needs to be properly managed in various ways. The purpose… View Article

Computer Knowledge

Ever since I was little, I have been exposed to the different types of technology. The most important type is the computer. Before being able to use computers for fun, I had to take the time to thoroughly learn the unique skills in order to be perfect at it. The first time I touched a… View Article

Interrupt and a Trap in an Operating System

What are the differences between an interrupt and a trap? What are their importance? According to Stallings (2012) an interrupt is “a suspension of a process, such as the execution of a computer program, caused by an event external to that process and performed in such a way that the process can be resumed” (p…. View Article

The Past, Present, and Future of Automated Scoring

“No sensible decision can be made any longer without taking into account not only the world as it is, but the world as it will be …” – Isaac Asimov (5) Introduction Although some realities of the classroom remain constant –they wouldn’t exist without the presence, whether actual or virtual, of students and teachers –the… View Article

Payroll Case

Kudler Fine Foods uses a biometric time system which requires the usage of time clocks to monitor the time employees engaged in work responsibilities. The method requires the use of a finger touch pad to identify the numerous time punches made by the employee. The employees information is entered upon hired into the company’s payroll… View Article

Management Information System

In this paper I will be answering the case study questions that involve; when antivirus cripples your computer, how secure is the cloud, are electronic records a cure for health care and also a tale of two IS project. Surprisingly about 90% of computers are completed infected with spyware, which make it the most common… View Article

Supply and Demand: Buying a Computer

Buying a new computer is no easy task. Finding one with the right specifications at the right price requires shopping around for a good price, research on the different computers available, and evaluating if the decision is necessary and financially sound. In doing each of these things, we are using several Principles of Economics and… View Article

Effects of Computer

There is no doubt that technology has become a significant part of people’s lives nowadays. It has become a daily part of people’s routine whether it is at home or at the workplace. At this time, people, especially the young ones, are caught up with mobile phones, television sets, gaming consoles, music players, and other… View Article