ResearchPapers
On-line Term paper and Essay Support
Home » Research Paper Topics » Hardware & Software
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and primary and secondary sources cited in the paper. Buy your example papers now.
In nine pages this paper discuses how software development quality can be enhanced through the Capability Maturity Model. Twelve sources are cited in the bibliography.
Pages: 9
[ View Full Description ] [ Send Me The Paper ]
This paper examines the impact of the printed circuit board invention upon both contemporary society as well as the computer industry in 9 pages. Three sources are cited in the bibliography.
Pages: 10
In five pages ERP is examined in terms of its implementation advantages and disadvantages with long and short term implications also considered. Five sources are listed in the bibliography.
Pages: 5
In thirty two pages overviews, mission, goals, and corporate visions of these conglomerates as well as current data, inventory controls, and problems are compared and contrasted. There are thirty sources cited in the bibliography.
Pages: 32
In five pages the fictitious DataNet Solutions is examined in terms of its intentions to become Cisco Network Certified in order to expand its configurations, installations, and operations of Cisco based LANs that are simple routed, switched LANs, and routed WANs. Five sources are cited in the bibliography.
In ten pages this paper defines the concept of reverse engineering, discusses copyright considerations, provides legal examples and judicial rulings. Five sources are cited in the bibliography.
In a paper consisting of ten pages the COBOL computer programming language is considered as of 2001 along with speculation as to what the future might hold for college and university students. Ten sources are cited in the bibliography.
In five pages this report examines Microsoft Windows NT in an informational overview. Four sources are cited in the bibliography.
In ten pages this paper considers a hypothetical scenario in which a company must purchase a wireless system to meet its needs with issues explored and suggestions offered. Five sources are listed in the bibliography.
In eleven pages this paper examines 6 network management products' test results that determined in terms of price and function InfraTools Network Discovery scored the highest. Eight sources are cited in the bibliography.
Pages: 11
In five pages this paper contrasts and compares the similarities and differences between these two operating systems by Microsoft. Five sources are cited in the bibliography.
In five pages Macintosh computers are contrasted and compared with IBM PCs in a consideration of company backgrounds, market shares, and 2000 fiscal information. Six sources are cited in the bibliography.
In five pages this paper examines various factors associated with Cameroon's computer industry. Two sources are listed in the bibliography.
In five pages this report discusses software developmental processes and the impact of risk factors and risk management. Five sources are cited in the bibliography.
In five pages word processing, spreadsheet, and database software classifications are discussed in terms of function and overlap with emphasis upon Microsoft Works® home and small business software. One source is cited in the bibliography.
In five pages this paper discusses computers in a consideration of the application of ordered message delivery in a basic overview. Five sources are cited in the bibliography.
In seven pages Cisco Systems is examined in terms of its successful background and a promising future that will undoubtedly include quality, service, technical expertise, and cutting edge innovation. Eight sources are cited in the bibliography.
Pages: 7
In eight pages network security and or computer systems are examined in terms of such data replication issues as implementation, benefits, disadvantages, and implications for security. Five sources are cited in the bibliography.
Pages: 8
In five pages the Sygate Personal Firewall, Defender, and BlackICE personal firewalls are discussed in terms of strengths and weaknesses, ease of use, and price with the writer selecting a preferred choice and illustrating its small network installation. There are eight sources listed in the bibliography.
COBOL is a high-level programming language developed decades ago. Once the standard for dealing with masses of complex data, it is still in use today. This paper argues that it needs to be revised and modernized if it is to remain useful in the 21st century. Included are SQL and object-oriented programming. This paper has ...
Pages: 6
An overview of the European Union's 1998 Database Directive implementation is presented in eighteen pages with the sui generis right's meaning the primary focus. Eight sources are cited in the bibliography.
Pages: 18
In five pages this paper assesses the 21st century importance of COBOL in a consideration of usage and company statistics. Seven sources are cited in the bibliography.
In five pages the Natural® Pro ergonomic keyboard by Microsoft is examined in a consideration of various pricing strategies. Four sources are cited in the bibliography.
