Computer Science Essays (Examples)

Studyspark

Study Document Study Document

Purchasing A Windows Computer

Pages: 4 (1166 words) Sources: 3 Document Type:Research Paper Document #:73501520

I would like a computer that is portable so that I can work on the go, during travel, and when I am away from home. I do not … Windows operating systems. I would have a preference for a touch screen laptop if available within my budget, which is $1500 for the computer and $500 for the software. This paper will compare three advertisements for computer based on specs and affordability.
The advertisement for the Apple MacBook Pro on the Best Buy website is compared to the advertisement for … website is compared to the advertisement for the Microsoft Surface on Amazon and the Dell XPS 15 2-in-1 on Dell’s website. The Dell computer has the largest screen size at 15 inches. However, for a laptop that is meant to be taken on the go, 15 inches … the best OS. However, the Apple does not come with a touch……

References

References

Apple - MacBook Pro. (2019). Retrieved from https://www.bestbuy.com/site/apple-macbook-pro-13-display-with-touch-bar-intel-core-i5-8gb-memory-128gb-ssd-latest-model-space-gray/5998700.p?skuId=5998700

Microsoft Surface Laptop. (2019). Retrieved from https://www.amazon.com/Microsoft-Surface-Laptop-Touch-Screen-Alcantara/dp/B07YNK3R68/ref=sr_1_8?fst=as%3Aoff&qid=1578208759&refinements=p_36%3A2421891011&rnid=2421885011&s=pc&sr=1-8&th=1

XPS 15 2-in-1 Laptop. (2019). Retrieved from https://www.dell.com/en-us/shop/2-in-1-laptops/xps-15-2-in-1-laptop/spd/xps-15-9575-2-in-1-laptop/fncwlf405sv2

Studyspark

Study Document Study Document

Natural Science Health And Nutrition

Pages: 9 (2735 words) Sources: 5 Document Type:Essay Document #:29717647

… too much candy and pre-packaged foods. I looked at my after school and work activities and they consisted of me sitting at a computer or watching television. My goals were to change up these eating and exercising habits.
I did not keep any journals, not formally speaking, ……

References

References

Bray, G. A., Nielsen, S. J., & Popkin, B. M. (2004). Consumption of high-fructose corn syrup in beverages may play a role in the epidemic of obesity. The American Journal of Clinical Nutrition, 79(4), 537-543.

Davis, B. (2008). Defeating Diabetes: Lessons from the Marshall Islands. Today’s Dietitian, 10(8), 24.

Heart. (2020). Cholesterol. Retrieved from  https://www.heart.org/en/health-topics/cholesterol/hdl-good-ldl-bad-cholesterol-and-triglyceride s

Heart Monounsaturated Fat. (2020). Retrieved from  https://www.heart.org/en/healthy-living/healthy-eating/eat-smart/fats/monounsaturated-fat s

Malik, V. S., Popkin, B. M., Bray, G. A., Després, J. P., Willett, W. C., & Hu, F. B. (2010). Sugar sweetened beverages and risk of metabolic syndrome and type 2 diabetes: a meta-analysis. Diabetes Care,  https://doi.org/10.2337/dc10-1079 

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external … companies.
According to a Security Administrator and System Auditor having nearly two decades of experience, it is imperative to routinely monitor the following computer activity domains: user access control, audit trail, and system activity monitoring (Davis & Yen, 2019; Suduc et al., 2010). The abovementioned tasks are ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Computer science Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

US Customs And Border Protection And Defense Intelligence Agency

Pages: 4 (1149 words) Sources: 6 Document Type:question answer Document #:85676019

...Computer science Private Security and Homeland Defense
Questions 2 and 3
Question 2:
The Intelligence Community is comprised of 17 agencies. These agencies work with Federal, State, Local, Tribal and Territorial partners to protect the homeland. Four of these agencies are intelligence elements of the Department of Defense Services – Army, Navy, Marine Corps and Air Force. Please pick ONE of these Department of Defense Services intelligence elements and explain its mission. In what ways does it contribute to the intelligence cycle? Provide examples.
The Department of Defense Services intelligence element that I selected in this particular case is the Defense Intelligence Agency (DIA). The stated mission of DIA is “provide intelligence on foreign militaries to prevent and decisively win wars” (DIA, 2020). Thus, it is important to note, from the onset, that this particular agency largely concerns itself with not only the gathering, but also the production of military intelligence. As……

