Computer Essay Examples

Impact of Computer Technology

Man is no longer living in the Age of the Machine, but in the Technological Revolution. He is no longer replaced by machines, but by micro chips built together to form what we call a computer. As a creation of man, it was made to add convenience to his life. However, in the current situation… View Article

Lending System

a. Description of the System As the world moves a global competitive and more complex electronic place, lots of establishments still are using the old way of doing process. The best thing to consider is the assurance that the clients are getting the satisfaction of the services provided by the company and also the creating… View Article

Network Security

You are interested in starting your own Music Store, QualitySounds, in a suburban area of your town. You need to design and build a network and computing solution for your stores. You have done some initial planning and you will start with two stores (but you plan to add two more stores across town within… View Article

Enterprise Data Storage

Data Storage is generally divided into two; one is customer storage, which only uses typical disk drives, flash drives or local hard disk in PC or in laptop. While Enterprise Data Storage is the mainly use for large enterprise storage for big industry or company. The data that is being stored in this centralize storage… View Article

Technology in the Classroom

Time after time we hear everywhere comments from grandparents, parents, brothers and sisters saying that ‘things were so much different when we were in school at your age, and now a days kids are just staring at screens and pushing buttons and now family time includes having your phone with you at all times and… View Article

Trends in Business Communication

Over the past two decades technology has advanced rapidly, bringing substantial change in how people communicate in business. While traditional methods of communications such as formal letters and business meetings still take place, even these types of communications have changes dramatically. With the rise of personal computers and the internet in the early 1990’s, nearly… View Article

The Computer Vision Syndrome

Close to 150 million people sit in front of a computer monitor each day. Many of them spend more than two hours at a time, focusing on screens as they complete work projects, blog, or just surf the web. If a significant portion of your day involves computer time, you may be at the risk… View Article

Cloud Computing Technology

INTRODUCTION Cloud computing is Internet (“cloud”) based on development and use of computer technology (“computing”).It is a style of computing in which dynamically scalable and often virtualised resources are provided as a service over the internet.Users need not have knowledge of, expertise in, or control over the technology infrastructure “in the cloud” that supports them…. View Article


In this report I have discussed that the encryption technology is necessary for citizens to protect their privacy and security when using computer networks. Otherwise, medical records, credit card numbers, trade secrets, as well as personal communications relayed over computer networks are not safe from prying eyes. Also I have presented an arguments in favor… View Article

Classifying Computers

According to the Global Census, forty-four million households, or forty two percent, had at least one member who used the Internet at home in 2000. Today, more family members in the world use computers. Most people are aware of the desktop computers which can be found in the home and in the workplace. What are… View Article

Computerized Enrollment System

Improvement in computer world means the act of making new arrangement or style of doing work, activities, and processes efficiently, effectively and faster from the past, that brings convenient to the people. Improvement is an opportunity for every one and in any organizations, the researchers want to have a part in this improvement either it… View Article

Controversial Issue in the It Field

The problem is that people don’t really know or think there is a difference between network administrator and system administrator. Just because they have administrator in the name does not mean they do the same thing. When u go to school u have to pick one or the other because one degree is not going… View Article

Cuckoo’s Egg Analysis Paper

The Cuckoo’s Egg book is well written by Cliff Stoll. It was something like reading a horror story book. It was creepy, suspense, curiosity and scary too. The hacker every time breaks into a military system seemed to be like a ghost entering into the house and not like a thief. We know thief will… View Article

Cybercrime Definition

What is this Cyber crime? We read about it in newspapers very often. Let’s look at the dictionary definition of Cybercrime: “It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money”. Mr…. View Article

CyberCrime Law

The Cybercrime Law of the Philippines (also known as the Cybercrime Prevention Act of 2012 or Republic Act 10175) is a newly-signed act that gives us a true legal tool to combat cybercrime. A better definition is given by a press release from the Senate, a part of which says, “The Cybercrime Prevention Act lays… View Article