In five pages this paper presents an historical overview of ActiveX along with an assessment of its pros and cons. Five sources are cited in the bibliography.
In 7 pages data warehousing as it exists in the United Kingdom is examined along with the factors involved in a system establishment discussed. Nine sources are cited in the bibliography.
In twenty eight pages the technology of CRM is examined in terms of systems' technical proficiency and software. Ninety two sources are cited in the bibliography.
In five pages a student submitted case is used to consider how a database for schedule management of training and holiday times would be designed.
In five pages the management of virtual memory in the Windows 2000 is examined with paging file uses also discussed. Seven sources are listed in the bibliography.
In twelve pages a consideration of whether to rent or purchase a computer system is examined in terms of a cost benefit analysis. Thirteen sources are listed in the bibliography.
Pages: 12
In ten pages data warehousing is defined and discussed in terms of its uses, business importance, along with other relevant topics also considered. Ten sources are listed in the bibliography.
In five pages this paper examines database network administration implementation in a consideration of necessary components. Six sources are cited in the bibliography.
In sixteen pages this paper examines Internet and non Internet applications in a consideration of testing differences. Ten sources are listed in the bibliography.
Pages: 16
This paper considers freelance and in house web development careers in a comparative analysis of employment opportunities, salaries, benefits, and career control in five pages. Five sources are cited in the bibliography.
In five pages this paper discusses IT in a consideration of current issues including globalization, bioterrorism, ballooning costs that offer no benefit. Three sources are cited in the bibliography.
In fifteen pages this paper discusses a hotel's considerations as to whether to upgrade from a manual to automated information system with such topics as customer service and improved efficiency covered. Three sources are cited in the bibliography.
Pages: 15
In forty pages this paper examines the business benefits of DVD technology and its increased value in comparison with its analog technological counterpart. Forty five sources are listed in the bibliography.
Pages: 40
In nine pages this networking of computer data is examined in terms of definition, history, and usage. Six sources are cited in the bibliography and an outline is also included.
Network administration encompasses a variety of career paths. One of the more interesting is the network administrator. This five page paper examines the qualifications it takes to secure such a position, the number of jobs that are out there, the pay scale, and the typical duties. Five sources.
In five pages ERP is explained and its reasons for implementation are described with business effects, markets, and vendors among the topics discussed. Six sources are cited in the bibliography.
In five pages client server and mainframe computer systems are contrasted and compared in terms of the advantages and disadvantages of each. Three sources are listed in the bibliography.
In six pages this report discusses how software developers are affected by software piracy. Seven sources are cited in the bibliography.
The personal computer industry of the United States is examined in thirteen pages in an overview of consolidation, 'commoditization,' and consolidation. Seven sources are cited in the bibliography.
Pages: 13
In five pages this paper discusses how a computer executes software through executable coding and instruction sequences with other relevant issues also considered. Seven sources are listed in the bibliography.
In twelve pages an assessment of J2EE is presented in a discussion of its pros and cons and contrasted with its Microsoft.NET counterpart. Ten sources are cited in the bibliography.
In five pages this paper discusses concepts of monopoly and perfect competition in a consideration of whether or not Microsoft qualifies a monopoly from an economic standpoint. Six sources are cited in the bibliography.
In seven pages this paper examines these 2 qualifications in terms of course objectives, costs, and qualification benefits. Seven sources are listed in the bibliography.
The computer industry encompasses a variety of career paths. One of the more interesting is the data replication. This five page paper describes the importance of this exciting career. Five sources.
This 12 page paper discusses the future of web development, with particular attention to changing user needs, business needs, J2EE and Microsoft.NET. There are 8 sources listed in 13 endnotes.
In seven pages this report considers CAPP in terms of purpose as well as its time and production benefits. Eight sources are cited in the bibliography.
In five pages a video design for this female player shooter game is assessed in terms of player interest, femininity, and plot line. There are no sources included.
Enter your paper topic below: