Collection of latest seminar topics related to computer science. Download full latest seminar topics related to computer science in doc, pdf or ppt format.

Latest Seminar Topics Related To Computer Science

UNIX Operating System

The Unix operating system is a set of programs that act as a link between the computer and the user. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops. systems also have a(GUI) similar to Microsoft Windows.

Voice over Internet Protocol

Refers to sending voice and fax phone calls over data networks, particularly the Internet. This technology offers cost savings by making more efficient use of the existing network.

Web Services on Mobile Platform

In practice, the web service typically provides an object-oriented web-based interface to a database server, utilized for example by another web server, or by a mobile application, that provides a user interface to the end user.

Wireless Fidelity

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.

Interferometric Modulator

The color is selected with an electrically switched light modulator comprising a microscopic cavity that is switched on and off using driver integrated circuits similar to those used to address liquid crystal displays (LCD).

Google Wave

Google Wave is an internet application made by Google. Google describes Wave as an application which "lets you communicate and collaborate in real time". This means that Wave can be used for several people to edit a document at the same time.

Google App Engine

Google App Engine (often referred to as GAE or simply App Engine) is a web framework and cloud computing platform for developing and hosting web applications in Google-managed data centers. Applications are sandboxed and run across multiple servers.

Enterprise Resource Planning (ERP)

ERP is business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.

Online Voting System

In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons.

Phishing Technology

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details.

Data Warehousing

Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical reporting, structured and/or ad hoc queries, and decision making.

Asynchronous Transfer Mode

ATM is a switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells.

Intrution Detection Systems

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any detected activity or violation is typically reported either to an administrator .

ZigBee Technolgy

ZigBee is a wireless technology designed for control and sensor networks. It defines a set of communication protocols for low-data-rate Short-range wireless networking.

Wireless Application Protocol

Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.

Virus and Anti Viruses

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include, as well, data files, or the "boot.

Wireless USB

The Wireless USB is the first the high speed Personal Wireless Interconnect. Wireless USB will build on the success of wired USB, bringing USB technology into the wireless future.

Tripwire Intrusion System

Open Source Tripwire is a free software security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems.

Steganography

Steganography is the art and science of communicating in a way which hides the the existence of the secret message communication. It aims to hide information /covered writing. Information to be protected.

Network Management Protocol

Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on (IP) network. Microsoft.