ResearchPapers
On-line Term paper and Essay Support
Home » Research Paper Topics » Hardware & Software
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and primary and secondary sources cited in the paper. Buy your example papers now.
In nine pages this paper presents case studies on ERP, CRM, and EDI that offer various operations solutions explanations. Three sources are cited in the bibliography.
Pages: 9
[ View Full Description ] [ Send Me The Paper ]
In five pages this paper discusses the object oriented modeling concept in a general overview that includes various examples. Four sources are cited in the bibliography.
Pages: 5
In 6 pages this paper discusses Microsoft's hardware products in a consideration of their design, function, and how they are marketed. Two sources are cited in the bibliography.
Pages: 6
This paper examines the topic of information security with an emphasis on firewalls for protecting sensitive information. This six page paper has six sources listed in the bibliography.
In twenty pages these 2 types of computer operating systems are compared in terms of the security each provides. Twenty sources are cited in the bibliography and three tables are included.
Pages: 20
In six pages these two Microsoft operating systems are contrasted in terms of the differences between the two. Two sources are cited in the bibliography.
In fifteen pages this paper considers computer games and the portrayal of female characters in this discussion of gender prejudice. Fourteen sources are cited in the bibliography.
Pages: 15
This paper addresses Internet Technology jobs available at the US State Department, particularly those dealing with computer security. The author discusses the pros and cons of working for the Department of State versus employment in the private sector. This paper has five pages and lists four sources
In five pages this paper discusses how linear programming is efficiently used in the operation of the microelectronics division of IBM. One source is listed in the bibliography.
In three pages disk quota implementation is considered in an examination of organizational storage space allocation and user preparedness. Five sources are cited in the bibliography.
Pages: 3
In three pages this paper examines the issues pertaining to Microsoft Windows 2000 and Kerberos that compromise the usefulness of this authentication protocol. Five sources are cited in the bibliography.
In three pages this paper traces the history of TCP/IP in terms of its origins and then considers the future course this telecommunications protocol might take. Seven sources are cited in the bibliography.
This paper examines web server performance requirements necessary to be among the 'world's fastest' in seven pages. Seven sources are cited in the bibliography.
Pages: 7
In six pages this report examines peer to peer applications in terms of the concept and how they have been developed. Four sources are cited in the bibliography.
In seven pages the pros and cons of ERP are considered in an exampination of successful implementation by Indian Motorcycles and Nestle USA's failed efforts. Seven sources are cited in the bibliography.
In eight pages EAD DTD is discussed in an overview of its development and impact upon researchers and archivists. Ten sources are cited in the bibliography.
Pages: 8
In five pages this white paper style document focuses upon Palladium by Microsoft in terms of concept, impact, and criticism leveled against it. Two sources are cited in the bibliography.
In five pages XBox and Play Station video game systems are contrasted and compared. Five sources are cited in the bibliography.
This paper contains an overview of each system in fifteen pages, comparing and contrasting such issues as compatibility, affordability and safety. There are ten sources cited in the bibliography.
In five pages this paper examines the history of Mac operating system development with System X and the Copland project failure among the topics discussed. Six sources are cited in the bibliography.
In fifteen pages this paper considers the technology that is used in single photo emission computed tomography, positron emission tomography, ultrasound, magnetic resonance imaging, and computed tomography. There are ten bibliographic sources cited.
In six pages this paper discusses the twenty first century IT directions. Seven sources are cited in the bibliography.
In twenty pages this paper discusses Microsoft.NET and Microsoft Access in terms of functions and organizational benefits. Six sources are listed in the bibliography.
Pages: 23
In six pages this paper examines personal computer retailers and websites in a comparative analysis of pricing differences. Five sources are cited in the bibliography.
In nine pages this paper applies a Porter's Five Forces model analysis on the computer industry in a consideration of the 'big 3' Dell, Hewlett Packard, and IBM. Twelve sources are listed in the bibliography.
In eight pages the ways in which Dell is able to successfully market their products in such a timely manner are discussed. Eight sources are cited in the bibliography.
The current and future uses of information technology by British Airways are the focus of this paper consisting of five pages. Six sources are listed in the bibliography.
In eleven pages this paper discusses 3 goals pertaining to Palladium by Microsoft. Nine sources are cited in the bibliography.
Pages: 11
In twenty pages this research paper examines how top quality software can be produced through various testing types throughout its lifecycle. Fifteen sources are cited in the bibliography.
In nine pages this paper discusses security issues an airline company must deal with as they pertain to IT or ecommerce such as customer data protection and the amount of system access users should have. Eight sources are cited in the bibliography.
In six pages this paper discusses how hybrid managers may be effectively used in the planning of systems failure. Six sources are listed in the bibliography.
5 pages and 2 sources used. This paper provides an overview of the Knowledge Management (KM) process known as case-based reasoning (CBR). This paper relates the underlying process of CBR to the overall view of KM in order to see how it can be applied through a technological system.
In eight pages this paper discusses the early Nineties' strategy shift of IBM and how it was influenced by General Motors. Three sources are cited in the bibliography.
In four pages Porter's Five Forces is applied to a discussion of the merger between AOL and Time Warner in terms of it effect on the Internet giant. Eight sources are cited in the bibliography.
Pages: 4
In four pages this paper discusses information technology in a consideration of reconciling Mintzberg's management position and a hybrid managerial concept. Five sources are cited in the bibliography.
Five cases that reveal functions and facets of expert systems are detailed in this paper containing seven pages. There are three bibliographic sources cited.
In fourteen pages this report argues that Microsoft possesses the elements that qualify the corporation as a monopoly based upon microeconomic determinations. Seven sources are cited in the bibliography.
Pages: 14
In twelve pages development and uses of Digital Rights Management technology are examined with Microsoft's Palladium and Intuit's DRM TurboTax protection among the examples provided. Seven sources are cited in the bibliography.
Pages: 12
In three pages this paper discusses a web server in terms of setup and how future use increases can be incorporated with connection type and server costs among the topics addressed. Four sources are listed in the bibliography.
In five pages these three operating systems from Microsoft are compared. Eight sources are cited in the bibliography.
In five pages this paper discusses these 2 system analytical approaches. Four sources are cited in the bibliography.
In five pages the many models and makes of these processors are discussed along with different computer types and an emphasis upon graphics. Four sources are cited in the bibliography.
In eight pages 'plug ins' or the connectivity of external and internal drive bays are examined in terms of their functions, what they support, and the implications of each. Fifteen sources are cited in the bibliography.
Enter your paper topic below: