Computing Fields And How They Vary Orientation To Computer Science Essay

1003 words - 5 pages

COMS 1403
Computing Fields Analysis
The field of computing is enormous because of how much technology has grown. As a result, the different types of computing-related careers have been categorized into different degrees. Each one has their own qualities that make them unique, so it is good for people to know what they are getting into before they choose one.
While each one is unique, they still have some similarities. Programming, for example, is obviously fundamental to technology; as a result, every programming degree is going to study at least some programming. Also, all the degrees, besides game design, require the study of discrete mathematics. Discrete mathematics is the study of functions that are not continuous, known as discrete functions. It is very important to computers because graph theory is tied to it, and that is useful with logic and getting from one place to the next. It is also important for most people studying these fields to know about designing databases efficiently and how to implement them.
The study of computer science is what most people who want to focus on coding choose to study. The focus of computer science is programming and computing, so it’s heavily based on understanding why code works the way it does. As a result, there is a deep study of algorithms. On top of that, computer science requires significantly more math than all the other computing degrees, so a prospective student needs to be able to grasp mathematical concepts well. As a result of this focus on programming, this degree requires four programming classes, rather than the three that information technology and information systems must take. A bachelor’s degree will typically suffice in this field; however, some students pursue a master’s degree.
Information systems is a more business-oriented computing degree. It is more focused on how information can be used to solve business problems. This degree does not go as in-depth as computer science, but it gives the most expansive view of the computing field. This makes it a very fitting degree for someone who wants to be a project manager. It allows them to have knowledge and lead others to produce the desired program or product. While this approach of viewing more topics is useful, it does have the downside of not having a full knowledge of each of these topics, which can lead to some gaps in knowledge when deep problems need to be solved.
The information technology degree is more focused on training students to use computer technology in order help a company. This degree looks much more into hardware than the others. Having knowledge of both software and hardware, a student will know how to tailor technology to a company’s specific needs. This means that they will have to be able to customize programs to fit the employee’s capabilities. All of this interaction with people requires good social skills. These communication skills will allow them to see what will help the co-worker understand the technology, and then optimize it to those needs. One special thing about this degree is that you can focus on different tech areas, such as networking, security, or database management, rather than having to do a little bit of everything at your job.
Cybersecurity is significantly different from the previously discussed degrees. Its focus is on protecting information from attacks. Other than a few programming classes, cybersecurity’s degree plan is very independent from the other computing degrees. Students will learn subjects such as Cyber Defense, Cryptography, and Risk Management, which the other degrees do not have. While ethics is an issue with any of the computing degrees, it is a much greater issue in cybersecurity because of the content that is learned. People need to fully understand how that knowledge can be used, whether it be for good or bad. On top of knowing how to protect from attacks, students will learn on how to combat them once they have occurred and recover afterward. Another aspect of cybersecurity is that you can use knowledge of social interaction to try to manipulate the hacker and trick them to your advantage.
Computer science education is quite a bit different from a regular computer science degree. It is more of a hybrid between education and computer science, and it does not go as in-depth as regular computer science degree. It only requires three programming classes rather than four. This job is very in demand right now because of how much computer science is growing, which means that more people are needed to teach the subject. The College Board offers Advanced Placement courses about computer science, so this increases the job market even larger. This degree is significantly less strenuous in math than computer science. It requires College Algebra instead of Calculus I and II.
The study of arts in game and interactive media design is a very different degree from the others because it is art based. One interesting thing about games is that they have storylines. Because of this, creative writing is a part of the degree. This degree has many different aspects to it that allow someone to figure out which part of design is for them: such as 3D modeling, animation, and drawing. Drawing is useful for the early sketches of characters. This degree has more electives than the others, so it gives the student a lot more freedom.
Computer science is the best fit for me, and I chose it for several reason. I have always had talent with computers. They have always made sense to me, and I always figured that my career would involve them; I just did know how. Then, I took AP Computer Science my senior and fell in love with Java programming. I scored a five on the exam, and I loved solving those problems. I also love the logic that is in mathematics. This works degree is perfect for me because I love math and programming. As of right now, I do not have any desire to study anything else.


Producing Robust Programs In Computer Science - Computing - Assignment

1852 words - 8 pages to prevent software misuse? 11. The simplified diagram below shows how a user’s login credentials are dealt with by a computer system. Complete the diagram by filling in the blanks using letters from the phrases words below. A - Approves login request B - Client C - Request username and password D - Send username and password 12. Server Request to login Data capture forms use authentication technology like the one below: a. State the name of this

"How the Planets Came to Be". This essay is a personally interpereted version of how the planets were created, and why they sit where they do now

429 words - 2 pages Some say God gave the Sun the power to create all matter in the Universe. When the Sun created all matter it was everything but unique. Some of his creations included very small stars but nothing spectacular.One day while creating matter he met a woman named Moon. It was love at first sight. He fell deeply in love with her. Sun was his happiest when his was with Moon. Together they created many more beautiful stars and expanded the universe

Emerging Technology and Cloud Computing - English 101 - Essay

1515 words - 7 pages various IT professionals during research, a majority quickly referred to it as storing data on someone else’s computer and noted security as the primary concern in using the Cloud. The greatest threat to the ratification of Cloud computing is in securing it entirely. Realistically, could the cloud ever be one hundred percent secure? Possibly, but not presently. Cloud services defined by the National Institute of Standards and Technology are explained

How to be a veterian and what they do in this world to make it better - southeast Halifax - Essay

439 words - 2 pages Camron Bailey Block: 4 Career management Introduction My name Is Camron bailey and I attended Southeast colligate prep academy and after high school I plan to attend UNCG and major in animal science. I want to be a veterinarian and work with animals. I am going to well in school so I can pursue my career being a veterinarian. I want to be a veterinarian because I want to help animals and make sure they are all right. Career cluster A

How To Put A Computer Together Paper

902 words - 4 pages English IV- Winfrey Fall 2001 Dustin Schroeder There are three steps to put a computer together. If you follow these steps you can put one together yourself. The first step would be to go buy all of the parts that you would need. The next step is to put the computer together. The last step is to load all of the software that you would need. By the time you get done reading this you will know how to put a computer together and all of the

Comparing Beowulf and Santiago personality types to see how they would react in modern setting - English - Comparative Essay

643 words - 3 pages his anger began to rage. His voice turned cold as he said, “Beowulf, it is obvious that you have used your immense strength to make up for the skill and knowledge you lack because to fish, is much more than to just sit on a boat.” Santiago began to recount the story of how he spent days on the ocean in great fight with the most beautiful marlin he had laid eyes on. Upon showing Beowulf his scarred hand a deep look of respect crossed his face, he

The Washington Post, Newsweek, and The Root all vary in their expression of biassed - history - essay

964 words - 4 pages that didn't stop State attorney general Ken Paxton from adding his voice to the mix…”. This quote makes the reader question the intentions of Paxton just like the article was trying to do. The Washington Post, Newsweek, and The Root all vary in their expression of biassed through the diction and set up of their articles. The Washington Post provided little to no biased along with solid facts and information. Newsweek took a different, slightly

Puritan Essay that described how they came to be - APUSH - Essay

716 words - 3 pages Parker Ross Mrs. Kauble APUSH 1st Block August 29, 2018 Puritan Society In the 17th century the Puritans colonized in North America. They had to experiment and find new ways to successfully live life. While they had many failures, they also had many successes. Migrating from Britain to North America, they had to plant new seeds to grow new roots in their social and political lives as well as their economy. The puritans created a model society

The moon origin and how it was created - Science - Essay

1733 words - 7 pages Free unlikely and this theory is low in the possibilities on how the Moon came to be Condensation theory is a theory that the Moon and the Earth were created at the same time. Both the Moon and the Earth came from the same Nebula; which is the Nebula that created our solar system. The con to this theory is that if the Earth and the Moon were from the same Nebula, they were condensed with each other which would cause the Moon to get sucked into Earth’s

How the American society needs to change the way they consume daily news and media - Reagan High School (sophmore year) - essay

855 words - 4 pages , and follow a spectrum of people with different biases on social media. They should watch how media and news form to personal bias, but also be aware and try not to get isolated in personal beliefs. Being aware of media using one sided bias, knowing how to filter news, and knowing how bias is used to persuade a person will lead to better consumers of media. In future generations, by being better consumers of news and media, the United States news

Dostoevskys Storys And How They Relate

499 words - 2 pages Essay Dostoevsky's short stories talk about hope and religion. They cover the spectrum of having no hope once it is lost, to the belief that hope, once lost, can be regained through a belief in God, and finally, to the belief that man is accountable for his actions.In The Christmas Tree and a Wedding, all hope is lost and can't be regained. The character, Julian Mastakovich, had no morals throughout the story. He married a girl when she was only

media roles and how they are depicted in todays society and tv shows - sociology - essay

686 words - 3 pages sure why an Asian isn’t casted but a possible reason could be that maybe there aren’t many good Asians in the industry, or it’s a trend not to cast them. There are many movies that propose they are of Asian descent but have blue eyes, and blonde hair. Although they are very under represented, I do believe that it is pure coincidence because why would they exclude one group of people instead of another? Maybe an opportunity hasn’t arisen yet to

All Programs That Are Aimed At Women And Are Affirmative In Orientation Should Be Abolished Because They Provide For Unfair Discrimination In Favour Of Women

2162 words - 9 pages This topic outlines how affirmative action legislation emerged in Australia. In doing this discusses the affirmative action (equal employment opportunity for women) and other pertinent pieces of Australian legislation which were enacted to improve equity in the Australia workforce for women. Why the women belong to disadvantaged grounds and how to reduce this phenomenon for women in Australia by government.So we should disagree with

Practice PT - Big Data and Cybersecurity Dilemmas - AP COMPUTER SCIENCE - Assigment

864 words - 4 pages only of subjecting citizens to increased and possibly illegal government ​surveillance​, but that the strength of the encryption could not be evaluated by the public as its design was classified secret, and that therefore individuals and businesses might be hobbled with an insecure communications system. b. Explain the computing “innovation” that gave rise to this dilemma, both how it functions and how it is used. ● Connect what you researched to

ethnic penalties and how they effect the lives of minorities - TCD - Essay

1750 words - 7 pages moreover, how they are aided by mechanisms of discrimination, socio-economic class, ethnic segregation and occupational segregation. Ethnic minorities experience ‘penalties’ throughout their education and this can largely be attributed to the issues of socio-economic class, ethnic segregation and discrimination/racism. Although some of the struggles minorities face can be explained by the process of migration itself; ‘lack of fluency in the