• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

University Degree: Computer Science

Browse by

Currently browsing by:

4 star+ (1)
3 star+ (1)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  • Marked by Teachers essays 2
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    file sharing. In this article, I will investigate the situation of file sharing in the UK, and also analyse how persistent sharers may expect to be prosecuted under the Copyright, Designs and Patents Act 1988, as well as other legislation, in the future. The earliest form of file sharing gained popularity in 1998. Released under the name Napster, and developed by Shawn Fanning (an American university student at the time), the service offered users P2P music sharing. The term 'Peer-to-Peer' refers to the way in which content is exchanged.

    • Word count: 3810
  2. Marked by a teacher

    Cisc v risc. To begin this assignment , I will outline the definition of cisc and risc . Cisc stands for complex instruction set computing and Risc stands for reduced instruction set computing . these two concepts are both types of instruction sets used

    in 1970 the main component of a computer was the cpu , which could be the size of a large fridge and was attended by lab technicians. The thought of compressing a cpu down to the size of a small silicone chip was a far fetched concept back then . computers in them days were rewired to perform calculations but three mathematicians John von newman , J.presper Eckert and John Mauchly thought of an idea of storing the instruction set of these calculations .

    • Word count: 3112
  3. Ethics and professionalism in computing - examples from Facebook and Google

    To report an infringement of a copyright or other intellectual property right (for example, trademark) user can fill out an automated IP infringement form. This form is the fastest way to report any type of infringement. GOOGLE Google strongly supports intellectual property and copyright law, which are essential to both rewarding creators and supporting the free flow of information. Intellectual property (IP) laws are essential for ensuring that innovators are rewarded for their work and that incentives exist for people and companies to develop new ideas, technologies, and products. Intellectual property rights are not absolute.

    • Word count: 3425
  4. Toronto Airport Case Study Wireless Applications

    Standardized Hardware and Software Several business issues faced the GTAA in trying to implement the common use approach. Air Canada was the dominant carrier at Pearson airport with over 60% of the airport's traffic. As the dominant carrier, Air Canada feared the loss of any competitive advantage it might have due to exclusive use of its gates (which could form a barrier against competitors). There was also a fear of losing self-sufficiency. Since Air Canada felt that its IT network was already superior to those of its competitors, they perceived the common use approach as "leveling the playing field" and did not see any advantage in going to this approach.

    • Word count: 4266
  5. Precise analysis about The legal or illegal utilization of Internet cookies

    This paper firstly aims to argue precisely about various points of view about cookies and secondly intends to examine and debate concerning Internet users' idea, way of thinking, their likely requests and also their level of awareness about cookies. Literature review While electronic commerce has grown rapidly in recent years, most of marketing-website owners are trying to raise their awareness about customer convenience and behavior. It is obvious that if marketers have adequate information about their consumers such as preferred goods and some data about their identity, it can help them to promote their business and also help them to maintain their customers.

    • Word count: 3780
  6. A bucketing framework for Database security

    On the server side there is the encrypted table (cf. table 2 page 1). Table 2: Representation of the encrypted table When you look at the encrypted table, the only things that you can use are the distribution of the tuples into the differ- 1 This example are largely inspided from the example 1 of [4] page 721 and of the examples of the section 2 of [3] pages 217 and 218. ent buckets and/or the relations between the partitions of the columns.

    • Word count: 4449
  7. Methods and technology used in Computer Forensics

    In this sense, this branch of forensic science is no different to that of its counterparts; it's simply digital. 2.1 Uses of Computer Forensics As was just noted, computer forensics are used to unconver proof of particular usage in digital environments. This is not always a question of criminal investigation; there are also civil, academic and professional reasons for using computer forensics. Dennis Lynn Rader, a notorious American serial killer, was convicted in 2005 after a lengthly investigation came to a head when disks he had sent to a police station were analysed.

