Computer Essay Topics

Playing Monopoly

1. Identify the behaviors that you think are ethically questionable in the history of Microsoft. Evaluate the ethics of these behaviors. Pretend to embrace a technology and become the major source for that technology like buy out the competitors. Declare it obsolete because your original way is better. Wait long enough for a technique or… View Article

Systems Analysis: Problems/Exercises

•Chapter 1, Problems/Exercises, Questions 1 and 8 1. Why is it important to use systems analysis and design methodologies when building a system? Why not just build the system in whatever way seems to be “quick and easy?” What value is provided by using an “engineering” approach? Ans: While analyzing and designing a system, we… View Article

The Importance of Computerized Enrollment System

A computerized enrollment system can reduce the man power needed to facilitate an enrollment process. By have a this computerized, it is more accessible to those wishing to enroll especially if it is accessible through the web. This would also cut down on the human error aspect as well as double entries from two people… View Article

Microsoft Environment Analysis

Abstract Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser. The worm named Code Red… View Article

Point of Sale System

Technology nowadays is fast changing and new machines are developed in order to make job faster and convenient. Technologies often have an important role to play and the key to success in competing the world. Automation is designed to maximize efficiency, convenience and quality service offered. It is undeniable that automation is a lot faster… View Article

1. The purpose of identifying IT assets and inventory is to evaluate assets and track them. 2. The asset classification is to determine possible critical problems that need an immediate plan of action. 3. I picked HIPPA. Customer privacy elements are insurance information, account numbers, claim numbers and other private health insurance related items. 4…. View Article

Should students’ textbooks be replaced by notebook computers?

Are you tired of carrying heavy notebooks and textbooks on a daily basis, losing your papers and reading obsolete books? Many students in high school would agree that using notebook computers would be easier, functional and efficient instead of using textbooks and notebooks. If schools would replace textbooks and notebooks with notebook computers, schools would… View Article

Key Software Applications

1. Identify the key software applications used by The Tea collection. •website for shopping online •design software •Geo-mapping to see where the market is not over saturated with children’s clothing •A back end tool for retailers to be place orders over the internet •Software that was created for the company is a tool bag in… View Article

Foundation of Democracy

Desktop Computers ·Also called personal computers. ·sit on,beside,or under a desktop. Notebook or Laptops ·Similar to desktops ·Advantages ·Netbook ·Similar to a notebook ·For wireless communication or access to the internet Tablets ·Looks similar to a notebook ·Touch screens capability Servers ·A computer dedicated to shaaring resources among 2 or more computers and managing large… View Article

Effects of Technology on Enviroment

Effects of technology on environment. Selection of topic Now a day the world relies totally on technologies. Therefore, it is important to discuss on the effect caused on environment due to these technologies. Aims and objectives To study about effects of technology on earth. To study its negative and positive impact on environment. To discuss… View Article

The effect of not having personal gadgets in i.t student

CHAPTER 1 INTRODUCTION In the year where electronic gadgets are not yet invented like computers, students are not yet engage in activities using technologies. Students rely on books and visit library facilities to study, read their notes and review their school lessons. During those years, despite the lack of computers and hi-tech gadgets students still… View Article

Relational Database Concepts and Applications: Research Paper

Introduction In order to successfully transition from our current paper and email based equipment request method to a completely paperless online system, we must build and implement a relational database. A relational database will allow us to store, filter, make changes to, and share of the data that is needed in our new online equipment… View Article

Determining Databases and Data Communications

Getting organized and planning ahead for trade shows is critical to a successful showing. As the marketing assistant for XYZ Consumer Electronics Company, I have a number of tasks to complete for the trade show booth setup. There several ways, in which the equipment, components, shippers and shipments can be categorized, cataloged and tracked. This… View Article

Cow Eye dissection

Purpose The purpose of this lab was to explore the anatomy of a cow eye. The eye is a special sensory organ with a complex structure and function. The objective was to gain a better understanding of the structure and the function of the eye. In this lab, we set out to dissect a cow’s… View Article

Recording, analysing and using HR information Review

Contents Page One – Title of briefing note Page Two – Contents page Page Three – Two reasons why the organisation needs to collect HR data Page Four – Two types of data that is collected within the organisation and how each supports HR practices Page Five – A description of two methods of storing… View Article

System Evaluation Paper

No doubt, EDI or electronic data interchange process has increased efficiency in exchanging business documents between companies. This process replaces faxing and mailing of documents. The process utilizing specific record formats that are based on widely accepted standards (CovalentWorks, 2014). EDI is used in a variety of industries; over 160,000 companies have switched to EDI… View Article

Computer Engineering personal statement

My interest in computers came at a fairly age when I got my first computer. At that time, only few people knew how to use it and no one had time to teach me, so I had to learn by my own. When I was sixteen, I got into building my own p.c’s because of… View Article

The Role of Technology in Business

Abstract Using selected references, this paper examines the role of Information Technology in Business with a focus on network security. It does so by examining the impact of Information Technology from the infancy of technology to its influence on how business is conducted today. The paper goes into the details of how some information technology… View Article

Based System for Sales, Marketing and Customer Information

We propose a new cloud based system that will compile all of the past sales and marketing information and current customer contacts and needs. This system will allow employees from all areas and locations access to marketing tools and sales data. The components needed to use the new cloud system are Clients which is computer… View Article

Using Global Variables

Global variables are variables that are visible to every module in the program and its scope is the entire program so that all of the modules within the program can access a global variable. They can be declared in modules by simply setting up an assignment box and adding in the variables to the modules…. View Article

Cyber war Vs Cyber terrorism

In this time and era, we have witnessed the emergence of electronic resources as the most important development of the modern day communication system. Technologies such as cellular phones, home computers, the internet and websites have added another dimension to the way we live our lives today. This presentation seeks to address and analyse the… View Article

TCP/IP LAN Checkpoint Questions

1. An IPv6 address is made up of how many bits? An IPv6 address is made up of 128 bits. 2. The subnet mask of an IP address does which of the following? The subnet mask defines network and host portions of an IP address. 3. If a protocol is routable, which TCP/IP layer does… View Article

Academic Monitoring System using Android application

ABSTRACT The portability, open source nature of smart phones and android OS for PC on android development platform has made the development of application software for various environments as handy. In this application are resulted in paper less work, easy to use and time saving in nature. The wireless communication technology of smart phone enables… View Article

Amazon vs. Barnes & Noble

The qualitative services department was hired to provide an in depth analysis of two leaders in their industry, Barnes & Noble and Amazon. The purpose of this report is to provide all the necessary data in an unbiased manner, so that the accounting partners may make their investment decision knowing all the facts and figures… View Article

Technology in the 20th Century Paper

There are many notable advances made in technology that took place during the twentieth century. The world gradually moved from the industrial age into the technology age during this era. Once technology took hold nothing could hold back the flood of its advancement and the innovation that grew from it. Of all of the important… View Article

Kaplan Higher Education

1) You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics, and wireless for this application. You should create a table or flow chart which would facilitate choosing between these options depending on circumstances. The table or flow chart should… View Article

Ten Commandments of Computer Ethics

Computer ethics relates to the ethical values that should guide the computer professionals in their conduct. The Ten Commandments of Computer Ethics establish guiding principles for all of us to follow. Read on to know these Ten Commandments. Every sphere of life is guided by a set of rules of what is right and what… View Article

Database Design P1, M1 & D1

Database is a place to store lots of data, imagine it as a giant virtual filling cabinet that can be organized in many ways. There’s software called (DBMS) which stands for database management system which allows the user to manage data in database such as; create, delete or update. Entities Entities are objects with significant… View Article

Information Security Fundamentals

Answer the following questions. Use complete sentences. 1. How does a false positive alarm differ from a false negative one? From a security perspective, which is least desirable? A false positive attack is where the system IDPS was alarmed but no attack ever occurred. The false negative is where an actual attack occurs and the… View Article

New Hire

Dear Mr. Hendricks, My name is Brad Johnson and I am writing you today because I understand you are looking for a new mechanic for your racing team. I would like to inform you of my experience in order to prove to you that I am the right fit for the job that you are… View Article