On-line Term paper and Essay Support
Home » Research Paper Topics » Computer Technology
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and primary and secondary sources cited in the paper. Buy your example papers now.
In fifteen pages this research paper discusses U.S. industrial uses for robotics and considers artificial research technologies and other recent developments in the industry. Nine sources are cited in the bibliography.
[ View Full Description ] [ Send Me The Paper ]
A 13 page paper assessing the Veterans Administration's existing 5-year IT strategic plan for the purpose of suggesting alternative strategies and making recommendations. The paper uses the example of the VA health system as what can be accomplished, as that division has been transformed over 15 years' time from one of the worst health ...
This research paper offers a proposal for a study that would exmaine the acceptance of employees relative to the rapidly increaisng role played by technology in regards to their job descriptions. The writer uses the a company that is a world leader in the production of oil and natural gas as the study sample for ...
This 5 page paper looks at the way research could be undertaken to identify the type of database and database management system a five star hotel would need. The paper includes an introduction, objective, a brief literature review, justification, methodology and expected results. The bibliography cites 10 sources.
This 16 page paper proposed a new security system using biometric data embedded in a card. Following an introduction a literature review looking at relevant areas of technology is undertaken and the results are sued to suggest a new security system that can be attached and work with other security measures, such as the metal ...
In a paper of three pages, the writer looks at the issue of organizational efficiency as it pertains to cloud computing. A research proposal is given for a quantitative study that might establish a significant link betwixt cloud computing and efficiency. Paper uses five sources.
A proposal outline consisting of eleven pages describes computer literacy program funding designed to assist students who are either disadvantaged or from low income households with a sample budget and program benefits also provided. Six sources are cited in the bibliography.
In eleven pages this discusses a networking change to a frame relay network from an X.25 network in this consideration of corporate networking decisions which includes assessment of pros and cons of each along with future alternatives. Seven sources are listed in the bibliography.
In six pages a proposed study regarding digital library options and customers views about them summarized in a survey of twelve items are discussed. Five sources are cited in the bibliography.
In eight pages this study proposal on World Wide Web access for visually impaired individuals includes a thesis and literature review. Eight sources are cited in the bibliography.
In twenty pages this paper examines the methodology behind the NHS' implementation of information technology systems regarding electronic patient records in the regions of Hillingdon, Berkshire, and South Essex. Forty sources are listed in the bibliography.
In twelve pages an information technology project for constructing and implementing a call center at a teaching hospital is considered a project proposal that includes scope, communication plan, project schedule and a plan for risk management. Eight sources are cited in the bibliography.
In ten pages educators and greater computer technology usage along with its effects on communication are examined with the emphasis upon leadership theory. Eleven sources are cited in the bibliography.
In five pages this paper examines systems analysis in a consideration of the continuous process of systems design methodology. Five sources are cited in the bibliography.
10 pages in length. The ongoing advancements in computer technology leaves in its wake a virtual graveyard of outdated approaches and applications; what once was considered to be the best methodology only years previous is now looked upon as archaic and inefficient. The extent to which perpetual progress renders otherwise viable approaches and ...
In three pages software development is examined in terms of quality procedures, methodologies, and best practices that will ensure success. One source is cited in the bibliography.
In three pages input and output data along with its respective methodologies are discussed in terms of how to properly input and extract informational output. Three sources are cited in the bibliography.
In five pages website design system methodologies that are information based, relationship based and structure based are discussed. Four sources are cited in the bibliography.
In thirteen pages this paper considers a research project proposal on money laundering detection through information technology approaches with a literature review included. Ten sources are cited in the bibliography.
In four pages this system development question answers six basic questions regarding why planning a project commences before design or analysis, SDLC, methodologies DISE and STRADIS, SDLC prototype, and SDLC metrics' uses. Six sources are cited in the bibliography.
In seventeen pages this paper applies the system of systems methodology approach to the problems associated with the Libra project in hopes of achieving resolution. Fourteen sources are listed in the bibliography.
In thirty pages a research study model is presented in which the effects of technology in the workplace are assessed. Twelve sources are cited in the bibliography along with two appendices that include a questionnaire and its results.
This is an in-depth paper examining the potential use of smartcards in order to improve security within an organization needs to control entrance into the facility. The idea is that a smart card, with embedded RFID technology may be used to gain access through automated entrance points, with identity verified through the use of biometric ...
This 13 page paper examines the role of wireless senor networks and looks at how they are powered and considers the way they may be developed in the future. The paper starts by looking at the range of commercial military and other uses that sensor networks can are used for. The paper then discusses the ...
In six pages the UK government is the focus on this consideration of the social impact of increased government surveillance with the 1998 Human Rights Act and the Regulation of Investigatory Powers Act of 2000 among the topics of discussion. Seven sources are listed in the bibliography.
In six pages this report examines peer to peer applications in terms of the concept and how they have been developed. Four sources are cited in the bibliography.
In twelve pages this paper compares Xeon processors with its Pentium IV counterpart. Eleven sources are cited in the bibliography with four figures and two tables also included.
In nineteen pages this paper discusses the reasons why computer law needs to be understood by system administrators in a consideration of 1998's Data Protection Act and Human Rights Act, 2000's Investigatory Powers Act, and the Telecommunications Lawful Business Practice Interception of Communication Regulations. Twenty sources are listed in the bibliography.
In five pages this paper examines how companies can protect computers from viruses, hackers, or natural disasters. Six sources are listed in the bibliography.
In a 3 page student supplied case study 5 questions involving the type of LAN that conflicting departments should install will be answered. There are 2 bibliographic sources listed.
In six pages a case study involving an irate employee who set a time bomb in the company computer is examined in terms of answering such questions as whether or not this is a criminal act, possible prevention of such an act, and ways to accomplish database restoration. Three sources are cited in the ...
In eight pages this paper presents successful and failed organizational information technology implementation efforts in this business information system case study. Ten sources are listed in the bibliography.
In twenty three pages a case study on a small advertising studio's network design is examined in terms of office needs and applicable networking, hardware, software, and financial considerations. Eighteen sources are cited in the bibliography.
In eight pages the ethical issues this computer program raises are examined with an application of the Utilitarian philosophy of ethics. Two sources are cited in the bibliography.
In four pages this argumentative essay examines why Linux is a better computer operating system than Windows, with three supporting points provided focusing on cost, security, and adaptability. Three sources are listed in the bibliography.
Enter your paper topic below:
"My stress level this semester is much lower now that I found your site."
"Your site costs a little more, but the woman I spoke to was really nice and helped me figure out my thesis and place the order. I'm surprised at the time she took with me."
Copyright © 1994-2020 The Paper Store Enterprises, Inc.