Computer Essay Topics

Computer Supportive Cooperative Work

Research Question How can businesses in the United Arab Emirates make use of computer-supported-cooperative work (CSCW) in order to enhance productivity, efficiency, and competitiveness in both the domestic and international markets? In this regard, this research study will look at various businesses in the UAE and assess their level of using computer technology in their… View Article

Threats Computer Information System

The terms, phishing, spamming and hacking are quite widespread in today’s IT industry. This has lead to serious information leaks and massive and espionage in the segment. However, the counter measures have been effective to a certain extent. But there is always a loophole in all such measures. At the same time the so called… View Article

Computer Technology

Charles Njogu, the name does not ring a bell does it? That is my name. Why should my name matter to you? It should matter because I am one of the biggest success stories to come out of my native country, Kenya. I come from a third world country and nothing I have ever achieved… View Article

Request for New Equipment

As of present, the computer equipment in our department unfortunately falls short of our business needs, causing frequent problems and lapses in quality. Thus, due to using a limited version of MS Word, lack of CD burning capabilities, hard drives with only 3 gigabytes of memory, and a 7-year-old black-and-white printer, we are unable to… View Article

Related Literature of Computer

Based on the previous research, the computer has also disadvantages aside from the fact that it provides the students information’s and other features. In that research they conclude many students spent more time playing rather than researching and doing other academic works. This is result to computer addiction. From these students, huge percentage of them… View Article

Computer Viruses: What are They?

Over the past few years, computer viruses has gotten a lot of press attention. According to Levin, There has been quite an outbreak over the last decade and number of viruses grow by the minute. (Levin 5) FExperts estimated that the Mydoom worm infected approximately a two hundred and fifty thousand workstations in January, 2004…. View Article

Introduction of My Proposed System

The rapid advancement of computers in our society has made our daily workloads easier and more accurate. With its vast development, we need to set ourselves in its change and go with its flow. It had changed the views of many people to shift or after their way of doing their task from a manual… View Article

Trends in Viruses and Spyware

Introduction             The introduction of the computer-based systems in the human society has naturally increased the capabilities of the entire human society towards the perfection of services that commercial industries intend to provide the entire group of human communities with. The growing developments that technology and communications have taken so far have been an essential… View Article

Trends in Computer Hardwares

            In the last two decades, businesses have come to rely more and more on technology, notably with the increased prominence of the PC and the ever demonstrated boundless resilience of the Internet.  Whereas, if 10 years ago had these innovations fallen out of use, businesses would not have even worked themselves up, these days… View Article

Tripple Bottom Line Analysis

Introduction: Dell Incorporation is currently a huge company providing both hardware and software solutions ranging from personal computers to servers, from network switches to data storage devices and various other technologies to its customers all over the world. With an employee base as huge as near to a 100,000 in total, it really has proved… View Article

Courseware Authoring

Courseware authoring is when one develops computer-based learning materials.  In order for computer-based learning to be effective, the programs need to be designed and authored successfully. There are many courseware authoring tools available in the market today.  Depending on the industry, the tools vary from simulations to software that creates simple presentations.  The essential elements… View Article

Atlantic Computers Case Analysis

1. Stick with company tradition by charging only for hardware and give the PESA software tool away for free. As can be seen in Exhibit 2, there is a noticeable difference between basic servers running with and without the PESA software. This difference would cater directly to those customers in the file-sharing application and web-server… View Article

Baseline Project Plan Report

1.0Introduction A.Project overview- Project scope: We will contract yearly with university to create wiring network of PCs in laboratory for students with 60 PCs and maintenance it during 5 year. Justification: we want to make the interface between students and staff and between the students themselves more easily and usefully. Recourse requirement: to make this… View Article

Compare and Contrast Michael Dell and Andy Grove

Michael Dell, founder of Dell Computer Corporation had his humble beginnings in the computer industry when he began selling personal computers directly out of his dorm room. This impressed upon him that this was the path to take in his professional life, he started his company in 1984, registered as Dell Computer Corporation. Krames, (2003)… View Article

Computer Architecture

1. Describe Von Neumann architecture and explain why it is important. The Von Neumann architecture explains the architecture of an electronic computer. It is attributed to be root of every electronic computer that has ever been made. According to Von Neumann architecture an electronic computer has Control Unit, Arithmetic Logic Unit, Memory & Input /… View Article

Computers in Healthcare

In all aspects of life—home, work, socially—a basic understanding of computer operation is by and large a necessity. Even the medical field has become dependent on computers, both to record vital patient information, but also for billing, researching maladies, and prescribing medicines. This report takes a look at how and why health care professionals use… View Article

Discussion Question

1. Briefly describe Moore law. What are the implications of this law? Are there any practical limitations to Moore law? Moore’s Law is a hypothesis stating that transistor densities on a single chip double every two years. Moore’s law describes a long-term trend in the history of computing hardware. The number of transistors that can… View Article

Human Computer Interface

According to Nicky Danino(2001), Human Computer Interaction(HCI) is defined as ‘the study, planning, and design of what happens when a person and a computer work together’. HCI consist of three parts that is the user, the computer and the interaction involved between the user and the computer. Therefore I am going to evaluate the company… View Article

Do We Depend Too Much on Computers

As civilization advances we depend more and more upon our invention. There is technology that saved many lives, as well as the one that have destroyed whole cities. Good morning members of the jury, parents, teachers and students. My name is Hugo Mendoza and I will talk about dependency on computers. I choose it because… View Article

Impact of Computer Technology

Man is no longer living in the Age of the Machine, but in the Technological Revolution. He is no longer replaced by machines, but by micro chips built together to form what we call a computer. As a creation of man, it was made to add convenience to his life. However, in the current situation… View Article

Lending System

a. Description of the System As the world moves a global competitive and more complex electronic place, lots of establishments still are using the old way of doing process. The best thing to consider is the assurance that the clients are getting the satisfaction of the services provided by the company and also the creating… View Article

Network Security

You are interested in starting your own Music Store, QualitySounds, in a suburban area of your town. You need to design and build a network and computing solution for your stores. You have done some initial planning and you will start with two stores (but you plan to add two more stores across town within… View Article

Enterprise Data Storage

Data Storage is generally divided into two; one is customer storage, which only uses typical disk drives, flash drives or local hard disk in PC or in laptop. While Enterprise Data Storage is the mainly use for large enterprise storage for big industry or company. The data that is being stored in this centralize storage… View Article

Technology in the Classroom

Time after time we hear everywhere comments from grandparents, parents, brothers and sisters saying that ‘things were so much different when we were in school at your age, and now a days kids are just staring at screens and pushing buttons and now family time includes having your phone with you at all times and… View Article

Trends in Business Communication

Over the past two decades technology has advanced rapidly, bringing substantial change in how people communicate in business. While traditional methods of communications such as formal letters and business meetings still take place, even these types of communications have changes dramatically. With the rise of personal computers and the internet in the early 1990’s, nearly… View Article

The Computer Vision Syndrome

Close to 150 million people sit in front of a computer monitor each day. Many of them spend more than two hours at a time, focusing on screens as they complete work projects, blog, or just surf the web. If a significant portion of your day involves computer time, you may be at the risk… View Article

Cloud Computing Technology

INTRODUCTION Cloud computing is Internet (“cloud”) based on development and use of computer technology (“computing”).It is a style of computing in which dynamically scalable and often virtualised resources are provided as a service over the internet.Users need not have knowledge of, expertise in, or control over the technology infrastructure “in the cloud” that supports them…. View Article

Encryptions

In this report I have discussed that the encryption technology is necessary for citizens to protect their privacy and security when using computer networks. Otherwise, medical records, credit card numbers, trade secrets, as well as personal communications relayed over computer networks are not safe from prying eyes. Also I have presented an arguments in favor… View Article

Classifying Computers

According to the Global Census, forty-four million households, or forty two percent, had at least one member who used the Internet at home in 2000. Today, more family members in the world use computers. Most people are aware of the desktop computers which can be found in the home and in the workplace. What are… View Article

Computerized Enrollment System

Improvement in computer world means the act of making new arrangement or style of doing work, activities, and processes efficiently, effectively and faster from the past, that brings convenient to the people. Improvement is an opportunity for every one and in any organizations, the researchers want to have a part in this improvement either it… View Article