ResearchPapers
On-line Term paper and Essay Support
Home » Research Paper Topics » Computer Technology
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and primary and secondary sources cited in the paper. Buy your example papers now.
In eight pages this paper discusses mergers and what needs to be considered regarding information technology issues. Six sources are listed in the bibliography.
Pages: 8
[ View Full Description ] [ Send Me The Paper ]
In five pages this paper discusses how manufacturing and business have been affected by automation and robotics. Five sources are cited in the bibliography.
Pages: 5
In fifteen pages this paper assesses the advantages of building a personal computer as opposed to purchasing a ready made computer system. Eleven sources are cited in the bibliography.
Pages: 15
In fifteen pages this paper examines various reliability techniques that have been developed to target embedded systems' problems. Twenty sources are listed in the bibliography.
In a paper consisting of five pages computer generated animation is discussed. Five bibliographic sources are cited.
In five pages this paper discusses computer intelligence and what would be meant if A.M. Turing's test was passed by a computer and also considers the possibilities explored in Minds, Brains, and Programs by John Searle. Five sources are cited in the bibliography.
In twenty pages this paper examines real time computing and its importance from a military information perspective. Eighteen sources are cited in the bibliography.
Pages: 20
In five pages this paper discusses the issues involving politics and the ever changing technology of the computer industry. Seven sources are cited in the bibliography.
In three pages this paper contrasts and compares computers and humans with human superiority emphasized. There are no sources listed.
Pages: 3
In six pages this industry is discusses in an informational overview of what it is and what it includes. Six sources are cited in the bibliography.
Pages: 6
In five pages this 1983 text on the benefits and detriments of technology is reviewed. One source is listed in the bibliography.
In seven pages this paper analyzes the technology employed in the creation of the Mortal Kombat video game. Six sources are cited in the bibliography.
This paper examines the impact of communication globalization and computer technology on the field of graphic design in 5 pages. Three sources are cited in the bibliography.
In five pages this paper discusses computer technology, its pros and cons, uses, and human genome project programs. Five sources are listed in the bibliography.
In six pages the web development application known as ColdFusion is examined. Three sources are cited in the bibliography.
In seven pages Management Support Systems are defined and examined in terms of types, what factors ensure its success, and how objectives are achieved. Four sources are listed in the bibliography.
Pages: 7
In five pages this paper explores the many business uses of information technology in a consideration of competitive advantage and long distance learning which provide employees with greater upward mobility in the workplace. Five sources are cited in the bibliography.
In five pages the communications between a computer and printer regarding document printing are examined within the contexts of networked and stand alone personal computers. Two sources are listed in the bibliography.
In five pages this report discusses the significance of computers in the high school educational curriculum. Four sources are cited in the bibliography.
In five pages this paper discusses how IT has impacted the role of management in a consideration of the changes being embraced by the state of Kentucky. Six sources are listed in the bibliography.
In five pages this paper discusses how businesses have been affected by the computer technology that gave rise to globalization. Eleven sources are cited in the bibliography.
In sixteen pages database management systems are examined in terms of their various factors along with C++ visual basic significance emphasized. Ten sources are cited in the bibliography.
Pages: 16
In five pages this paper discusses the advantages and disadvantages of various transmission alternatives in this consideration of LAN topologies. Four sources are listed in the bibliography.
In five pages Harvard Case Study 9 582 091 on the technology approaches of Banc One of Ohio and how this led to its banking industry dependence overall are examined. One source is cited in the bibliography.
In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic alignment and the types of LAN communications technology that was necessary. Eight sources are listed in the bibliography.
In a paper consisting of twenty five pages this paper examines whether or not Information Technology certification clases are beneficial and affirms this conclusion. Twenty three sources are cited in the bibliography.
Pages: 25
In ten pages this paper discusses client server technology's 2 phase commit in an overview of how it functions, how it can be applied, and operating system uses. Eight sources are listed in the bibliography.
Pages: 10
In five pages this paper examines expanding business and necessary changes to an IT system in a consideration of streamlining and standardization. Six sources are cited in the bibliography.
In five pages a company in need of a computer network is discussed in a hypothetical scenario that considers choices, configuration, and recommends the best software and hardware alternatives. Seven sources are cited in the bibliography.
In six pages relational and object database systems are defined, compared, and contrasted. Four sources are cited in the bibliography.
In six pages Python computer language is examined in terms of operations with comparisons also made between it and such similar languages as C++ and Java. Seven sources are listed in the bibliography.
In twelve pages this paper examines database protection and the problem of back door usage in this consideration of Internet security issues and possible solutions. Six sources are cited in the bibliography.
Pages: 12
In eight pages the effects of computer technology on culture and communication are explored. Twelve sources are cited in the bibliography.
8 pages with 7 sources used. This paper relates the use of CAD or Computer Assisted Design as a tool in communication in the organizational setting. This paper relates the fact that CAD can be used successfully to aid architects in the expression of their artistic capabilities and to provide a background and ...
How computer technology assists law enforcement is the focus of this paper which consists of five pages. Four sources are cited in the bibliography.
In seven pages this paper discusses GIS information, data collection, storage, and retrieval, and CGI Internet access limitation. Fifteen sources are listed in the bibliography.
Information systems are defined and their real world uses are explained in this paper consisting of eleven pages. Six sources are listed in the bibliography.
Pages: 11
In five pages data storage and its many choices are examined in terms of the data transfer, durability of storage capacity, and costs of 8mm tape machines, CD-RW technology, CD-R technology, Zip Drives, and Iomega Jaz drives. Seven sources are cited in the bibliography.
Device management in the Windows 2000 Operating System is the focus of this report consisting of five pages with Win2KPro among the topics addressed. Four sources are cited in the bibliography.
This paper considers how little in the way of computer knowledge is needed to use WebTV in eight pages. Seven sources are cited in the bibliography.
In ten pages this research paper examines commercial real estate and IS's industry role in a consideration of GIS, DDS, and the REIS standard. Fourteen sources are cited in the bibliography.
In seven pages this research paper presents an overview of the penetration testing field for the confirmation of security precaution effectiveness in a consideration of its various legal issues. Five sources are cited in the bibliography.
This paper examines the impact of the printed circuit board invention upon both contemporary society as well as the computer industry in 9 pages. Three sources are cited in the bibliography.
In five pages the fictitious DataNet Solutions is examined in terms of its intentions to become Cisco Network Certified in order to expand its configurations, installations, and operations of Cisco based LANs that are simple routed, switched LANs, and routed WANs. Five sources are cited in the bibliography.
In eight pages this paper examines digitalizing public documents to preserve them for future generations. Seven sources are cited in the bibliography.
In five pages this report examines Microsoft Windows NT in an informational overview. Four sources are cited in the bibliography.
In five pages this paper the pros and cons of zombie creation through artificial intelligence with Real Robots and the Missing Thought Experiment in the Chinese Room Dialectic by Selmer Bringsjord among the texts referenced. Three sources are listed in the bibliography.
In eight pages computer networking basics are discussed with WAN and LAN technology implementation among the application considerations. Eight sources are cited in the bibliography.
In five pages this network evaluation includes a discussion of uses, basic performance, topography, and security considerations. One source is listed in the bibliography.
In six pages this paper discusses how computer anxiety may be gender based with a consideration of 3 studies in which a correlation between computer activity and experience, culture, and age was made as a way of influential factor identification. Three sources are listed in the bibliography.
Enter your paper topic below: