Computer Engineering Essays (Examples)

1000+ documents containing “computer engineering”.


Sort By:

Reset Filters

it's the same with a Wi-Fi network, where the higher the frequency and the more data is communicated via the wave, the more the actual performance of the F plane changes. And just like an F plane that can take in very high frequencies of waves while others will bounce off the device or begin to have properties like light waves (meaning they refract and reverberate) the same holds true for Wi-Fi signals.
If you have ever flown an F plane you can relate to this allegory and its implications on the distance a plane can travel, navigated by the signal from the control unit and the strength of the signal waves. The same is true of a Wi-Fi network. The stronger the frequency of a LAN as measured in kHz, the farther a signal can travel and the larger the potential LAN can be. And just as a signal….

To some users of personal computers, who state, never trust a computer that you cannot lift; the IBM has been viewed, more often than not, as an enemy, and according to Byte, the computer magazine, this was because of the fact that the IBM company rose to fame mainly on the basis of its mainframe computers, that were large and forbidding, and overwhelmingly bulky. This was probably why, when the rest of the world was eyeing the emerging opportunities in the minicomputer market, the IBM never paid any attention, and even though IBM did succeed in capturing a large chunk of that market, it did not happen until Digital had captured the minicomputer market and had grown into a large corporation.
In the past few years, IBM has agreed to change the ways in which it conducts its business, and adapt to the changing times when the prices of computers….

Because of the standardization and flexibility of the mouse, software developers have considerable leeway in their engineering. Alternates to the mouse such as the light pen and tablet do not provide users with as robust and diverse usages as the mouse.
Mice, moreover, are inexpensive. Although users can opt for high-end mice, most standard mice and even optical and cordless mice are affordable for the average consumer. Early mice, contained in clumsy rectangular boxes, did not have the ergonomic or visual appeal of modern mice, which are easy and accessible for all users. Accessibility is another reason why the mouse has revolutionized computing. Disabled computer users who cannot access QWERTY keyboards can perform many functions using voice recognition software and basic mouse clicks.

Advancements in mouse technology have also enabled users to save considerable time and energy for their computing needs. For example, the right-click button often brings up menu items….


Subtopic 6: Job management and protection; include a serious discussion of security aspects

The most commonly leveled criticism of operating systems is the inherent lack of security they have (Funell, 2010). Defining operating systems to have partitioned memory is just the start, as Microsoft learned with their Windows NT platform. Dedicated memory partitions by user account can be hacked and have been (Funell, 2010). The need for greater levels of user authentication is required, including the use of biometrics for advanced systems that have highly confidential data within them. The reliance on security-based algorithms that also seek to analyze patterns of use to anticipate security threats are increasingly in use today (Volkel, Haller, 2009). This aspect of an operating system can capture the levels of activity and the patterns they exhibit, which can provide insights into when a threat is present or not. The use of predictive security technologies, in addition….

Computer Hard Drives
PAGES 6 WORDS 1684

Computer Hard Drives
The globalization of computer technology offers a vast number of remarkable tools, devices, applications, and advanced equipments that brings comfort in our daily work and activities. New features, designs, and capabilities of various computer peripherals and hardware are continuously being developed and brought out to market for better performance of the current technology. One very important part of a computer that experiences the trend of up-to-date improvement is the Hard Drive.

This paper aims to provide information on the evolution of computer hard drives. Included in this paper is the history of hard drive, from the time it was developed as computer hardware up to the continuous production of new and upgraded performance of data storage mediums. The various types of this technology, its changing features, and the companies who provide us with this dependable hardware are also discussed in this paper.

Introduction

Of the diverse parts of a computer, the….

Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single integrated system (Cluster computing). Clustering has been available since the 1980s when it was used in Digital Equipment Corp's VMS systems. Today, virtually all leading hardware and software companies including Microsoft, Sun Microsystems, Hewlett Packard and IM offer clustering technology. This paper describes why and how clustering is commonly used for parallel processing, batch processing, load balancing and high availability.
Despite some challenges such as achieving transparency, mitigating network latency and the split-brain problem, clustering has proven to be a huge success for bringing scale and availability to computing applications. Hungry for even more efficient resource use, IT departments are now turning their eye on the next evolution of clustering called grid computing.

Parallel processing is the processing of program instructions by….


The programming design class gives the student many tools that they will need on the job, but there is much more to the design process than having the right tools. The ability to apply those tools to the situations that will arise on the job is one of the most important skills that the designer will have. However, this is not always easy to teach in the classroom. Therefore, it is important for the design student to read as many outside sources as possible. They must understand the various philosophies and approaches to the design process. They must understand the strengths and weaknesses of those approaches and how they relate to various customer projects. The computer program design student must develop the broadest knowledge base possible in order to deliver a quality product to the customer.

eferences

Din, J. & Idris, S. (2009). Object-Oriented Design Process Model. International Journal of Computer Science….

Computer and Web Ethics
The term "computer ethics," as coined by Walter Maner in the 1970s, refers to a field of study that examines "ethical problems aggravated, transformed, or created by computer technology" (Maner, 1980). Maner suggested that persons engaged in computer-related actions should apply traditional ethical frameworks, such as Kantianism and Utilitarianism, to govern their decision-making. While Immanuel Kant's virtue ethics are rooted in respect for all people and an inherent respect for virtuous character traits -- such as kindness, honesty, patience and humility -- Utilitarianism judges the morality of an action according to "the greatest good for the greatest number" rule (Stanford Encyclopedia, 2011).

Similar to Maner's definition, Deborah Johnson, author of Computer Ethics (1985), defined computer ethics as a study of how computers "pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms to uncharted realms" (Johnson,….

Engineering Organizations
PAGES 2 WORDS 601

Engineering Organizations
The first image displayed on the website for the American Society of Agricultural Engineers, rather eccentrically for an engineering organization, is two hands holding a clump of soil. Yet despite this earthy image, the society also stresses its technical nature, as members in the biological, agricultural, and other food related sciences could engage in virtual web conferences with one another, through web space accorded to the organization. Thus, the technical as well as the agricultural aspects of the organization enable members to improve their professional credentials and connect with other engineering professional in the agricultural field. Members can also make use of the organization's technical library and database of technical experts.

The ASAE also offers such perks for members as a group insurance plan and an e-newsletter. The offer of a group insurance plan illustrates that many members may not be members of a large corporate entity, and may….

Computer What Is Going to
PAGES 10 WORDS 4223

In the same year, the founders started a new company for computer development called the Eckert-Mauchly Computer Corporation. By 1949, this company launched the BINAC or Binary Automatic computer. This computer made use of magnetic tape for the storage of data. Then this company was bought by emington and Corporation and the name was changed to Univac Division of emington and. This company was the organization to bring out UNIVAC which is one of the originals of the type of computers that are used today. (Inventors of the Modern Computer: The ENIAC I Computer - J Presper Eckert and John Mauchly)
1951 - UNIVAC begins to take over the business industries market:

Presper Eckert and John Mauchly set up their company and found their first client in the United States Census Bureau. The population of United States was growing very fast due to the baby boom that was taking place then….

computers and culture, using the book "Technopoly: The Surrender of Culture to Technology," by Neil Postman, and other resources. Specifically, it will answer the questions: How have computers and computer networks changed human thinking, behavior, and lifestyle? What has been gained? What has been lost? What are the advantages of computers in communication? In education? In entertainment? In the economy? What are the disadvantages in these areas? Is computer technology creating winners and losers, or furthering social stratification? Have we become too dependent on computers? Do computers limit social skills and physical activity to a damaging degree? Why or why not? Computers have changed our national culture and our global culture, and not always for the better. When they were first developed for the mass market, computers were meant to increase productivity and cut down on paper work. Today, computers have permeated every section of our lives, and our….

TMP (Trusted Platform Module) is an international standard dedicated to secure hardware by integrating the security cryptographic keys into hardware devices. In other words, the TMP is a secure cryptoprocessor integrated into the computer motherboards enabling full disk encryption without using extremely long paraphrases. When a user buys a personal computer, the TPM is built into the computer's motherboard with the goal to offer security into the computer systems by generating the encryptions keys to protect the data in the drive. With the TPM in place, an attacker cannot remove the file from the systems or access the files elsewhere. Moreover, the TPM stores the encryption key that requires a user to login with a password to get access to the Windows and computer system.
The objective of this paper is to explore the concept the Trusted Platform Module, and the working protocol of the TMP technology.

Working Process of Trusted….

Similar to the suggestions offered by Gahala (2001), rody (1995) identified several traits to be considered when developing a comprehensive professional development program. Among those traits include the reputation of the trainer, the rewards available to the participants, both tangible and intangible, and the support of the administration. Traditional staff development models have required everyone to participate at the same time and in the same location creating problems such as scheduling, travel, space, and funding. intrim (2002) notes that web-delivered staff development allows teachers to log on and participate at the time of day that is best for them and at the pace they are the most comfortable with.
urke (1994) concluded that the use of effective distance education programs for K-12 staff development should be increased to supplement face-to-face in-services due to the positive evaluations of K-12 educators who participated in the electronic distance education in-service programs. However, other….

Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks.
One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external network (Monga 343). As such, they are able to buttress security while adding a layer of privacy (Rao and Kavitha 4). There are a number of intruders and hackers who are invading networks without authority. One of the basic ways to meet this broadening challenge is to stifle hackers with the use of a VPN.

Another way that networks are changing is by becoming much more complex. Specifically, the architecture involved with them is taking on additional complexities that make them….

Engineering Materials
PAGES 10 WORDS 2830

Engineering Materials: High Strength Steel and Bus Seat Frames
The purpose of this paper is to conduct research and the review the findings. This paper seeks an understanding of the engineering material of high strength steel, the process in which it is made and the items it is used to build specifically that of bus seat frames. Over the course of the research, it is has been determined that high strength steel is effective when used in building lightweight yet safe and sturdy bus seat frames. This construct lends to the overall safety of buses using this material, specifically in existing models found in buses designed by a company called Fainsa located in Barcelona, Spain. This paper explores the process and design of these seats by looking at the process in which high strength steel is created. By understanding how high strength steel is made, one can better understand its….

image
2 Pages
Case Study

Physics

Computer Engineering and Information Systems

Words: 854
Length: 2 Pages
Type: Case Study

it's the same with a Wi-Fi network, where the higher the frequency and the more data is communicated via the wave, the more the actual performance of the…

Read Full Paper  ❯
image
20 Pages
Term Paper

Education - Computers

Computer IBM Entered the Computer

Words: 8433
Length: 20 Pages
Type: Term Paper

To some users of personal computers, who state, never trust a computer that you cannot lift; the IBM has been viewed, more often than not, as an enemy,…

Read Full Paper  ❯
image
3 Pages
Term Paper

Education - Computers

Computer Mice Not All Input

Words: 912
Length: 3 Pages
Type: Term Paper

Because of the standardization and flexibility of the mouse, software developers have considerable leeway in their engineering. Alternates to the mouse such as the light pen and tablet…

Read Full Paper  ❯
image
6 Pages
Essay

Education - Computers

Computer Fundamentals the Pace of

Words: 1767
Length: 6 Pages
Type: Essay

Subtopic 6: Job management and protection; include a serious discussion of security aspects The most commonly leveled criticism of operating systems is the inherent lack of security they have (Funell,…

Read Full Paper  ❯
image
6 Pages
Term Paper

Education - Computers

Computer Hard Drives

Words: 1684
Length: 6 Pages
Type: Term Paper

Computer Hard Drives The globalization of computer technology offers a vast number of remarkable tools, devices, applications, and advanced equipments that brings comfort in our daily work and activities. New…

Read Full Paper  ❯
image
8 Pages
Term Paper

Education - Computers

Computer Clustering Involves the Use of Multiple

Words: 2319
Length: 8 Pages
Type: Term Paper

Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a…

Read Full Paper  ❯
image
6 Pages
Term Paper

Education - Computers

Computer Program Design What I

Words: 1817
Length: 6 Pages
Type: Term Paper

The programming design class gives the student many tools that they will need on the job, but there is much more to the design process than having the right…

Read Full Paper  ❯
image
2 Pages
Essay

Business - Ethics

Computer and Web Ethics the Term Computer

Words: 844
Length: 2 Pages
Type: Essay

Computer and Web Ethics The term "computer ethics," as coined by Walter Maner in the 1970s, refers to a field of study that examines "ethical problems aggravated, transformed, or created…

Read Full Paper  ❯
image
2 Pages
Term Paper

Education - Computers

Engineering Organizations

Words: 601
Length: 2 Pages
Type: Term Paper

Engineering Organizations The first image displayed on the website for the American Society of Agricultural Engineers, rather eccentrically for an engineering organization, is two hands holding a clump of…

Read Full Paper  ❯
image
10 Pages
Term Paper

Education - Computers

Computer What Is Going to

Words: 4223
Length: 10 Pages
Type: Term Paper

In the same year, the founders started a new company for computer development called the Eckert-Mauchly Computer Corporation. By 1949, this company launched the BINAC or Binary Automatic…

Read Full Paper  ❯
image
7 Pages
Research Paper

Education - Computers

Computers and Culture Using the Book Technopoly

Words: 2023
Length: 7 Pages
Type: Research Paper

computers and culture, using the book "Technopoly: The Surrender of Culture to Technology," by Neil Postman, and other resources. Specifically, it will answer the questions: How have computers…

Read Full Paper  ❯
image
3 Pages
Research Paper

Computers/Internet - Computer Technology

Computer Systems and Computer

Words: 1079
Length: 3 Pages
Type: Research Paper

TMP (Trusted Platform Module) is an international standard dedicated to secure hardware by integrating the security cryptographic keys into hardware devices. In other words, the TMP is a…

Read Full Paper  ❯
image
25 Pages
Term Paper

Teaching

Computer Training Program to Enhance

Words: 6445
Length: 25 Pages
Type: Term Paper

Similar to the suggestions offered by Gahala (2001), rody (1995) identified several traits to be considered when developing a comprehensive professional development program. Among those traits include the…

Read Full Paper  ❯
image
1 Pages
Essay

Information Technology

Computer Networks Are Changing

Words: 383
Length: 1 Pages
Type: Essay

Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the…

Read Full Paper  ❯
image
10 Pages
Term Paper

Transportation

Engineering Materials

Words: 2830
Length: 10 Pages
Type: Term Paper

Engineering Materials: High Strength Steel and Bus Seat Frames The purpose of this paper is to conduct research and the review the findings. This paper seeks an understanding of…

Read Full Paper  ❯