Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Computer Science Essays

Analysis of Ransomware Attacks in Practice

Introduction Over the past decade, technological advances in electronic healthcare records (EHRs) have significantly transformed the medical industry at each level. Unfortunately, despite the positive impacts that emanate from advances in patient-centric management systems, cyber-criminals have also followed and made the data possessed by healthcare organizations key target for malicious attacks (Al Qartah 2020, p.10). ... Read More
Pages: 14       Words: 3654

Transforming the Knowledge of Smart Sustainable Cities

CONCEPTUAL AND THEORETICAL BACKGROUND A new techno-urban phenomenon dubbed “smart cities sustainability” has emerged since the mid-2010s, bringing together sustainability, urbanization, and information and communication technology (ICT). When they are put together as set framework, they combine the best aspects of sustainable cities with the innovative ICT solutions produced in cities. More and more research ... Read More
Pages: 5       Words: 1189
Don't know how to write a paper for the grade you need?
Use our paper writing services and get assistance necessary to get the grade you want.
Place an order

Company’s Infrastructure Design

Ecommerce infrastructure comprises several components that must frequently work together to address severe ecommerce issues. Ecommerce firms, more than any other type of retail business, rely primarily on technology infrastructure. The first and most crucial consideration is an ecommerce platform, since the complete website will be built, serving as a digital shop for consumers. Another ... Read More
Pages: 11       Words: 2988

Integrating Big Data Analytics & Business Intelligence at Walmart Inc.

Introduction Technology has revolutionized the face of several businesses across the world. It has transformed the way the selling of products and services was done, or how clients were targeted. Technology is dynamic and so it keeps changing with time. Each and every passing day comes with new ways of doing things. Among the types ... Read More
Pages: 6       Words: 1390

Data Processing Cycle

The use of data is a vital and extensive process that is integrated into human beings’ lives in various contexts, from the personal aspect to the business and managerial aspect. The data life cycle has numerous stages, from the data creation stage to the final stage, data destruction or disposal. In between this cycle, one ... Read More
Pages: 4       Words: 839

Cyber Security Threats

Cyber security threats were once a matter of technology. People were not so much informed, and they preferred to leave the issue to people who were most engaged with the internet. However, the issue has developed into a global concern. No one is immune from cyber security threats. The threats are in the form of ... Read More
Pages: 8       Words: 1953

Colonial Pipeline Attack

A summary of what happened In the current digital era, cybercrime is constantly increasing, and the number of threats experienced by businesses and people is also growing. Each year breaches report exceeds what was experienced in the previous year. As brands and institutions rely more on technology, they also become more vulnerable to security threats. ... Read More
Pages: 4       Words: 919

The Future of Artificial Intelligence Systems in Acquisition and Fulfillment Process

Most organizations and departments heavily depend on information and data for normal operations. Similarly, the majority of government institutions depend on information too. As a result, these institutions spend enormous financial resources feeding their system with information. Furthermore, the process entails a repetitive process that consumes a majority of employees and institutional time. Office automation ... Read More
Pages: 3       Words: 640

Supervised Learning Approach in Cloud Computing

Abstract Supervised Machine Learning is a machine learning technique that helps in capturing the knowledge regarding input/output relationships that are present in the training set, also known as a specified set of pairs of the training sample. Due to the fact that the output data is utilized to monitor labels throughout the training sample operation, these ... Read More
Pages: 24       Words: 6412

Positive and Negative Impacts of Switching to Green Computing

INTRODUCTION Green computing is the study of how computers, portable devices, and computer-related goods such as servers, communication systems, network systems, displays, USBs, and printers may be made more efficient and environmentally friendly. Using environmentally friendly computer resources, maximizing a nation’s economic viability, and adhering to social duties are called “green computing.” Energy-efficient computers, displays, ... Read More
Pages: 3       Words: 757

Network Intrusion Detection for IOT Device Using Machine Learning Classification Algorithms

Introduction The Internet of Things (IoT) is a new computing paradigm that allows all kinds of items to communicate with each other over the Internet. IoT devices are frequently deployed in hostile and unsecure environments, increasing their vulnerability to various threats. In order to safeguard IoT devices from intruder attacks, security solutions are required. An ... Read More
Pages: 7       Words: 1863

Implementing Informatics Systems

Information technology has notably had a positive impact on the medical field. Notably, most patient data, such as patients’ histories, current medication, and prescriptions, are stored in information systems designed specifically for the health sector. The systems are designed differently and tailored according to user preference; they all play a similar basic role. Wise to ... Read More
Pages: 4       Words: 909

Effects of Technology Over the Past 25 Years

How has technology affected day to day life in the past 25 years Technology has impacted almost every aspect of life over the past 25 years, from public transit effectiveness and reliability to food and health services, interpersonal interactions, and economic output. The internet’s influence has made it easier to shape societies and share knowledge ... Read More
Pages: 3       Words: 591

Cybersecurity Management Essay

Cybersecurity Overview In an organization’s private and public networks, electronic data transmitted within is protected by cyber security. As a result, data transmitted and shared within internet networks and private local area networks are protected. Nonetheless, the major role of computer security is protecting data transmittable and transmitted in a private network only. Concerning how ... Read More
Pages: 10       Words: 2673

Essay on Cloud Computing

Cloud computing encompasses the conveyance of different services through the Internet, which is necessitated by technological improvements realized in recent years. Cloud computing is a technology, which utilizes the Internet to manage and store data on remote servers (Jadeja & Modi, 2012). Individuals can access the different types of data stored via the Internet, such ... Read More
Pages: 5       Words: 1276
1 19 20 21 22 23 24 25
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics