Computer Engineering Essays (Examples)

1000+ documents containing “computer engineering”.
Sort By:
By Keywords
Reset Filters

Example Essays

Essay
Computer Engineering and Information Systems
Pages: 2 Words: 854

it's the same with a Wi-Fi network, where the higher the frequency and the more data is communicated via the wave, the more the actual performance of the F plane changes. And just like an F plane that can take in very high frequencies of waves while others will bounce off the device or begin to have properties like light waves (meaning they refract and reverberate) the same holds true for Wi-Fi signals.
If you have ever flown an F plane you can relate to this allegory and its implications on the distance a plane can travel, navigated by the signal from the control unit and the strength of the signal waves. The same is true of a Wi-Fi network. The stronger the frequency of a LAN as measured in kHz, the farther a signal can travel and the larger the potential LAN can be. And just as a signal…...

mla

References

Varshney, U., & Vetter, R. (2000). Emerging mobile and wireless networks. Association for Computing Machinery.Communications of the ACM, 43(6), 73-81.

Essay
Computer Engineering and Engineering
Pages: 5 Words: 511

rubbed my eyes and stared at the codes emblazoned across the computer screen. My fellow students involved in the Cooper Union Summer STEM program looked frantic and tired. We needed to make sure the videogame controller was operational.
I typed a few lines of code. With shaking fingers, I clicked the upload button at the top right of the screen. I rearranged a few wires on the board to match my code. Success! One major wall had been broken down but we had to move onto the next challenge, not bask in the warm sunlight of pride and relief.

Although I mostly studied electrical and computer engineering at Cooper Union, I was also able to explore the business aspects of the field. This led me to choose my future career path, that of electrical and computer engineering but with an entrepreneurial focus.

Teamwork, perseverance, problem-solving, and pride in a job well done…...

Essay
Computer IBM Entered the Computer
Pages: 20 Words: 8433

To some users of personal computers, who state, never trust a computer that you cannot lift; the IBM has been viewed, more often than not, as an enemy, and according to Byte, the computer magazine, this was because of the fact that the IBM company rose to fame mainly on the basis of its mainframe computers, that were large and forbidding, and overwhelmingly bulky. This was probably why, when the rest of the world was eyeing the emerging opportunities in the minicomputer market, the IBM never paid any attention, and even though IBM did succeed in capturing a large chunk of that market, it did not happen until Digital had captured the minicomputer market and had grown into a large corporation.
In the past few years, IBM has agreed to change the ways in which it conducts its business, and adapt to the changing times when the prices of computers…...

mla

References

Ellett, John. "About / Best Practices Center, Results Oriented Integrated Marketing the Dell

Way" Retrieved at   accessed 27 July, 2005http://www.nfusion.com/about/best_practices/Results-Oriented_Integrated_Marketing.html .

Konrad, Rachel. (10 August, 2001) "From Bits to Boom, IBM PC turns 20" Retrieved at   accessed 27 July, 2005.http://ecoustics-cnet.com.com/Mixed+record+as+PC+turns+20/2009-1040_3-271422.html .

Outsourcing Law, Deal structure, Case Study." Retrieved at accessed 27 July, 2005http://www.outsourcing-law.com/DealStructures/IBM.Lenovo.2005.01.06.htm.

Essay
Computer Mice Not All Input
Pages: 3 Words: 912

Because of the standardization and flexibility of the mouse, software developers have considerable leeway in their engineering. Alternates to the mouse such as the light pen and tablet do not provide users with as robust and diverse usages as the mouse.
Mice, moreover, are inexpensive. Although users can opt for high-end mice, most standard mice and even optical and cordless mice are affordable for the average consumer. Early mice, contained in clumsy rectangular boxes, did not have the ergonomic or visual appeal of modern mice, which are easy and accessible for all users. Accessibility is another reason why the mouse has revolutionized computing. Disabled computer users who cannot access QWERTY keyboards can perform many functions using voice recognition software and basic mouse clicks.

Advancements in mouse technology have also enabled users to save considerable time and energy for their computing needs. For example, the right-click button often brings up menu items…...

Essay
Computer Fundamentals the Pace of
Pages: 6 Words: 1767


Subtopic 6: Job management and protection; include a serious discussion of security aspects

The most commonly leveled criticism of operating systems is the inherent lack of security they have (Funell, 2010). Defining operating systems to have partitioned memory is just the start, as Microsoft learned with their Windows NT platform. Dedicated memory partitions by user account can be hacked and have been (Funell, 2010). The need for greater levels of user authentication is required, including the use of biometrics for advanced systems that have highly confidential data within them. The reliance on security-based algorithms that also seek to analyze patterns of use to anticipate security threats are increasingly in use today (Volkel, Haller, 2009). This aspect of an operating system can capture the levels of activity and the patterns they exhibit, which can provide insights into when a threat is present or not. The use of predictive security technologies, in addition…...

mla

References

Boudreau, K.. (2010). Open Platform Strategies and Innovation: Granting Access vs. Devolving Control. Management Science, 56(10), 1849-1872.

Jason Dedrick, & Kenneth L. Kraemer. (2005). The Impacts of it on Firm and Industry Structure: The Personal Computer Industry. California Management Review, 47(3), 122-142.

Furnell, S.. (2010). Usability vs. complexity - striking the balance in end-user security. Network Security, 2010(12), 13-17.

Larus, J.. (2009). Spending Moore's Dividend. Association for Computing Machinery. Communications of the ACM, 52(5), 62.

Essay
Computer Hard Drives
Pages: 6 Words: 1684

Computer Hard Drives
The globalization of computer technology offers a vast number of remarkable tools, devices, applications, and advanced equipments that brings comfort in our daily work and activities. New features, designs, and capabilities of various computer peripherals and hardware are continuously being developed and brought out to market for better performance of the current technology. One very important part of a computer that experiences the trend of up-to-date improvement is the Hard Drive.

This paper aims to provide information on the evolution of computer hard drives. Included in this paper is the history of hard drive, from the time it was developed as computer hardware up to the continuous production of new and upgraded performance of data storage mediums. The various types of this technology, its changing features, and the companies who provide us with this dependable hardware are also discussed in this paper.

Introduction

Of the diverse parts of a computer, the…...

mla

Bibliography

Legard, David. Smaller, Faster Hard Drives Coming Soon. PC World. 2003.

Kozierok, Charles. A Brief History of the Hard Disk Drive. PC Guide. 2001.

Byard, Larry. Hard Disk Drive Guide History.

Dux Computer Digest. 09 April 2003. http://www.duxcw.com/digest/guides/hd/hd2.htm

Essay
Computer Clustering Involves the Use of Multiple
Pages: 8 Words: 2319

Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single integrated system (Cluster computing). Clustering has been available since the 1980s when it was used in Digital Equipment Corp's VMS systems. Today, virtually all leading hardware and software companies including Microsoft, Sun Microsystems, Hewlett Packard and IM offer clustering technology. This paper describes why and how clustering is commonly used for parallel processing, batch processing, load balancing and high availability.
Despite some challenges such as achieving transparency, mitigating network latency and the split-brain problem, clustering has proven to be a huge success for bringing scale and availability to computing applications. Hungry for even more efficient resource use, IT departments are now turning their eye on the next evolution of clustering called grid computing.

Parallel processing is the processing of program instructions by…...

mla

Bibliography

Beowulf clusters compared to Base One's batch job servers Retrieved May 2, 2004 from Web site: http://www.boic.com/beowulf.htm

Burleson, D. Requirements for parallel clusters. Retrieved May 1, 2004 from Web site:  http://www.fast-track.cc/teas_ft_rac07.htm 

Cluster computing. Retrieved May 1, 2004 from Web site:  http://search390.techtarget.com/sDefinition/0,sid10_gci762034,00.html 

D'Souza, Marco (2001, April 13). Meeting high-availability through clustering. ZDNet. Retrieved May 2, 2004 from Web site:  http://www.zdnetindia.com/biztech/services/whitepapers/stories/19538.html

Essay
Computer Program Design What I
Pages: 6 Words: 1817


The programming design class gives the student many tools that they will need on the job, but there is much more to the design process than having the right tools. The ability to apply those tools to the situations that will arise on the job is one of the most important skills that the designer will have. However, this is not always easy to teach in the classroom. Therefore, it is important for the design student to read as many outside sources as possible. They must understand the various philosophies and approaches to the design process. They must understand the strengths and weaknesses of those approaches and how they relate to various customer projects. The computer program design student must develop the broadest knowledge base possible in order to deliver a quality product to the customer.

eferences

Din, J. & Idris, S. (2009). Object-Oriented Design Process Model. International Journal of Computer Science…...

mla

References

Din, J. & Idris, S. (2009). Object-Oriented Design Process Model. International Journal of Computer Science and Network Security. 9 (10): 71-79.

Guzman, J., Mitre, H. & Amescua, a. et al. (2010). Integration of strategic management, process improvement and quantitative measurement for managing the competitiveness of software engineering organizations. Software Quality Journal. DOI: 10.1007/s11219-

9094-7 Retrieved May 31, 2010 from http://www.springerlink.com/content/58k83507v1j7w653/?p=318712de7adb48cfa387cb4

3f1366078&pi=4

Essay
Computer and Web Ethics the Term Computer
Pages: 2 Words: 844

Computer and Web Ethics
The term "computer ethics," as coined by Walter Maner in the 1970s, refers to a field of study that examines "ethical problems aggravated, transformed, or created by computer technology" (Maner, 1980). Maner suggested that persons engaged in computer-related actions should apply traditional ethical frameworks, such as Kantianism and Utilitarianism, to govern their decision-making. While Immanuel Kant's virtue ethics are rooted in respect for all people and an inherent respect for virtuous character traits -- such as kindness, honesty, patience and humility -- Utilitarianism judges the morality of an action according to "the greatest good for the greatest number" rule (Stanford Encyclopedia, 2011).

Similar to Maner's definition, Deborah Johnson, author of Computer Ethics (1985), defined computer ethics as a study of how computers "pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms to uncharted realms" (Johnson,…...

mla

References

Bynum, T. (2006). "Flourishing Ethics," Ethics and Information Technology, 8(4), 157-173.

Gotterbarn, D. (2001). "Informatics and Professional Responsibility," Science and Engineering Ethics, 7(2), 221-30.

Johnson, D. (1985). Computer Ethics, First Edition, Englewood Cliffs, NJ: Prentice-Hall; Second Edition, Englewood Cliffs, NJ: Prentice-Hall, 1994; Third Edition Upper Saddle River, NJ: Prentice-Hall, 2001.

Maner, W. (1980). Starter Kit in Computer Ethics, Hyde Park, NY: Helvetia Press and the National Information and Resource Center for Teaching Philosophy.

Essay
Engineering Organizations
Pages: 2 Words: 601

Engineering Organizations
The first image displayed on the website for the American Society of Agricultural Engineers, rather eccentrically for an engineering organization, is two hands holding a clump of soil. Yet despite this earthy image, the society also stresses its technical nature, as members in the biological, agricultural, and other food related sciences could engage in virtual web conferences with one another, through web space accorded to the organization. Thus, the technical as well as the agricultural aspects of the organization enable members to improve their professional credentials and connect with other engineering professional in the agricultural field. Members can also make use of the organization's technical library and database of technical experts.

The ASAE also offers such perks for members as a group insurance plan and an e-newsletter. The offer of a group insurance plan illustrates that many members may not be members of a large corporate entity, and may…...

mla

Works Cited

ASAE -- American Society of Agricultural Engineers. (2004) Official website. Retrieved 29 November 2004 at www.asae.org

IEEE - Institute of Electrical and Electronics Engineers, (2004) Official Website. Retrieved 29 November 2004 at  http://www.ieee.org

Essay
Computer What Is Going to
Pages: 10 Words: 4223

In the same year, the founders started a new company for computer development called the Eckert-Mauchly Computer Corporation. By 1949, this company launched the BINAC or Binary Automatic computer. This computer made use of magnetic tape for the storage of data. Then this company was bought by emington and Corporation and the name was changed to Univac Division of emington and. This company was the organization to bring out UNIVAC which is one of the originals of the type of computers that are used today. (Inventors of the Modern Computer: The ENIAC I Computer - J Presper Eckert and John Mauchly)
1951 - UNIVAC begins to take over the business industries market:

Presper Eckert and John Mauchly set up their company and found their first client in the United States Census Bureau. The population of United States was growing very fast due to the baby boom that was taking place then…...

mla

References

Bellis, Mary. "Inventors of the Modern Computer: The Atanasoff-Berry Computer the First

Electronic Computer - John Atanasoff and Clifford Berry." Retrieved at   Accessed 6 October, 2005http://inventors.about.com/library/weekly/aa050898.htm .

Bellis, Mary. "Inventors of the Modern Computer: The ENIAC I Computer - J Presper Eckert and John Mauchly" Retrieved at   Accessed 6 October, 2005http://inventors.about.com/library/weekly/aa060298.htm .

Bellis, Mary. "Inventors of the Modern Computer: The Harvard MARK I Computer - Howard

Essay
Computers and Culture Using the Book Technopoly
Pages: 7 Words: 2023

computers and culture, using the book "Technopoly: The Surrender of Culture to Technology," by Neil Postman, and other resources. Specifically, it will answer the questions: How have computers and computer networks changed human thinking, behavior, and lifestyle? What has been gained? What has been lost? What are the advantages of computers in communication? In education? In entertainment? In the economy? What are the disadvantages in these areas? Is computer technology creating winners and losers, or furthering social stratification? Have we become too dependent on computers? Do computers limit social skills and physical activity to a damaging degree? Why or why not? Computers have changed our national culture and our global culture, and not always for the better. When they were first developed for the mass market, computers were meant to increase productivity and cut down on paper work. Today, computers have permeated every section of our lives, and our…...

mla

Bibliography

Berg, R. Dreyer. "Our Computational Culture: From Descartes to the Computer." ETC.: A Review of General Semantics 51.2 (1994): 123+.

Marsha Kinder, ed. Kids' Media Culture. Durham, NC: Duke University Press, 1999.

Perrolle, Judith A. "Information, Technology, and Culture." The Relevance of Culture. Ed. Morris Freilich. New York: Bergin & Garvey Publishers, 1989. 98-114.

Postman, Neil. Technopoly: The Surrender of Culture to Technology. New York, Vintage Books, 1992.

Essay
Computer Systems and Computer
Pages: 3 Words: 1079

TMP (Trusted Platform Module) is an international standard dedicated to secure hardware by integrating the security cryptographic keys into hardware devices. In other words, the TMP is a secure cryptoprocessor integrated into the computer motherboards enabling full disk encryption without using extremely long paraphrases. When a user buys a personal computer, the TPM is built into the computer's motherboard with the goal to offer security into the computer systems by generating the encryptions keys to protect the data in the drive. With the TPM in place, an attacker cannot remove the file from the systems or access the files elsewhere. Moreover, the TPM stores the encryption key that requires a user to login with a password to get access to the Windows and computer system.
The objective of this paper is to explore the concept the Trusted Platform Module, and the working protocol of the TMP technology.

Working Process of Trusted…...

mla

Reference

Francis, A., Daniel., R. M. and Vindoh, E.S.E. (2013). TPM: A More Trustworthy Solution to Computer Security, Engineering and Computer 3 (3): 99 -- 103.

Hans, B., & Infineon Technologies, A. (2008). Introduction Trusted Computing: The TCG Trusted Platform Module Specification. Infineon Technologies AG, Germany.

Jared, S., Dmitry, P., Jason, L., Nael, A., & Jesse, E. (2011). TPM-SIM: A Framework for Performance Evaluation of Trusted Platform Modules. Conference: Proceedings of the 48th Design Automation Conference: 236-241.

Essay
Computer Training Program to Enhance
Pages: 25 Words: 6445

Similar to the suggestions offered by Gahala (2001), rody (1995) identified several traits to be considered when developing a comprehensive professional development program. Among those traits include the reputation of the trainer, the rewards available to the participants, both tangible and intangible, and the support of the administration. Traditional staff development models have required everyone to participate at the same time and in the same location creating problems such as scheduling, travel, space, and funding. intrim (2002) notes that web-delivered staff development allows teachers to log on and participate at the time of day that is best for them and at the pace they are the most comfortable with.
urke (1994) concluded that the use of effective distance education programs for K-12 staff development should be increased to supplement face-to-face in-services due to the positive evaluations of K-12 educators who participated in the electronic distance education in-service programs. However, other…...

mla

Bibliography

Bintrim, L. (2002). Redesigning professional development. Educational Leadership, 59

Blumenfeld, P.C., Marx, R.W., Soloway, E. & Krajcik, J. (1996). Learning With Peers:

From Small Group Cooperation to Collaborative Communities. Educational Researcher, 25(8), 37- 40.

Books, J., Cayer, C., Dixon, J., Wood, J. (2001). Action Research Question: What Factors Affect Teachers' Integration of Technology in Elementary Classrooms?

Essay
Computer Networks Are Changing
Pages: 1 Words: 383

Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks.
One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external network (Monga 343). As such, they are able to buttress security while adding a layer of privacy (Rao and Kavitha 4). There are a number of intruders and hackers who are invading networks without authority. One of the basic ways to meet this broadening challenge is to stifle hackers with the use of a VPN.

Another way that networks are changing is by becoming much more complex. Specifically, the architecture involved with them is taking on additional complexities that make them…...

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now