References

References

Customs and Border Protection – CBP (2020). About CBP. Retrieved from  https://www.cbp.gov/about 

Department of Homeland Security – DHD (2016). Section 559 Pilot Program Donations Acceptance. Retrieved from  https://www.dhs.gov/sites/default/files/publications/Customs%20and%20Border%20Protection%20-%20Section%20559%20Pilot%20Program%20Donations%20Acceptance%20-%20FY%202016.pdf 

Defense Intelligence Agency – DIA (2020). Strategy. Retrieved from  https://www.dia.mil/About/Strategy/ 

Keating, T.J. (2011). Joint and National Intelligence Support to Military Operations. Washington, DC: DIANE Publishing.

Office of the Director of National Intelligence (2020). Defense Intelligence Agency. Retrieved from  https://www.intelligence.gov/index.php/how-the-ic-works/our-organizations/412-dia 

U.S. Government Accountability Office – GAO (2020). U.S. Ports of Entry: Update on CBP Public-Private Partnership Programs. Retrieved from  https://www.gao.gov/assets/710/704191.pdf 

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… business operations. Significantly, in the contemporary setting, companies and entrepreneurs in the accounting sector are no longer constantly installing software apps on their computer or computer systems situated within the premises to operate their businesses. Rather, they are opting for the cloud. Cloud computing is facilitating substantial agility for … service provider that is fully liable for the construction of the servers and the storage centers, networking services, and installation of security and computer firewalls, and also physical data spaces and centers that are situated within the organizational buildings. Some of the renowned IaaS service providers include ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computer or the Internet. As today’s digital natives have the most experience with computer, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are young, digitally sophisticated, and able to operate with a degree … by professional criminals to lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things … data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
computer and the rise of the Internet ushered in the era of cybercrime. IBM’s first computer arrived in the 1950s, but it was……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Investigative Conclusion And Testimony

Pages: 9 (2819 words) Sources: 6 Document Type:Research Paper Document #:77583608

… other reasons to believe that copies of the source code were emailed to the personal email of Mr. Belcamp by the accused himself. computer forensics is a scientific process in which case verified methods and approaches are used in an attempt to gather, preserve, or retrieve important ……

References

References

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.

Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.

Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.

Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.

U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from  https://www.justice.gov/criminal-ccips/file/891011/download 

Studyspark

Study Document Study Document

Fake News Detection

Pages: 4 (1291 words) Sources: 5 Document Type:literature review Document #:42567912

...Computer science Fake News Detection
Introduction
How can fake news be detected and prevented from dominating the online discourse of news events? Numerous researchers have been discussing this issue and identifying ways to detect fake news, whether on social media (Shu et al.) or by creating a benchmark dataset to facilitate the process (Wang). The topic of this study is fake news detection and what methods are available in this new field. The reason for addressing this topic is that fake news has been a hot button issue in politics ever since the election of Donald Trump. Understanding how fake new proliferates and what can be done to stop its proliferation is something that the digital community can benefit from. The inquiry question for this review is: What are some of the ways that fake news detection can be facilitated?
Body
This literature is organized according to what the researchers have found.……

References

References

Conroy, Niall J., Victoria L. Rubin, and Yimin Chen. "Automatic deception detection: Methods for finding fake news." Proceedings of the Association for Information Science and Technology 52.1 (2015): 1-4.

Rubin, Victoria L., Yimin Chen, and Niall J. Conroy. "Deception detection for news: three types of fakes." Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Community. American Society for Information Science, 2015.

Ruchansky, Natali, Sungyong Seo, and Yan Liu. "Csi: A hybrid deep model for fake news detection." Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. ACM, 2017.

Shu, Kai, et al. "Fake news detection on social media: A data mining perspective." ACM SIGKDD Explorations Newsletter19.1 (2017): 22-36.

Wang, William Yang. "" liar, liar pants on fire": A new benchmark dataset for fake news detection." arXiv preprint arXiv:1705.00648 (2017).

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. … 2018), and the quality and extensiveness of the data that is collected in only dependent on the respective processing speeds of the host computer network and the sensors that are used in a given configuration (Davis, 2017). These attributes mean that the IoT can be applied by …
Some of the most important features of IoT applications include the fact that conventional mobile devices such as smartphones, various types of personal computer, video systems and other handheld devices as well as objects that have traditionally not been viewed as being amenable can be incorporation into … video systems and other handheld……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".