ResearchPapers
On-line Term paper and Essay Support
Home » Research Paper Topics » Computer Technology
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and primary and secondary sources cited in the paper. Buy your example papers now.
In fifteen pages this research paper discusses U.S. industrial uses for robotics and considers artificial research technologies and other recent developments in the industry. Nine sources are cited in the bibliography.
Pages: 15
[ View Full Description ] [ Send Me The Paper ]
A 13 page paper assessing the Veterans Administration's existing 5-year IT strategic plan for the purpose of suggesting alternative strategies and making recommendations. The paper uses the example of the VA health system as what can be accomplished, as that division has been transformed over 15 years' time from one of the worst health ...
Pages: 13
This research paper offers a proposal for a study that would exmaine the acceptance of employees relative to the rapidly increaisng role played by technology in regards to their job descriptions. The writer uses the a company that is a world leader in the production of oil and natural gas as the study sample for ...
Pages: 5
This 5 page paper looks at the way research could be undertaken to identify the type of database and database management system a five star hotel would need. The paper includes an introduction, objective, a brief literature review, justification, methodology and expected results. The bibliography cites 10 sources.
This 16 page paper proposed a new security system using biometric data embedded in a card. Following an introduction a literature review looking at relevant areas of technology is undertaken and the results are sued to suggest a new security system that can be attached and work with other security measures, such as the metal ...
Pages: 16
In a paper of three pages, the writer looks at the issue of organizational efficiency as it pertains to cloud computing. A research proposal is given for a quantitative study that might establish a significant link betwixt cloud computing and efficiency. Paper uses five sources.
Pages: 3
A proposal outline consisting of eleven pages describes computer literacy program funding designed to assist students who are either disadvantaged or from low income households with a sample budget and program benefits also provided. Six sources are cited in the bibliography.
Pages: 11
In eleven pages this discusses a networking change to a frame relay network from an X.25 network in this consideration of corporate networking decisions which includes assessment of pros and cons of each along with future alternatives. Seven sources are listed in the bibliography.
In six pages a proposed study regarding digital library options and customers views about them summarized in a survey of twelve items are discussed. Five sources are cited in the bibliography.
Pages: 6
In eight pages this study proposal on World Wide Web access for visually impaired individuals includes a thesis and literature review. Eight sources are cited in the bibliography.
Pages: 8
In twenty pages this paper examines the methodology behind the NHS' implementation of information technology systems regarding electronic patient records in the regions of Hillingdon, Berkshire, and South Essex. Forty sources are listed in the bibliography.
Pages: 20
In twelve pages an information technology project for constructing and implementing a call center at a teaching hospital is considered a project proposal that includes scope, communication plan, project schedule and a plan for risk management. Eight sources are cited in the bibliography.
Pages: 12
In ten pages educators and greater computer technology usage along with its effects on communication are examined with the emphasis upon leadership theory. Eleven sources are cited in the bibliography.
Pages: 10
In five pages this paper examines systems analysis in a consideration of the continuous process of systems design methodology. Five sources are cited in the bibliography.
10 pages in length. The ongoing advancements in computer technology leaves in its wake a virtual graveyard of outdated approaches and applications; what once was considered to be the best methodology only years previous is now looked upon as archaic and inefficient. The extent to which perpetual progress renders otherwise viable approaches and ...
In three pages software development is examined in terms of quality procedures, methodologies, and best practices that will ensure success. One source is cited in the bibliography.
In three pages input and output data along with its respective methodologies are discussed in terms of how to properly input and extract informational output. Three sources are cited in the bibliography.
In five pages website design system methodologies that are information based, relationship based and structure based are discussed. Four sources are cited in the bibliography.
In thirteen pages this paper considers a research project proposal on money laundering detection through information technology approaches with a literature review included. Ten sources are cited in the bibliography.
In four pages this system development question answers six basic questions regarding why planning a project commences before design or analysis, SDLC, methodologies DISE and STRADIS, SDLC prototype, and SDLC metrics' uses. Six sources are cited in the bibliography.
Pages: 4
In seventeen pages this paper applies the system of systems methodology approach to the problems associated with the Libra project in hopes of achieving resolution. Fourteen sources are listed in the bibliography.
Pages: 17
In thirty pages a research study model is presented in which the effects of technology in the workplace are assessed. Twelve sources are cited in the bibliography along with two appendices that include a questionnaire and its results.
Pages: 30
This is an in-depth paper examining the potential use of smartcards in order to improve security within an organization needs to control entrance into the facility. The idea is that a smart card, with embedded RFID technology may be used to gain access through automated entrance points, with identity verified through the use of biometric ...
Pages: 73
This 13 page paper examines the role of wireless senor networks and looks at how they are powered and considers the way they may be developed in the future. The paper starts by looking at the range of commercial military and other uses that sensor networks can are used for. The paper then discusses the ...
In six pages the UK government is the focus on this consideration of the social impact of increased government surveillance with the 1998 Human Rights Act and the Regulation of Investigatory Powers Act of 2000 among the topics of discussion. Seven sources are listed in the bibliography.
In six pages this report examines peer to peer applications in terms of the concept and how they have been developed. Four sources are cited in the bibliography.
In twelve pages this paper compares Xeon processors with its Pentium IV counterpart. Eleven sources are cited in the bibliography with four figures and two tables also included.
In nineteen pages this paper discusses the reasons why computer law needs to be understood by system administrators in a consideration of 1998's Data Protection Act and Human Rights Act, 2000's Investigatory Powers Act, and the Telecommunications Lawful Business Practice Interception of Communication Regulations. Twenty sources are listed in the bibliography.
Pages: 19
In five pages this paper examines how companies can protect computers from viruses, hackers, or natural disasters. Six sources are listed in the bibliography.
In a 3 page student supplied case study 5 questions involving the type of LAN that conflicting departments should install will be answered. There are 2 bibliographic sources listed.
In six pages a case study involving an irate employee who set a time bomb in the company computer is examined in terms of answering such questions as whether or not this is a criminal act, possible prevention of such an act, and ways to accomplish database restoration. Three sources are cited in the ...
In eight pages this paper presents successful and failed organizational information technology implementation efforts in this business information system case study. Ten sources are listed in the bibliography.
In twenty three pages a case study on a small advertising studio's network design is examined in terms of office needs and applicable networking, hardware, software, and financial considerations. Eighteen sources are cited in the bibliography.
Pages: 23
In eight pages the ethical issues this computer program raises are examined with an application of the Utilitarian philosophy of ethics. Two sources are cited in the bibliography.
In four pages this argumentative essay examines why Linux is a better computer operating system than Windows, with three supporting points provided focusing on cost, security, and adaptability. Three sources are listed in the bibliography.
In twenty pages this paper evaluates the program design of computer testing models and provides a testing and instructional design. Fifteen sources are cited in the bibliography.
This paper provides a discussion of the July/August 1999 report featured in the Harvard Business Review addressing a retailer's physical, "brick and mortar" presence and on-line existence in the form of an e-commerce web site. The author takes conclusions drawn from the article and uses the construction industry as a model to apply the ...
In four pages this report examines what an accountant's home office should include in terms of technology which include a consideration of computer system capabilities, components, applications, and costs. Four sources are cited in the bibliography.
In ten pages near future emerging technologies are glimpsed in this overview that includes categories of banking, online shopping, work, and entertainment. Twelve sources are cited in the bibliography and there is also the inclusion of an outline.
This paper consisting of 5 pages involves the necessity of a Wilco Construction consultant to find a computer system that will best meet the needs of two employees with a backhoe and a bookkeeper and something that can keep pace with rapidly changing technology. The selected system and why it was chosen will be ...
In five pages the impact computer technology has had on U.S. culture over the past two decades is examined in both positive and negative contexts. Six sources are cited in the bibliography.
In six pages this report discusses how production and sales competitive advantage can be achieved through the establishment of a global logistics network. Four sources are cited in the bibliography.
In six pages this paper examines supporting network configuration and hardware communication of Windows NT. Five sources are listed in the bibliography.
In five pages Samuel Greengard's September 2000 article 'Making the Passage to a Portal' is analyzed in terms of how current business objectives can be both supported and enhanced by information technology. One source is cited in the bibliography.
In six pages this paper discusses how typography or graphic design has been impacted by computer technology. Seven sources are cited in the bibliography.
In six pages computer systems are considered in a discussion of graphic user interface function and form. Four sources are cited in the bibliography.
In five pages this paper discusses Internet Telephony software development in a consideration of improved efficiency and quality objectives. Five sources are cited in the bibliography.
In seven pages this paper discusses information technology development and integration over the past two decades in an evaluation of questions that include value of information, productivity paradox, and rations of price to performances. Eight sources are cited in the bibliography.
Pages: 7
In twenty six pages this paper presents an overview of Musical Instrument Digital Interface, its control and how it can be controlled, different types of files, merging, filtering, and lighting uses. Ten sources are listed in the bibliography.
Pages: 26
In fourteen pages the impact of virtual reality on the human experience is assessed. Eleven sources are cited in the bibliography.
Pages: 14
Enter your paper topic below: