ResearchPapers
On-line Term paper and Essay Support
Home » Research Paper Topics » Computer Technology
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and primary and secondary sources cited in the paper. Buy your example papers now.
In four pages Seymour Cray's innovative computer designs during the Sixties and Seventies are the focus of this research paper. Four sources are cited in the bibliography.
Pages: 4
[ View Full Description ] [ Send Me The Paper ]
A book report on The Whale and the Reactor by Langdon Winner considers macromarketing in technology among other relevant topics in five pages. Six sources are cited in the bibliography.
Pages: 5
In five pages the argument that AI lacks the creativity to ever replace writers is presented based upon the findings contained in the text Artificial Intelligence and Literary Creativity Inside the Mind of Brutus, a Storytelling Machine by Selmer Bringsjord and David A. Ferrucci. There are three sources cited in the bibliography.
In eight pages an overview of ISDN is presented in terms of what it is, its functions, costs, suppliers, equipment that is required, et cetera. Six sources are listed in the bibliography.
Pages: 8
In five pages Macintosh computers are contrasted and compared with IBM PCs in a consideration of company backgrounds, market shares, and 2000 fiscal information. Six sources are cited in the bibliography.
In seven pages the use of data mining by businesses such as Wal Mart are discussed in terms of the competitive advantages the practice offers. Five sources are cited in the bibliography.
Pages: 7
In five pages this paper discusses the bundling of Java Development Kits on Mac operating systems. Two sources are listed in the bibliography.
In twelve pages computerizing a hospital is examined with a consideration of benefits, problems, and solutions. Ten sources are listed in the bibliography.
Pages: 12
In a paper consisting of sixteen pages Brian Winston's technological innovations model is employed in this discussion of society's relationship with computer technology, which is equal parts love and hate. Sixteen sources are cited in the bibliography.
Pages: 16
This paper examines UMTS 3rd generation technology in six pages and also discusses how GIS system flexibility is achieved through WAP. Ten sources are listed in the bibliography.
Pages: 6
In a paper consisting of ten pages the corporate sector is examined in terms of present information technology trends and future strategic directions. Ten sources are cited in these bibliography.
Pages: 10
In 5 pages the architectural and toy manufacturing significance of computer aided design is examined with particular consideration given to computer simulation and 3D animation processes and history as well as technology. There are 6 bibliographic sources.
In five pages this paper presents an historical overview of ActiveX along with an assessment of its pros and cons. Five sources are cited in the bibliography.
In 7 pages data warehousing as it exists in the United Kingdom is examined along with the factors involved in a system establishment discussed. Nine sources are cited in the bibliography.
In twelve pages this reporter considers the airline security measure of biometric technology for passengers. Twelve sources are cited in the bibliography.
A 5 5 page essay exploring the HRU model in information security. Definitions are included and the model is assessed. 5 sources are listed.
In five pages this report discusses computer system program and application development in a consideration of testing at various stages. Five sources are cited in the bibliography.
In ten pages this paper considers the problems of cellular phone usage while driving in terms of pros, cons, and possible solutions. Six sources are cited in the bibliography.
In five pages this paper examines database network administration implementation in a consideration of necessary components. Six sources are cited in the bibliography.
In nine pages this paper examines the Intel company's background, culture, position, strategies, and performance with future recommendations for corporate progress included. Ten sources are listed in the bibliography.
Pages: 9
In five pages the documentation requirements to successfully introduce a laptop computer into a manufacturing setting are considered. Five sources are listed in the bibliography.
In seven pages the development of such computer operating systems as Linux, Microsoft NT, Novell, and Unix among others are examined. Eight sources are cited in the bibliography.
In forty pages DVD technology is examined in detail with operations and functionality considered and then its many advantages in sales presentations are discussed with large group benefits noted and GDSS integration explored. Forty five sources are listed in the bibliography.
