Home » Research Paper Topics » Computer Industry
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and primary and secondary sources cited in the paper. Buy your example papers now.
In six pages this paper presents a SWOT analysis of Microsoft in terms of current and future company position and the impact of the antitrust case. Four sources are listed in the bibliography.
[ View Full Description ] [ Send Me The Paper ]
In seven pages this paper presents SWOT and Porter's Five Forces analyses of Intel. Four sources are cited in the bibliography.
This paper examines Mozilla and Its Firefox Browser. A SWOT analysis is included. There are three sources included in the bibliography of this four page paper.
Three pages assessing the present value of the request for proposal (RFP) system of procuring IT services or systems. The move away from routine use of the RFP represents a collective move to more efficient operation, which has been the watchword of recent years and likely will only grow in organizations' estimations of total ...
In a paper consisting of fifteen pages this case study considers software development for a travel company and includes input and output specification, data flow, Pert/CPM chart information, and Gantt chart.
In eight pages this paper examines the competitive market Toshiba faces for its tablet PC with a SWOT analysis and competition from Handspring, Acer, Panasonic, Samsung, and Fujitsu discussed. Four sources are listed in the bibliography.
This 5 page paper discusses benefits and attributes of object-oriented database management systems. The writer argues that these systems will be needed increasingly as organizations' data management needs become more complex. The writer further argues that although this type of database is more difficult to manage, it uses data more effectively and is therefore a ...
In six pages this paper examines Microsoft's fiscal 2003 position via a SWOT analysis. Four sources are cited in the bibliography.
In five pages a portable printer known as PalmPrint is examined in terms of a marketing and business plan, mission statement, and SWOT analysis. Five sources are cited in the bibliography.
This research paper offers a study prposal that would investigate the reasons why university students appear to be open to piracy when this concerns music, videos and software. The writer offers a literature review, proposed methodology, etc. This ten page paper has thirteen sources in the bibliography.
In ten pages this research proposal endeavors to study a rental business's use of management information systems in a literature review, answers to questions, project planning, and methodology. Nine sources are listed in the bibliography.
In ten pages a proposed automation of a three city furniture retailer's business process systems is examined and includes system benefits, hardware system diagram, and organizational savings. Four sources are cited in the bibliography.
In four pages a dissertation proposal that evaluates IP telephony's status and future is outlined. Five sources are listed in the bibliography.
In twenty seven pages this research proposal discusses how Decision Support Systems are employed with regard to eCommerce, includes a literature review, and reveals how a student can research DSS use in any type of industry after identifying a relevant option model. There are eleven bibliographic sources listed.
In six pages a dissertation proposal on the commercial value represented by information technology includes management, investment, and decision making considerations. Seven sources are listed in the bibliography.
In eight pages this paper considers IT projects in a proposed investigation involving how to implement ITPM as a way of addressing problems with communications with a work plan and outline included. Six sources are cited in the bibliography.
The paper is written to assess the way that risk will be managed following the installation of a new IT system looking at risks posed by the staff and risk awareness needs, disaster recovery, security for the network and penetration testing. Ten sources are cited in the bibliography of this eleven page paper.
In four pages and earlier proposal is continued involving Riordan Manufacturing's implementation of Activity Directory in order to establish further idea development and group identification. Three sources are cited in the bibliography.
This 5 page paper is a proposal for studying the use of management information systems in schools. The paper outlines why the study is important and who it will benefit, gives a methodology for the collection of primary and secondary data and explains how the data will be analysed.
In eight pages this study proposal on World Wide Web access for visually impaired individuals includes a thesis and literature review. Eight sources are cited in the bibliography.
In twelve pages an information technology project for constructing and implementing a call center at a teaching hospital is considered a project proposal that includes scope, communication plan, project schedule and a plan for risk management. Eight sources are cited in the bibliography.
In nine pages information systems development is examined in a consideration of four methodologies including Information Systems work and Analysis of Change, Effective Technical and Implementation of Computer-based Systems, Dynamic Systems Development Method, and Jackson Structure Design with definitions and diagrams provided. Six sources are listed in the bibliography.
In three pages software development is examined in terms of quality procedures, methodologies, and best practices that will ensure success. One source is cited in the bibliography.
In five pages this paper examines software selection in terms of various methodologies and then compares similar programs to Access 2000 DMBS by Microsoft. Five sources are listed in the bibliography.
In five pages this student submitted case discusses an IT system's gender demonstration in its I methodology design as considered in the article 'Configuring the User as Everybody: Gender and Design Cultures in Information and Communication Technologies.' Six sources are listed in the bibliography.
This paper considers the importance of measuring color accurately in the textile manufacturing industry in ten apges.
A 3 page paper reviewing a "Computerworld" article from 2004 discussing identity management at GM and Boeing. The article's author reports on the efforts of GM and Boeing to integrate access to their web-based applications to the point that users have a single point of login to the total system. Bibliography lists 3 ...
In three pages this paper considers a KnowItAll Consulting project that requires a new location network using a Windows 2000 server. Three sources are cited in the bibliography.
In eight pages this paper discusses the telecommunications industry in a background that includes trends and satellite types. Two sources are cited in the bibliography.
In six pages this report examines peer to peer applications in terms of the concept and how they have been developed. Four sources are cited in the bibliography.
In twelve pages this paper compares Xeon processors with its Pentium IV counterpart. Eleven sources are cited in the bibliography with four figures and two tables also included.
In ten pages this paper provides recommendations on how Windows® can be improved with a consideration of options regarding I/O devices, memory, and CPU uses. Six sources are cited in the bibliography.
In eleven pages this student submitted case study examines Eastern Power Company's potential information technology development outsourcing in terms of relevant issues, problems, and then evaluates Agile Development, DSDM, and SSADM design models. Thirteen sources are listed in the bibliography.
In six pages this paper presents a literature review on wireless sensor networks and new sources of renewable energy. Six sources are listed in the bibliography.
In nine pages a case study of CompuGear Inc. is considered in terms of current issues facing a professional computer consulting firm with improved profitability and increased productivity recommendations included. There is no bibliography provided.
In five pages this student submitted case study considers how Mobil applied technology to its systems of order processing in an assessment of the 3rd's success where the other 2 had failed and an analysis of stakeholders is also provided. Five sources are listed in the bibliography.
In a paper consisting of ten pages such banking industry problems as protecting assets of customers while adhering to regulations and maintaining high levels of efficiency are addressed in this case study. Six sources are cited in the bibliography.
This paper consists of a student presented case study in five pages involving a telecommunications' company's IT strategic planning efforts. Two sources are listed in the bibliography.
In six pages this antitrust case study focuses upon Microsoft in a consideration of contributing factors and problem solutions. Three sources are listed in the bibliography.
This paper examines functionality issues required by a video shop to set up a database information system to allow customers easier access to their movie library. The author includes such search related extensions as SQL and MPEG in the discussion. This ten page paper liste six sources in the bibliography
In six pages this case study focuses upon student provided information and discusses this school district's new computer network implementation and its cost. Three sources are cited in the bibliography.
In six pages a case study involving an irate employee who set a time bomb in the company computer is examined in terms of answering such questions as whether or not this is a criminal act, possible prevention of such an act, and ways to accomplish database restoration. Three sources are cited in the ...
In 5 pages a student submitted case study leads to a discussion of the utilization of UNIX and LINUX software based administration programs by a fictitious firm with the creation of a sample memorandum designed to relay problems and required changes to the staff. There are 2 bibliographic sources cited.
In five pages five questions posed by a student are answered that involve executive cube usage, support for group decision making, modeling value, best teaching methods for using a computer system, Keirsey types of personality, and decision making process categories. Five sources are listed in the bibliography.
In twenty three pages a case study on a small advertising studio's network design is examined in terms of office needs and applicable networking, hardware, software, and financial considerations. Eighteen sources are cited in the bibliography.
The author conducts a case study of Globix, an industry leader in infrastructure services and Internet applications. The paper includes a description of services and products, an overview of the company, industry structure, marketing, and competition among other aspects of the corporation. This twelve page paper has twelve sources listed in the bibliography.
In four pages this argumentative essay examines why Linux is a better computer operating system than Windows, with three supporting points provided focusing on cost, security, and adaptability. Three sources are listed in the bibliography.
Enter your paper topic below:
"My stress level this semester is much lower now that I found your site."
"Your site costs a little more, but the woman I spoke to was really nice and helped me figure out my thesis and place the order. I'm surprised at the time she took with me."
Copyright © 1994-2019 The Paper Store Enterprises, Inc.
All research papers are owned by The Paper Store Enterprises, Inc. and are the property of the corporation and our contracted writers. The work prepared by researchpaper.net are sold only to assist students in the preparation of their own original work. Students who use our service are responsible not only for writing their own papers, but also for citing The Paper Store as a source when doing so.