1835 reviews

Computer Science Essays

The essays below were written by students to help you with your own studies. If you are looking for help with your essay then we offer a comprehensive writing service, provided by fully qualified academics in your field of study.

Essay Writing Service

Example Computer Science Essays (Page 1)

Artificial Intelligence Essay
Example essay. Last modified: 12th Oct 2023
Introduction: This paper is the introduction to Artificial intelligence (AI). Artificial intelligence is exhibited by artificial entity, a system is generally assumed to be a computer....

Essay Discussing Negative Effects of Artificial Intelligence
Example essay. Last modified: 19th Dec 2022
Introduction: Artificial Intelligence is a branch of computer science concerned with making computers behave like humans.This paper describes some negative effects that may happen in the future due to the influence of artificial intelligence...

Increased Alienation and Loneliness from Social Media Overuse
Example essay. Last modified: 16th Nov 2021
Introduction: The adverse effects of computing technology, specifically social media platforms, and the increased risk of loneliness from overuse....

Agile Software Development
Example essay. Last modified: 3rd Nov 2021
Introduction: Agile development is a powerful approach to software development that was adopted in the 1990s to improve the process. Agile improves many aspects of software development, including costs, scope, and schedule....

A Comparison of Mesh and Star Networks
Example essay. Last modified: 3rd Nov 2021
Introduction: A comparison of Mesh and Star networks, looking at the advantages and disadvantages of both including redundancy and costs....

Applications of Metamorphic Testing
Example essay. Last modified: 3rd Nov 2021
Introduction: In this paper, the concepts of metamorphic testing (MT) and its effectiveness in solving the challenges in software testing are presented....

Machine Learning Techniques for Software Defined Network Security
Example essay. Last modified: 2nd Nov 2021
Introduction: This paper presents some of the most used methods for network security in a SDN environment using ML techniques, and some approaches organized by network attacks, in contrast to other papers of ML methods used in the SDN....

A Survey on Parallel and Distributed Deep Learning
Example essay. Last modified: 29th Oct 2021
Introduction: In this paper, we review the emerging researches of deep learning models using parallel and distributed tools, resources, algorithms and techniques....

Artificial Intelligence for Game Playing
Example essay. Last modified: 28th Oct 2021
Introduction: This paper discusses the history of AI systems in artificial intelligence for playing games. The part learning and self-play in AI cover how self-play can be applied in various games....

Artificial Intelligence Chips & Comparison with CPUs and GPUs
Example essay. Last modified: 26th Oct 2021
Introduction: This paper discusses various processors that have been used to implement machine-learning algorithms. The paper further discusses the need for application-specific processes, followed by an example of Artificial Intelligence (AI) Accelerator i.e. Tensor Processing Unit (TPU)....

What is Huffman Encoding and why is it important?
Example essay. Last modified: 18th Oct 2021
Introduction: Huffman Encoding is an algorithm where optimal prefix code is used for compressing data without losing information. Here prefix code means the unique bit sequence assigned to each character to prevent ambiguity while decoding the generated bitstream....

Event-Driven Programming Features
Example essay. Last modified: 13th Oct 2021
Introduction: Event-driven programming known as a computer programming paradigm that used the occurrence of events to determine the control flow of the program. This type of application is designed to detect events as they occur, and use an appropriate event-handling procedure to deal with it, which normally use a callback function or method....

An Explanation of the Field of Software Engineering
Example essay. Last modified: 13th Oct 2021
Introduction: The field of computer science and software engineering is an expansive and gradually developing field that develops and creates new and interesting solutions and products by taking advantage of many different areas of skills and communication practices....

Digital Forensics Tools used in Crime Investigation for Forgery Detection
Example essay. Last modified: 12th Oct 2021
Introduction: The focus of this paper is on available forensics tools and frequent image processing techniques involved in it to investigate crime related digital traces....

Wireless Lan Applications Areas
Example essay. Last modified: 27th Sep 2021
Introduction: All types of information can now be sent to almost every corner of the world. Recently, a good attention has been focused on wireless networking. Over the last century, advances in wireless technologies have led to the radio, the television, the mobile telephone, and communication satellites....

Strengths and Weaknesses of Heuristic Evaluation
Example essay. Last modified: 24th Sep 2021
Introduction: When choosing a usability evaluation method, it is important to understand what usability evaluation is. Usability evaluation evaluates how the interface of certain software or product works....

Computer Science Dice Game
Example essay. Last modified: 24th Sep 2021
Introduction: My program was relatively successful, however it did have a few flaws, some I could fix, some that I couldn’t work out how to fix. The gameplay is quite user-friendly with visual aids and simplistic controls, and resolves any ties or mistakes, either in a good or a bad way, unfortunately....

Modulation Systems used in Satellite Communications
Example essay. Last modified: 22nd Sep 2021
Introduction: The objective of this paper is to describe different types of modulations systems using for satellite communications. In this report, first I am trying to give some basic information related to the modulation systems and then bring all possible modulation schemes used in satellite communications....

Analysis of the Role of Cryptography in Network Security
Example essay. Last modified: 22nd Sep 2021
Introduction: This essay will analyse cryptography, web security, and security of wireless network system to implement the network security strategies for the organisation in future....

Introduction of Computer Virus
Example essay. Last modified: 22nd Sep 2021
Introduction: Computer Virus is a program that copies itself, Computer virus can infect your computer and slowing down your computer. And virus also can spreads computer to computer. The person who sends out the computer virus may use networking of the internet....

Analysis, Design, Implementation and Evaluation of E-learning Management System
Example essay. Last modified: 20th Sep 2021
Introduction: This interim report charts the progress of my ELearning Management System project. This report provides a critical analysis of the tasks that were undertaken along with supporting evidence of all work done and includes comments on any setbacks that may have delayed progress. It also look at what still needs to be done to complete the project....

Characteristics of Real Time Systems
Example essay. Last modified: 9th Sep 2021
Introduction: In this paper we describe the distinguished characteristics of real time systems which can be expressed as a function of time....

Secure Private Servers with Multi Tier Firewalls
Example essay. Last modified: 9th Sep 2021
Introduction: The Concept of this report is to protect and secure our private Servers from the public Network and also from the other internal private network. Proposing virtual interfaces on the firewall and these interfaces are assigned in different ZONES termed as DMZs....

The Fetch Execute Cycle
Example essay. Last modified: 26th Aug 2021
Introduction: Within this report about Computer Hardware, the report will cover the main concepts of computer hardware. Within this report there will be information about the main concepts of a computer system also. ...

Advantages and Disadvantages of Optimisation Techniques
Example essay. Last modified: 26th Aug 2021
Introduction: Client side security is one of the most important topics in internet security. All the information which has been downloaded from servers is stored on the client’s machine. All the site preferences as well as your login details are stored as cookies on the local machine and we need to keep those files safe from hackers....

Get Academic Help Today!

Encrypted with a 256-bit secure payment provider