Pages: 40
In twelve pages computer aided translation is discussed in terms of advancements and applications with human translators preferred because of the necessary narrow definition of computer assisted translation applications. Five sources are cited in the bibliography.
In five pages this paper examines the telecom industry by answering questions concerning several relevant topics. Six sources are cited in the bibliography.
In fourteen pages robotics are examined in terms of definitions of concepts along with various types of programming functions and techniques also explored with artificial intelligence among the topics of discussion. Fifteen sources are cited in the bibliography.
Pages: 14
In five pages this essay considers the global implication of communication and information technology. Five sources are cited in the bibliography.
A discussion of technophobia and cyberphobia is presented in six pages. An annotated bibliography consists of fifteen sources.
In seven pages the process of 'Internetworking' as it relates to switching, routing, and bridging are discussed along with other types of networking concepts. Five sources are cited in the bibliography.
In seven pages this paper examines the history and far reaching effects of the personal computer. Seven sources are cited in the bibliography.
In thirteen pages this paper examines organizational knowledge and the process of IT data transformation with various management and marketing strategies among the topics of discussion. Thirteen sources are cited in the bibliography.
Pages: 13
In twelve pages the controversy surrounding AI is explored. Ten sources are cited in the bibliography.
In seven pages this report considers CAPP in terms of purpose as well as its time and production benefits. Eight sources are cited in the bibliography.
In ten pages this paper discusses small firm strategy in a consideration of the role played by networks with examples of the 'boiled frog' syndrome among the topics addressed. Nine sources are cited in the bibliography.
The impact of computer technology on the field of ceramics is examined in fifteen pages. Six sources are cited in the bibliography.
Pages: 15
In ten pages this paper discusses SQL's value and Microsoft Access options that are available when developing a concept map design system. Five sources are listed in the bibliography.
In seven pages this paper examines how brick retailers have been supplanted by those of the 'click' variety with convenient Internet ecommerce purchases now only a mouse click away. Six sources are cited in the bibliography.
In 6 pages this paper discusses Microsoft's hardware products in a consideration of their design, function, and how they are marketed. Two sources are cited in the bibliography.
In nineteen pages this paper discusses machine learning within the contexts of data mining and knowledge management uses in a consideration of financial organizational practices and resource maximization. Twenty two sources are listed in the bibliography.
Pages: 19
In ten pages this paper evaluates whether or not hacking is constructive or destructive. Ten sources are cited in the bibliography.
In five pages this paper examines various in house security considerations in a discussion of such relevant topics as staff training and employee photo identification badges, One source is cited in the bibliography.
In ten pages the concept of internal hacking is defined and then the dangers this practice poses to computer security in the corporate sector are analyzed. Eleven sources are cited in the bibliography.
In six pages this report examines IT implementation as it pertains to strategic planning. Four sources are cited in the bibliography.
This paper examines the topic of information security with an emphasis on firewalls for protecting sensitive information. This six page paper has six sources listed in the bibliography.
In a paper consisting of six pages the reasons behind the failure of information systems as this pertains to business are analyzed along with an explanation of how finance knowledge is crucial in troubleshooting potential problems and malfunctions. Four sources are cited in the bibliography.
In five pages an average citizen's observations are compared with Lightman's fiction with specific references to popular culture and the ways in which technology affects the human body. Five sources are cited in the bibliography.
In eleven pages current and future technological advancements in electronics are considered along with a literature review and analysis of consumer behavior and the impact of technology provided. Five sources are cited in the bibliography.
Pages: 11
A Finite Element Analysis is presented in this overview consisting of five pages. Five sources are cited in the bibliography.
In five pages CAPP and retrieval are examined in terms of purpose and their cost and time saving advantages. Six sources are cited in the bibliography.
In seven pages the design of a computer information system is discussed in terms of requirements, necessary final system components, and how each of these will work in conjunction with each other along with a consideration of maintenance, security, training, and costs with project viability also assessed. Three sources are cited in the bibliography.
Enter your paper topic below: