Computer Science Essays, Research Papers & Term Papers (1,643) essays
- Artificial Intelligence (60)
- Computer Ethics (118)
- Internet and networking (465)
- Programming Languages (69)
Computer Science essays:
Internet Hackers - Methods to the "Madness"; This is an essay which details much of the techniques used by modern hackers, as well as their motives for such actions.
... internet began as a computer network commissioned by the Advanced Research Projects Agency in 1969 as a network between four universities. Because of the volume of information available and the potential value of instant information transmission, the network known as the internet ...
A study was carried out to try and understand, what make IT projects different and complex than any other projects.
... of change. Very low percentage is actually IT projects. For example the UK passport office project was not an IT failure but was said to be management failures in business processes and change control and also the National Health Service (NHS) IT project is not an it project ...
Internet in the Classroom
... of millions of computers worldwide, connected together. It is an elaborate source of education, information, entertainment, and communication. Recently, President Bill Clinton expressed an idea to put the Internet into every classroom in America by the year 2000[4]. Considering the magnitude of ...
Linux vs. Windows XP: A Small Business Deployment Cost Analysis.
... computer system the user must pay a licensing fee. In comparison, a review of 22 sellers of Red Hat Linux (9) Professional found the lowest supported copy to sell at just $89.00. This copy can be installed on as many desktop units ... Project ...
Office Automation and Workgroup collaboration
... system as well as client addresses. This address book is accessible to all users. Besides email, Outlook has a few other features that automate a variety of tasks such as calendar, tasks, and journal. With the calendar feature, one can enter appointments to better manage ...
A Brief History of Databases, describes some old database systems
... of computer systems and the methods they will use in manipulating data. In 1966, Philip Kotler had the first description of how managers could benefit from the powerful capabilities of the electronic computer as a management tool. In 1969, Berson developed a marketing information system ...
Computer Secutity and the law
... computer security communities. II. THE TECHNOLOGICAL PERSPECTIVE A. The Objectives of Computer Security The principal objective of computer security is to protect and assure the confidentiality, integrity, and availability of automated information systems and the data they contain. Each of ...
Mach Operating System. What is Mach, History of Mach, factors were considered in making the Mach operating system, Exception Handling, Features and Advantages?
... systems to systems with no memory shared between processors. Mach is an operating system kernel developed at Carnegie-Mellon University to support operating system research, primarily distributed and parallel computation. The project ...
History and development of Operating Systems
... personal computers. They have been developed to manage new technologies. The development of the PC has seen Microsoft grow to be the largest supplier of operating systems. The need for reliable and easy-to-understand operating systems has prompted development of suitable systems ...
Informational Systems Proposal Summary
... Information Technology (IT) team describing a new information system required by our Advanced Services Network Consulting Engineers (NCEs). The information provided has been summarized and is intended to provide an overview of the proposed project ...