1857 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 29)

Antivirus Research And Development Techniques
Example essay. Last modified: 12th May 2017
Introduction: Antivirus software is the most booming product which has constant developments to be most up to date defensive detecting product competing with all other antivirus software products available in the c...

An Android Application Development
Example essay. Last modified: 12th May 2017
Introduction: This paper talks briefly about developing applications on the android mobile platform using the Java Programming language. The overview includes introduction to the android platform features, architec...

Study Of Blue Eye Technology
Example essay. Last modified: 11th May 2017
Introduction: Blue eye is the technology to make computers sense and understand human behavior and feelings and react in the proper ways. The blue eye technology aims at creating computational machines that have pe...

Social Networking Sites Analysis
Example essay. Last modified: 10th May 2017
Introduction: Social Networking Sites are increasingly becoming popular, attracting the attention of millions of users by functioning like an online community. These sites are web based services that allow individu...

Facebook: A Useful Communication Tool
Example essay. Last modified: 10th May 2017
Introduction: This report provides an analysis about Facebook, which has become an important source of communication now days. The report starts with an introduction of Facebook, history of Facebook and its importa...

Importance Of IP Addresses
Example essay. Last modified: 10th May 2017
Introduction: Each device that participates in networking activities must have a unique IP address. Network services that use TCP/IP identify other network hosts by using IP addresses. The IP address provides the e...

A Multi User Chat System In Java
Example essay. Last modified: 10th May 2017
Introduction: The aim of this project is to develop an multi-user chat system to facilitate communicate between users with in the corporate or scientific organization. Chat application is to allow user for private ...

Programming Languages: Types and Uses
Example essay. Last modified: 10th May 2017
Introduction: 1. Introduction C Programming is a computer language that is structured and disciplined approach to program design. It’s a good systems programming language. This is faster than java, more predi...

User Side And Server Side Factor
Example essay. Last modified: 9th May 2017
Introduction: In this report, I will describe and explain about user side and server side factor that can influence the performance of a website and state particular server side capabilities with consideration for ...

Study On CPU And Memory Hierarchy
Example essay. Last modified: 9th May 2017
Introduction: CPU must have compatibility with the memory in the computer system. Memory cannot increase the speed of the processor however it can help the processor increase its performance. If the CPU doesn’...

Assembler, compiler and interpreter
Example essay. Last modified: 9th May 2017
Introduction: Assembler 1. An assembler is not equivalent to an interpreter, or compiler, assembly language is a low level language. 2. An assembler is one form of program translation. This is one relationship betw...

Differences Between RPC And RMI
Example essay. Last modified: 9th May 2017
Introduction: In enterprise application there is possibility that resources need to be access across multiple system to do a business process. One of the Java’s solutions for distributed application is Remote...

How Firewalls Mitigate Attacks
Example essay. Last modified: 9th May 2017
Introduction: Network Security is the process by which digital information assets are protected. If the network security is compromise, severe consequences could occur such as loss of confidential information [6]. ...

NoSQL Databases | Research Paper
Example essay. Last modified: 8th May 2017
Introduction: In the world of enterprise computing, we have seen many changes in platforms, languages, processes, and architectures. But throughout the entire time one thing has remained unchanged – relationa...

Classification Of Facility Layout Problems
Example essay. Last modified: 8th May 2017
Introduction: The purpose of this literature review is to explore the general facility layout problem, the dynamic facility layout problem, the models that have been used to represent the facility layout problem an...

Literature Review: Methods Of Virus Protection
Example essay. Last modified: 8th May 2017
Introduction: Computer viruses are most critical area in computer science. All computer users in the world are suffering from this threat. Viruses reproduce themselves and spread through computer to computer as wel...

Windows Vs Linux Comparison
Example essay. Last modified: 5th May 2017
Introduction: Linux and windows operating systems are software with programs and information needed to run and monitor the computer programs. An operating system is one of the most important computer programs whic...

A Remote Desktop Application For Android
Example essay. Last modified: 5th May 2017
Introduction: The aim of this project is to develop a simple-to-use remote desktop application which enables users to remote view contents of their desktop and view, create, edit and delete files and folders remote...

Feature extraction using crossing number (cn) and ridge tracking technique
Example essay. Last modified: 4th May 2017
Introduction: PROPOSED ALGORITHM: FEATURE EXTRACTION USING CROSSING NUMBER (CN) AND RIDGE TRACKING TECHNIQUE The various steps involved in feature extraction are as given below: 3.2.1 ADAPTIVE BINARIZATION The enha...

The Different Smart Home Technologies
Example essay. Last modified: 4th May 2017
Introduction: In this report I am going to explain the different smart home technologies EIB also known as KNX and CBUS. I will be giving a full explanation about what each system is capable of and a little about t...

The Plc Controlled Systems
Example essay. Last modified: 4th May 2017
Introduction: This document has been created to give an overview of what PLC Systems are and why we use them in modern day life. By writing this report I hope to give a good understanding of what I know about PLC S...

The System Hacking Cycle
Example essay. Last modified: 4th May 2017
Introduction: System hacking means to hack system password within the operating system. Many hacking attempts start with attempting to crack passwords. However, passwords are the key piece of information needed to ...

Communication Satellites And Computer Networks
Example essay. Last modified: 3rd May 2017
Introduction: A communication satellite which is sometimes abbreviated to COMSAT is an artificial satellite to engage in space for the purpose of telecommunications. Modern communication satellites use different or...

Network Troubleshooting Symptoms And Solutions
Example essay. Last modified: 3rd May 2017
Introduction: Data transfer from one point to another is the most important aspect of computers. Networks should be safe, reliable and secure for data movement. Any problem which occurs with computer networks cause...

Fuzzy Logic Control Implementation On Pic Microcontroller
Example essay. Last modified: 3rd May 2017
Introduction: Conventional PID controllers were used as a control strategy for various industrial processes from many years due to their simplicity in operation. They used mathematical models to control the plant f...

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider