Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Computer Science Essays

eBay Information Breach

Safeguarding subtle intellectual property (IP), consumer details, and financial information is critical in the current world. Therefore, information security is of keen interest to any business organization. The technological growth and advancement of information technology resulted in numerous system attacks by malicious individuals. US is the dominant share of most data breaches standing at an ... Read More
Pages: 3       Words: 632

Data Modeling and Analysis

Introduction The overall context would propose the impact and usability of big data analytics on Marks & Spencer over the years. Marks & Spencer is a major British multinational company with headquarters in London, England. It is known to specialize to sell clothes, home clothes as well as different types of food products in the ... Read More
Pages: 14       Words: 3632
Don't know how to write a paper for the grade you need?
Use our paper writing services and get assistance necessary to get the grade you want.
Place an order

Essay on Cybersecurity

Cybersecurity is the use of technology and programs to protect systems, programs, devices, and networks from digital attacks (Singer & Friedman, 2014). It aims at minimizing the risk of unauthorized access or exploitation of systems. Cybersecurity has many applications in the workplace. Firstly, cybersecurity is used to protect data. Data in the workplace may include ... Read More
Pages: 3       Words: 701

Computerization & Computational Thinking

Alan Turing, the author of Computing Machinery and Intelligence, asks, “Can machines think?” He argues that no evidence or convincing arguments exist that a machine cannot think as intelligently as human beings. He approaches his theory philosophically and technically, where the technical elements seem more philosophical than the technical elements. Turing commences his investigation by ... Read More
Pages: 5       Words: 1181

Analysis of Ransomware Attacks in Practice

Introduction Over the past decade, technological advances in electronic healthcare records (EHRs) have significantly transformed the medical industry at each level. Unfortunately, despite the positive impacts that emanate from advances in patient-centric management systems, cyber-criminals have also followed and made the data possessed by healthcare organizations key target for malicious attacks (Al Qartah 2020, p.10). ... Read More
Pages: 14       Words: 3654

Transforming the Knowledge of Smart Sustainable Cities

CONCEPTUAL AND THEORETICAL BACKGROUND A new techno-urban phenomenon dubbed “smart cities sustainability” has emerged since the mid-2010s, bringing together sustainability, urbanization, and information and communication technology (ICT). When they are put together as set framework, they combine the best aspects of sustainable cities with the innovative ICT solutions produced in cities. More and more research ... Read More
Pages: 5       Words: 1189

Company’s Infrastructure Design

Ecommerce infrastructure comprises several components that must frequently work together to address severe ecommerce issues. Ecommerce firms, more than any other type of retail business, rely primarily on technology infrastructure. The first and most crucial consideration is an ecommerce platform, since the complete website will be built, serving as a digital shop for consumers. Another ... Read More
Pages: 11       Words: 2988

Integrating Big Data Analytics & Business Intelligence at Walmart Inc.

Introduction Technology has revolutionized the face of several businesses across the world. It has transformed the way the selling of products and services was done, or how clients were targeted. Technology is dynamic and so it keeps changing with time. Each and every passing day comes with new ways of doing things. Among the types ... Read More
Pages: 6       Words: 1390

Data Processing Cycle

The use of data is a vital and extensive process that is integrated into human beings’ lives in various contexts, from the personal aspect to the business and managerial aspect. The data life cycle has numerous stages, from the data creation stage to the final stage, data destruction or disposal. In between this cycle, one ... Read More
Pages: 4       Words: 839

Cyber Security Threats

Cyber security threats were once a matter of technology. People were not so much informed, and they preferred to leave the issue to people who were most engaged with the internet. However, the issue has developed into a global concern. No one is immune from cyber security threats. The threats are in the form of ... Read More
Pages: 8       Words: 1953

Colonial Pipeline Attack

A summary of what happened In the current digital era, cybercrime is constantly increasing, and the number of threats experienced by businesses and people is also growing. Each year breaches report exceeds what was experienced in the previous year. As brands and institutions rely more on technology, they also become more vulnerable to security threats. ... Read More
Pages: 4       Words: 919

The Future of Artificial Intelligence Systems in Acquisition and Fulfillment Process

Most organizations and departments heavily depend on information and data for normal operations. Similarly, the majority of government institutions depend on information too. As a result, these institutions spend enormous financial resources feeding their system with information. Furthermore, the process entails a repetitive process that consumes a majority of employees and institutional time. Office automation ... Read More
Pages: 3       Words: 640

Supervised Learning Approach in Cloud Computing

Abstract Supervised Machine Learning is a machine learning technique that helps in capturing the knowledge regarding input/output relationships that are present in the training set, also known as a specified set of pairs of the training sample. Due to the fact that the output data is utilized to monitor labels throughout the training sample operation, these ... Read More
Pages: 24       Words: 6412

Positive and Negative Impacts of Switching to Green Computing

INTRODUCTION Green computing is the study of how computers, portable devices, and computer-related goods such as servers, communication systems, network systems, displays, USBs, and printers may be made more efficient and environmentally friendly. Using environmentally friendly computer resources, maximizing a nation’s economic viability, and adhering to social duties are called “green computing.” Energy-efficient computers, displays, ... Read More
Pages: 3       Words: 757

Network Intrusion Detection for IOT Device Using Machine Learning Classification Algorithms

Introduction The Internet of Things (IoT) is a new computing paradigm that allows all kinds of items to communicate with each other over the Internet. IoT devices are frequently deployed in hostile and unsecure environments, increasing their vulnerability to various threats. In order to safeguard IoT devices from intruder attacks, security solutions are required. An ... Read More
Pages: 7       Words: 1863
1 22 23 24 25 26 27 28
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics