Computer Sciences Essay

1069 words - 5 pages

Statement of Purpose
In history, we read of “ages”, like the “Ancient Age”, the “Medieval Age”, and the “Modern Age”. There is only one name that fits the 21st century: the “Computer Age.” Today, Computers are used in almost all domains of life. Though created by man, they seem to rule the world. My lasting curiosity about this dominance coupled with my growing experience in the IT industry have led to my decision to undertake a master’s in Computer Science.
The subjects in my undergraduate program which did most to deepen my interest were “Computer Network Technology” and “Database Management Systems” in the fifth semester. The former taught me in detail about the individual layers of ...view middle of the document...

The seminar gave me an occasion to learn about areas of Computer Networking which were not a part of the curriculum. Considering the widespread use of Bluetooth, the solid knowledge of its functioning that I gained from this study will certainly be useful to me in the future.
In my final year, for my capstone project titled “Remote data backup through a public network over a long distance”, my team and I designed and developed an application using Linux utilities to facilitate scheduled data transfer. We did this project for the Tata Institute of Fundamental Research, transferring data from their Ootacamund Research Centre to their Mumbai Office. The data consisted of information accumulated from the Grapes-3 project at their Ootacamund Research Center, and was of mission-critical importance. The Grapes-3 project is a cosmic ray collection centre which captures up to 10000 cosmic ray showers per day, analyzes them, and then converts them into a binary file represented in the form of graphs. This file is then converted into a root file which the scientists need to correlate the data with the data gathered from a simulator known as CORSICA, which is based in Mumbai. Because of the great importance of the data, data security and integrity were two major aspects of the project. The latter was accomplished with the help of the Remote Copy (rcp) utility of Linux and the generation of MD5 Checksum. The rcp used the Secure Shell Hash Daemon (ssh) to establish a secure connection and encrypt the data, which helped achieve security. In order to schedule the data transfer, we built a Java application to automate the process; manual scheduling was possible through a command line. After analyzing the various user levels provided by Linux, we were able to restrict the access rights exclusively to the administrator. A vital part of my project required me to study the several flavors of Linux operating systems and various point-to-point cryptography tools like PGP, Hash, and Checksum algorithms. We used Latex, a document preparation system for high-quality typesetting, to document our project.
Currently, I am working as a Software Developer in Cybage Software Private Limited, an offshore software development company; my client is PROS, an American-based leader in revenue management systems. The...

Other Essays Like Computer Sciences

Components of Virtual Library Essay

1911 words - 8 pages Teaching Hospital, a School of Nursing and an Institute for Educational Development. It offers Diploma, Bachelors, Masters, and Doctoral Degrees in Health Sciences and Education. Starting 1997, the Aga Khan University initiated a network infrastructure project to wire its main campus in Local Area Network (LAN) and enable computer connectivity across the campus. The main campus is spread over 83 acres of land. During phase I, a Network Control

Cows Danxing Essay

611 words - 3 pages CSC 441 HUMAN COMPUTER INTERFACE 2014/2015 Academic Session College: Science and Technology Department: Computer and Information Sciences Programmes: * B.Sc. Computer Science * B.Sc. Management Information System Course Code: CSC 441 Course Title: Human Computer Interface Units: 2 Course Lecturers: Dr. (Mrs) Afolabi and Mr Emebo Semester: Omega a. Brief Overview of Course This course is concerned with the design, evaluation and

Network Research Proposal

1693 words - 7 pages | 205 | Dell 9RRC7 black optical USB | $8.24 | $1689.20 | Because the world wide use and it’s compatibility with almost all the apps and programs, we will use the Microsoft Windows 10 Operating System. The location of the devices is shown in the images below. . Justification The facility is involved in teaching the computer sciences and providing library and student computer lab. The hardware and software proposed will

The Effect of Dota

1290 words - 6 pages CHAPTER I The problem and Its Background Introduction There are many students and even some young professionals that are addicted to DotA. This is one of the computer games that can be played by many players and is one of the most popular games to young students. Many students get addicted to this game and they even spend long hours inside the computer shop just to play the game. There are studies that getting addicted in playing computer

Review Questions

570 words - 3 pages new and approved medicine and tools to help make people better and to keep improving. 4. One of the changes in the informatics area of the health sciences is the use of electronic medical records. Some individuals have expressed concern about this. What are some of the advantages and disadvantages of electronic medical records? Why might some people be concerned about them? Some advantages are that it is on a computer and can be accessed

El/Beb/00137/2012

790 words - 4 pages Produces robot machines with computer intelligence and computer-controlled, human-like physical capabilities: give robots the powers of sight, or visual perception; touch, or tactile capabilities, locomotion, or the physical ability to move over any terrain; and navigation, or the intelligence to properly find one’s way to a destination. Robotics can be widely applied in computer-aided manufacturing (CAM). Natural Interfaces The

MY FUTURE PROFESSION- MATHEMATICIAN

668 words - 3 pages consulting with my scientific supervisor. Mathematicians apply and develop mathematical principles to solve problems in all areas of the sciences, technology, social sciences, business, industry and commerce.To be a good mathematician you need: to have good imagination to enjoy mathematics to have analytical skills to be able to take initiative to be persistent to be able to work independently or as

Computer Privacy

828 words - 4 pages | Computer Privacy | For Managing Information Systems | C Potts10-26-2015 | COMPUTER PRIVACY Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms. Privacy is emerging as a critical design element for interactive systems in areas as diverse as e-commerce, health care, office

Digital Eco System

906 words - 4 pages : {draw:frame} Computer Science: Study of computers, their design and their uses for computation, data processing, and systems control, including design and development of computer hardware and software, and programming. The graph shows the Computer Science: Natural Science: The term natural science is also used to distinguish those fields that use the scientific method to study nature from the social sciences, which use the

The Effort to Discover

5826 words - 24 pages impossibility of separating the nomenclature of a science from the science itself is owing to this, that every branch of physical science must consist of three things: the series of facts which are the objects of the science, the ideas which represent these facts and the words by which these ideas are expressed."[1] A broader modern definition of science may include the natural sciences along with the social and behavioral sciences, as the main

Hackers And Forms Of Electronic Trespassing

1952 words - 8 pages Hackers and Forms of Electronic Trespassing *Works Cited Not Included In the late 1970s, hackers were people who enjoyed learning the details of computer systems. Today, hackers (or crackers) refer to people who break into computer systems. Some malicious hackers use Trojan horses, logic bombs, and other means to infiltrate computer systems. Breaking into other computer systems is called electronic trespassing. This paper will speak of

Related Papers

Candy's Dog And Lennie's Death Similar

258 words - 2 pages Technology. My involvement with Computer Sciences has provided me with a working knowledge of various This combination of education and exposure has stimulated my interest in seeking a career in the Computer and social media field.Please review the enclosed resume and contact me at your convenience regarding a personal interview. If I do not hear from you in the next week, I will contact you. I look forward to meeting with you.Sincerely yours,Cesar Gomez12170 Albert AvenueOrosi, CA 93647(559) 909-6567cesar.gomez1@giant.cos.eduEnclosures

Injustice Anywhere Is A Threat To Justice Everywhere

543 words - 3 pages Program Prerequisites: 4 BIOL 160 Elements of Human Anatomy and Physiology 3 ENGL 101 Reading and Composition 5 MATH 096 Intermediate Algebra and Geometry 3-4 CISC 150 Introduction to Computer and Information Sciences OR CISC 181 Principles of Information Systems 4 PHYS 100 Introductory Physics Community College ENGLISH-1 level below Freshman Comp (FC) ENGLISH Freshman Comp (FC) Beginning Algebra Intermediate

Lawanson Oluwakemi Essay

597 words - 3 pages NAME: ADETIBA ADEYEMI ABIODUN FACULTY: MANAGEMENT SCIENCES DEPT: BUSINESS ADIMINISTRATION LEVEL: 100 LEVEL COURSE CODE: GST 113 TOPIC: USEFULNESS OF COMPUTER APPLICATION IN MANUFACTURING COMPANIES. Computer is an electronic device for storing and processing information. Computer has been of immerse help to so many sectors of the economy and which include the manufacturing

Change In Tourism Environments Essay

2699 words - 11 pages Changes in Tourism Environments Senior Lecturer Teija Tekoniemi-Selkälä 25.3.2010 Rovaniemen ammattikorkeakoulu University of Applied Sciences 1 Global Macro Forces Geographical forces Demographic forces Climatic forces Political forces Sociocultural forces Environmental forces RAMK / Teija Tekoniemi-Selkälä Source: Ritchie & Crouch 2003 Global Macro Forces • Climatic forces – Climate change – who benefits