Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Computer Science Essays

Computer Security IR

Introduction to the Article This article proposed and evaluated a model for building a computer security incident response capability. The authors used a case study research method to examine the use of the model in a large manufacturing organization. The model proposed in this article would be helpful for organizations who are interested in developing ... Read More
Pages: 3       Words: 690

Tools for Data Analytics

Introduction Data analysis and data science are increasingly essential for organizations to understand their data and make decisions. As such, data analysis tools are becoming increasingly crucial for businesses to access and analyze their data (Mohamed et al., 2020). These tools range from spreadsheets, databases, self-service data visualization, programming language, big data tools, and the ... Read More
Pages: 5       Words: 1249
Don't know how to write a paper for the grade you need?
Use our paper writing services and get assistance necessary to get the grade you want.
Place an order

Smart Home Devices

Introduction Smart home devices have transformed home life. It has become essential to examine them from an ethical perspective, leading to the promotion of independent living with support from devices such as Amazon Echo reshaping the current life. In line with using the devices to maintain and improve functional capabilities, they have become tools whereby ... Read More
Pages: 14       Words: 3653

Essay on Network Architecture

Introduction The Open Systems Interconnection (OSI) Model is a comprehensive reference model that describes and explains how data is exchanged between two systems. It consists of seven layers, each of which has a distinct purpose. These are the Physical, Data Link, Network, Transport, Session, Presentation, and Application layers. Each layer has its key functions essential ... Read More
Pages: 5       Words: 1238

How Can Cloud Computing Be Used To Improve Cybersecurity in the Cyber Domain?

Introduction Cyber security has become an increasingly important issue in recent years, as the number of cyber-attacks has risen significantly. Cyber-attacks can cause significant damage to individuals, businesses, and governments, resulting in financial loss, disruption of services and the potential for personal data to be stolen. As such, organizations must ensure that their networks and ... Read More
Pages: 16       Words: 4169

A Report on Cryptographic Algorithm Vulnerability

Introduction Technology has enabled efficient communication and transfer of data from various points. Still, the main challenge is making this data transfer secure, considering the tens of millions of people who send information over the internet. The vast number of internet users poses a risk as bad actors who want to steal sensitive information might ... Read More
Pages: 6       Words: 1422

Trends in the Technology Industry

Introduction The technology industry is a rapidly-growing sector that is constantly evolving. It is defined as the economic sector focusing on researching, developing, and utilizing new technologies to improve the quality of life, increase productivity, and facilitate communication. In recent years, the industry has seen many changes and advancements, and this paper will discuss three ... Read More
Pages: 11       Words: 2914

Managing Data Privacy

Public’s Opinion of Data Privacy As technology has developed and businesses have begun to gather and share more information about individuals, the problem of privacy in relation to data collection has become increasingly important. Many individuals have realized the breadth and depth of data collection and usage, and they worry about the possibility of privacy ... Read More
Pages: 5       Words: 1153

Mobile Application Threat Modelling

Introduction There has been a spike in the number of mobile threats committed by a broad range of people for several reasons as a direct result of the widespread adoption and usage of mobile apps in business settings. From a cyber-threat analyst’s perspective, this research provides an overview of the proposed mobile app, including its ... Read More
Pages: 5       Words: 1320

The Turing Test Review

The Turing test, as proposed by Alan Turing in his seminal 1950 paper Computing Machinery and Intelligence, was designed to determine if a computer could be mistaken for a human based on its ability to pass as one (Turing 23). In order to do this, he proposed an imitation game: One player would be in ... Read More
Pages: 5       Words: 1190

Data Scientist and Cloud Computing

Introduction Data Scientist is a role in which data professionals analyze and process data to produce meaningful insights. This can range from statistical analysis of financial statements to developing computer algorithms that predict trends, detect defects, or recommend the best route to a particular location (Yang et al., 2017 p.14). Data Scientists look for patterns ... Read More
Pages: 8       Words: 2004

Mobile Device Attacks

Introduction Approximately 7 billion people worldwide use some form of mobile device, including a smartphone or a tablet, to do anything from checking their bank accounts and making purchases to updating their profiles on social media and keeping tabs on their wellness (Zhou et al., 2018). Despite the widespread use of mobile devices and the ... Read More
Pages: 7       Words: 1696

Information Security and Computer Fraud

Introduction As the use of data in education has increased, so has the need to protect that data. In the current online environment where students are increasingly reliant on technology for their education, information security and fraud can have significant effects on students. This paper will discuss how Information security affects students’ privacy, how computer ... Read More
Pages: 4       Words: 983

Cloud Service Models

Introduction Cloud service models refer to the different resources connected to cloud technology and infrastructure and this includes the networks, servers as well as storage capacities for the different cloud service offerings. The purpose of the paper is to explain what cloud service models are and also define and give a clear description of the ... Read More
Pages: 10       Words: 2726

Big Data Analysis for Electricity Consumption

Abstract Understanding and acknowledging data analytics’s roles in modern industrial systems is good. There is also development in information and communication technology. There is an added layer for the conventional electricity consumption and distribution network, especially for data collection, analysis, and storage. Currently, there is a lot of comprehensive installation of sensors and smart meters. ... Read More
Pages: 9       Words: 2262
1 7 8 9 10 11 12 13 25
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics