Computer Science MS Degree Application Term Paper

PAGES
2
WORDS
797
Cite

I have a knack for computer science/web design. In middle school, my uncle showed me how to upgrade the memory on my desktop computer. It was not long before I was installing systems, detecting and resolving computer issues and replacing hard drives on laptops. My first course at (name university) continued this interest with projects using Perl, CGI and PHP. Later, I added Macromedia Flash for animation to my repertoire and then Photoshop and Adobe Illustrator to be able to design a more aesthetic user interface. After graduation, I added Ajax, cold fusion, ASP, xml, JavaScript, CSS, RSS to my talents. Working in a business setting, I learned the importance of meeting the client's varied needs and expectations, explaining the different technologies and staying on task.

At (name of university), I would like to pursue the master's topic "Security Issues for the Use of Semantic Web in E-Commerce under (names of professors). The semantic web is a vision of data computers use to perform more of the tedious work involved with finding, sharing and combining information on the web. The first step is to define the relationship between pieces of data:...

...

The next step concerns the development of new security concepts and methods that are capable of handling semantics. Ontologies are used to store important and confidential data and guard against unauthorized access, which includes the enforcement of special access control restraints and handling trust issues between communicating parties.
After obtaining my MS, my career goal is setting up my own well-established web design business for the development of sites using semantics and other arriving technologies. The experience I gain in the (university name's) MIS program will provide me with a clearer direction on how best to utilize the concepts and innovations in my field. The curriculum will provide a stronger foundation for my successful future endeavors.

Tim Berners-Lee opened the door of opportunity for anyone who has the desire to take the latest technologies and incorporate them into user friendly and informational websites. The World Wide Web is a complex, ever-evolving infrastructure that will always provide me with new challenges.

Cite this Document:

"Computer Science MS Degree Application" (2007, July 28) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/computer-science-ms-degree-application-36464

"Computer Science MS Degree Application" 28 July 2007. Web.19 April. 2024. <
https://www.paperdue.com/essay/computer-science-ms-degree-application-36464>

"Computer Science MS Degree Application", 28 July 2007, Accessed.19 April. 2024,
https://www.paperdue.com/essay/computer-science-ms-degree-application-36464

Related Documents

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

SCIENCE FICTION & FEMINISM Sci-Fi & Feminism Origins & Evolution of Science Fiction As with most things including literature, science fiction has progressed and changed a lot over the years. Many works of science fiction were simply rough copies and following the altready-established patterns of prior authors. However, there has always been authors and creators that push the envelope and forge new questions and storylines that have not been realized or conceptualized before.

Pedagogic Model for Teaching of Technology to Special Education Students Almost thirty years ago, the American federal government passed an act mandating the availability of a free and appropriate public education for all handicapped children. In 1990, this act was updated and reformed as the Individuals with Disabilities Education Act, which itself was reformed in 1997. At each step, the goal was to make education more equitable and more accessible to

As a Platoon Commander Petty Officer in 2007, I was responsible for 26 midshipmen, of which several were from varied ethic backgrounds. Furthermore, some come from vastly different backgrounds from my own. This experience was enhanced during my work as Company Honor Board Chairman Petty Office in 2007. I was responsible in that role for instilling values of honor for over 150 midshipmen. In this group were represented not only

IAS and DF
PAGES 33 WORDS 9242

Assurance and Security (IAS) Digital forensics (DF) In this work, we take a look at three laboratory-based training structures that afford practical and basic knowledge needed for forensic evaluation making use of the latest digital devices, software, hardware and firmware. Each lesson has three parts. The duration of the first section of the three labs will be one month. These labs would be the largest labs. The Second section would

With the new algorithms and computational statistical techniques that John Doe will come up in his research, there will surely be positive changes that will be applied to the medical practitioners and other healthcare providers particularly in data analyses and presentations. Meanwhile, part of John Doe's" long-term goal is to focus his career on computational genomics research. He is inspired by different research methods and the benefits of coming up