    • Word count: 9544
  8. Impact of Social Networking on e-business

    (Lea et al., 2006; Boyd & Ellison, 2007) The emergence of OSNs has and continues to attract a large number of the general public onto the internet. Millions of users, having joined SNSs such as Facebook, MySpace, Friendster and the likes, have integrated the usage of these sites into their day to day activities. Records show that, a sizeable percentage of users join SNSs each year and this number continues to escalate due to SNSs gaining popularity amongst all demographics. As identified by Steinfield et al. (2009) based on Comscore estimation, Facebook and MySpace have each boosted their user population by 100 million users since 60million in 2008.

    • Word count: 3089
  9. Star College Student Accommodation

    Relation Key attribute (Ordinary or circle shape) is a key attribute that is the unique and distinguishing characteristic of the entity in diagram below. DatabaseSchema 3NF Student (SID, SNAME, SADDRESS, SAGE, SEX, NATIONALITY, ROOM_TYPE) Apartment (AID, ROOM_TYPE, PLACE_NO, ROOM_NO, COST) Hall Of Residences (HID, ROOM_TYPE, PLACE_NUMBER, ROOM_NO, COST) Lease (LID, SID, DURATION, PLACE_NO, ROOM_NO) Table Primary Key Foreign Key Composite Key Student Sid apartment Aid hall Hid lease lid sid Apartment aid room_type place_no room_no monthly_rent_rate Student Sid Sname Saddress Sage Sex Nationality Room Hall hid room_type place_no room_no monthly_rent_rate Lease lid sid duration place_no room_no Assumptions used for this scenario are as following * Student need

    • Word count: 3014
  10. Lifecycle Management Of Information Technology Project In Construction

    tremendou? demand on companie? to lower co?t?, enlarge product a??ortment, improve product quality, and provide reliable delivery date? through effective and efficient coordination of production and di?tribution activitie?. To achieve the?e conflicting goal?, companie? mu?t con?tantly re-engineer or change their bu?ine?? practice? and employ information ?y?tem?. In recent time?, IT ha? enabled ?ome organi?ation, including tho?e in con?truction indu?try, to tran?form or re-engineer their bu?ine?? proce??e? in face of rapidly changing bu?ine?? environment. (?cacchi 2001:32) Problem ?tatement Thi? paper con?ider? adaptation? to overall practice of project management to more explicitly recognize, repre?ent, and manage interdependencie? between different project view?, pre?enting the conceptual framework for the unified approach to project management.

    • Word count: 9071
  11. AssignmentANIL KUMAR PERUKA-0824609

    The design of the website is depend on requirements of the users. UCD is also known as human centered design.UCD is an approach to develop effective and interactive system. It follows a step by step methods and techniques to develop well structured web interfaces. The UCD process is an iterative process in this design and evaluation steps are built in from the first stage of the project through implementation (Raissa Katz-Haas, 1998). User Centered Design Techniques: UCD have many techniques to develop good interface design such as focus groups, Usability testing, questionnaires, interviews and card sorting.

    • Word count: 4519
  12. Network Design

    We use two dedicated lines because the Law school will use more than 200 wired and wireless devices and most of the devices will connect to the internet on the proposed network, so the institute will require higher internet bandwidth, if not the connection to the internet will slow down .Also we need higher bandwidth because of the VPN and the VoIP implementation. If we didn't propose a high bandwidth internet connection the Voice Quality of the VoIP will be drop down and the VPN connection between main campus and the law college will be slow down so both voice and data services will be interrupted.

    • Word count: 5213
  13. IP network design

    It does not attempt to recommend or specify particular products or managed services; however it does describe best industry practice in building and operating an IP network. In particular, it recommends open industry standards, which should ensure that networks built in this fashion can function as part of the global Internet. In addition, a network operating to open standards removes the need to be tied to a particular supplier of equipment or services. A number of other existing documents and standards are referenced.

    • Word count: 15927
  14. Ubiquitous sensing spatial sensor networks

    C. Dilip Kumar 4 March 2009) (David Ley 2007) 2. Literature Review 2.1. Ubiquitous Sensing The technology of Ubiquitous computing is growing rapidly and its views are actively and usefully accepted. When you think about computer vision, you think about ubiquitous computing. The two are related to Artificial intelligence. Imagine a world where you have robots, these programmed computers will be making decisions for you, paying your bills, monitoring your movement and so on without any human interference. This is what Artificial intelligence is about.

    • Word count: 3863
  15. Research on Windows Registry for implementation of Windows Registry Optimizer

    The capabilities of Visual Basic.NET allow the author to access the registry without any problems. Research on Windows Registry Structure Understanding the registry structure and how the registry works is important in order to develop a registry optimizer. The author planned to learn how to use the functions that is available in Visual Basic.NET 2003 to explore the Windows Registry and learn how to clean it and fix invalid entries. Interface Design A research on designing the interface for the registry optimizer needs to be done for it to suit all types of users from novice users to advanced users.

    • Word count: 4596
  16. The development of Easy office project portfolio management system

    To have detailed each team members' profile for better understanding who is capable to do a project's tasks. 4. To have immediate and fast access to project portfolio management system, as well as all the necessary data about project and team members via Internet Development tools and software: 1. PHP 2. MySQL 3. Apache 4. Adobe Dreamweaver 5. Power Architect 6. Smart Draw Literature review Enterprise Resource Planning systems (ERP) are designed to integrate different data processes as well as sources of a company into one unified application.

    • Word count: 3905
  17. Design a web based online Appointment System for vehicle service centres in town to help with their appointment process

    To design, test and implement a web based online appointment system for car service centres and report the aspects of the project. To write a report detailing and evaluating the design, implementation and testing of the appointment system as a whole, drawing conclusions, and stating the significance of the findings. The evaluation of the system will include its advantages and effectiveness to car service centres. BACKGROUND As I'm a new driver and I recently bought a car, that made me visiting car servicing centres in the town for service the car or tire problems.

    • Word count: 7087
  18. Interactive Web Apps - Ajax

    Research has been conducted into the benefits and drawbacks of the application. 2. The need for increased responsiveness and interactivity in web applications The technology in this report is based around Ajax and web parts using asp.net components. Ajax is a way of achieving increased responsiveness and using Ajax and web parts is a way of increasing interactivity in web applications. Ajax is a good place to start when looking at increased responsiveness. Ajax is: 'Asynchronous JavaScript and XML' [1] So 'In a nutshell, it is the use of the nonstandard XMLHttpRequest object to communicate with server-side scripts.

    • Word count: 3013
  19. Windows Communication foundatio

    On top of these processes a second WCF has been self hosted to a separate client form which sends back from the database a search function so that a user can see how many times a specific function in the application has been used, such as 'Pythagoras'. This is contained in a gird view. This report helps in explaining the underlying code contained within the software as well as explaining ways in which the application could be hosted using the Microsoft IIS server.

    • Word count: 3730
  20. Implementation of Path Finding Techniques in Homeland Security Robots

    * Shabbir, for his moral support and belief in me. * My friends, who have encouraged me when I lacked confidence and instilled courage to face the world when I lacked it. Special thanks go to my few select friends who I consider to be my life long mates. * Above all to GOD, who works through me as he does through all of us! Path finding techniques is a vital sub task in mobile robotics that has been subjected to extensive research. Navigation issues also assume a lot of importance in homeland security applications.

    • Word count: 14571
  21. The Learning Benefits of Hypermedia Environments.

    Due to those problems many researches suggested that this information technology is an inappropriate support for learning systems. We are going to discuss about adaptive hypermedia and compare them with the usage of hypermedia. Finally we are going to present a learning system designed for financial students as a best practice of designing a learning system trying to avoid the disorientation of hypermedia. Appropriate and careful analysis and design are the unique solution to minimize disorientation. The Learning Benefits of Hypermedia Environments The instructional paradigm is shifting from a teaching environment to a learning environment, with a focus on "practice-centered learning."

    • Word count: 4134
  22. Embodied Gaming

    Sometimes even they offer smart and accurate solutions to problems that sometimes humans may find difficult. By playing video games any person can experience virtual situations and may learn new things, and new skills can then be utilized to perform well in the game. Of course, each game is different and will require different type of skills and a different way of thinking therefore playing a variety of games will be useful for later on and the experience that are gained could potentially be used in real life situations.

    • Word count: 3787
  23. Industrial Data Management Technologies

    I was not having the brief idea about the EER diagrams and UML as well now I am filling that I can do it very easily because the way of I got knowledge of my module and project work by professor. Here in our course work all the team members are have their own entities and tables, but we are using the information of the another group member. Like account department is using the information of the employee table etc.

    • Word count: 5193
  24. CSR Aanlysis

    Corporate Social Responsibility (CSR) is a concept that created to show the employers' obligation considering the interest of community, customers, employees, shareholders, and ecological arises from their operation (wikipedia). 2. Problem definition and Literature review 2.1 Problem Definition Process In this section, it is to focus on how well background lead into the problem definition and set the context and scope of study. At First, the Authors did so much researches and found that many CSR researches have been conducted in the western countries however limited done in Asia and it is less comparative studies done within Asia context through

    • Word count: 3442

"Computer science is no more about computers than astronomy is about telescopes."

-Edsger Dijkstra

If you're the kind of person that chooses a laptop based solely on the colour and shape, you can stop reading here. If, on the other hand, you've alwaysloved digging into the underlying mechanics of computers, trying your hand at writing software and replacing hardware, then a university degree in computer science could be an excellent choice for you.

To demonstrate full understanding of the course material, students of computer science will be expected to write papers. If you'd like to sharpen yourwriting skills, visit Marked by Teachers' collection of mathematical and computer science essays. Study from our teacher-annotated examples, and soon you'll be able to write as logically in English as you can in C++.

Computer science graduates usually go on to apply their skills directly to their careers, whether they find themselves withinbusiness, finance, government, academia or even the video games industry.


Conclusion analysis

Good conclusions usually refer back to the question or title and address it directly - for example by using key words from the title.
How well do you think these conclusions address the title or question? Answering these questions should help you find out.

  1. Do they use key words from the title or question?
  2. Do they answer the question directly?
  3. Can you work out the question or title just by reading the conclusion?
  • This report focuses on how the OSI (Open System Interconnection) and TCP/IP (Transmission Control Protocol/Internet Protocol) compare and contrast.

    "Conclusion: Because the OSI model was developed before the protocols were invented, it is not biased towards any of them. That makes it a general model. In contrast, the TCP/IP was just a description of already existing protocols. That makes it an applied suite for internetworking. It is relatively simple and reliable and available on virtually every hardware and operating system."

  • What Was the Tsarist Political System? To What Extent Had It Changed By 1914?

    "In conclusion it is clear that the Tsarist system was on a slippery slope. The Tsars knew from other countries experience that autocracy would crumble. I think that Alexander II tried to reform the system to bring the country up to date yet retain autocracy. However it could not happen as censorship made people uneducated and stopped the industry progressing. I think the Tsars after him tenuously held onto power by controlling the population in every aspect of life yet they tightened their grip so the country burst into revolution."

  • To what extent has the German electoral system shaped its party system and the development of the ma

    "In conclusion, then, the party system in Germany has been affected by many factors, including the role assigned to parties in the Basic Law, the role of the Federal Constitutional Court, sociology, and history, as well as the electoral system. It is difficult to see how any of these factors could be said to be pre-eminent, since they are intertwined to such a great extent, and it is also difficult to predict how the system will change in the future. The PDS, the remains of the old communist party in the GDR, is now in the Bundestag, and it is impossible to say how long they will stay there. Likewise the Greens. However, on the whole the history of the FRG is one of stable government, and this can be attributed to all of the factors noted above."

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.