Research Papers on All Computers amp; The Internet

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Collaborative Group Online Learning Management

    In 10 pages this paper examines an online collaborative learning environment in terms of management pros and cons. There are 8 sources cited in the bibliography.

  • School Budget Internet Technology Spending

    In seven pages this paper considers primary school spending on early years' IT teaching in an identificationof needed equipment and persuasive choice justification. Four sources are listed in the bibliography.

  • Comparison Between the iPhone and Google’s Android Operating Systems

    The writer looks at the features and the functionality of these operating systems, examining the differences that may impact on users of these system in order to provide a string summary outline of the key areas of difference. Five sources are cited in the bibliography of this three page paper.

  • FINANCIAL INDUSTRY'S USE OF BIG DATA

    Discusses the concept of Big Data, and how it is being used in by banks and other financial institutions. Also included is a discussion about fintech. There are 4 sources in the bibliography of this 5-page paper.

  • NetObjects Fusion, Cold Fusion, and Net Dynamics

    In eight pages the design and uses of NetObjects Fusion, Cold Fusion, and Net Dynamics are analyzed. Five sources are cited in the bibliography.

  • Property Management and Database Design

    In thirty one pages a small real estate management company and the database design that would best meet its needs are considered with SQL based distributed software recommended in this instance. Twenty six sources are cited in the bibliography.

  • Diversity Practices and Google

    In five pages this paper examines Google's diversity practice in a consideration of its culture and also discusses Silicon Valley's inclusion programs and attitudes concerning diversity. Seven sources are cited in the bibliography.

  • Search Engines and Google from a Commercial Perspective

    Google are the dominant web search engine, but there is a dynamic environment and there are many influences present that may impact on this position. The writer looks at these influences and the way that Google compete, ending with recommending for the future. Six sources are cited in this seven page paper.

  • Hospital Information Systems and Inventory Process

    In four pages this paper discusses a hospital's inventory system automation upgrade as featured in a December 2003 article that appeared in Hospital Materials Managements. There are no other sources cited.

  • Computers and Floating Point Arithmetic

    In sixteen pages computers and floating point arithmetic are discussed in terms of establishing greater understanding of inexact floating number representations. Four sources are cited in the bibliography.

  • Database Management Systems That Are Relational and Object Oriented

    In 5 pages this paper evaluates the merit systems of each system of database management and also considers information retrieval and storage. Five sources are cited in the bibliography.

  • Architecture of Information Systems

    In a paper of four pages, the writer looks at the architecture of information systems. Issues such as management and the impact of globalization on information systems are explored. Paper uses four sources.

  • Internet Security and Recent Developments

    In four pages this paper examines Internet security issues and system protection measures. Six sources are cited in the bibliography.

  • Active Directory Plan

    This 3 page paper provides an overview of Active Directory Plan. Active Directory is a Microsoft directory service that first appeared in the Windows 2000 server. Active Directory is a database system that allows for the grouping of objects, including computers, users and shared folders. Bibliography lists 3 sources.

  • Ideal Computer Building

    In six pages the ways in which the ideal computer can be built with a $2,000 budget is examined in terms of keyboard and monitor selection as well as the computer itself that is powerful enough for an advanced user with cost breakdowns provided. Three sources are listed in the bibliography.

  • Investigating Computer Fraud

    This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of custody, steps for computer forensic investigators. The paper comments on numerous topics that are integrated with computer forensics. There are sixty-four sources used in this forty-three page paper.

  • Database Management and Use

    A 3 page paper overview of database management and use as the database continues its metamorphosis from keeper of historic data only to the tool that identifies trends and opportunities found through examination of the information the database holds. Now and in the future, the database uses its historical data to identify trends and new business opportunities that lead the well-managed organization to greater competitive advantage, greater efficiency and more favorable overall business results. Bibliography lists 5 sources.

  • The Use of Databases in a Typical Organization

    This 5 page paper starts by defining what is meant by a database and a database management system. The paper then looks at how a database is used in a typical organization; the example discussed has an Oracle database system. The way it is used and managed is outlined. The bibliography cites 4 sources.

  • Basics of Designing a Database Structure

    This 5 page paper looks at some of the basic issues to be considered when designing a database from considering the use of either a flat file or relational database to the way that fields and strings for relational database can be managed. The bibliography cites 4 sources.

  • Overview of Databases

    In three pages a business database is defined and then discussed in terms of its uses in a case study that considers a website and its database as an example along with a business report compilation and how databases may be applied to obtain information contained within. Two sources are listed in the bibliography.

  • DATABASE MANAGEMENT SYSTEMS AND SECURITY COMPARISONS

    This 7-page paper compares object oriented database systems, relation oriented database systems and object-relation database systems, and determines security and other features of each. Bibliography lists 6 sources.

  • Apple Stores Big Success

    Due to the negative experiences they had had, Apple decided not to allow any store to carry their products until 2001 when the company opened the Apple Store. This paper provides an overview and SWOT analysis of Apple, Inc. and also discusses why their retail stores are so successful. There are thirteen sources used in this fifteen page paper.

  • The Dell and Apple Websites

    This 3 page paper compares the Apple and Dell websites. Bibliography lists 2 sources.

  • Global Production Patterns and Hardware and Software Industries

    In nine pages this paper examines China's hardware production and India's software production in this consideration of emerging global patterns of production with international comparative and competitive advantages also discussed. Five sources are listed in the bibliography.

  • Futures and Options on Silver and Yahoo!

    This 6 page report discusses the various investment properties, futures, options, and features of silver and the web portal company Yahoo! The world of Internet stocks and investment is often bewildering to the more traditional investment experts, as well as the individual investors. However, attempting to protect investments through a commodity of great 'traditional' value such as silver is not a wise move in the modern marketplace. Bibliography lists 9 sources.

  • Overview of Decision Support Systems

    In four pages Decision Support Systems are explained and their uses are considered through examples.

  • Case Study on Decision Making

    In five pages five questions posed by a student are answered that involve executive cube usage, support for group decision making, modeling value, best teaching methods for using a computer system, Keirsey types of personality, and decision making process categories. Five sources are listed in the bibliography.

  • Research Proposal on a Rental Equipment Business's Management Information Systems

    In ten pages this research proposal endeavors to study a rental business's use of management information systems in a literature review, answers to questions, project planning, and methodology. Nine sources are listed in the bibliography.

  • X.500, Novell Directory Service, and Active Directory

    In this paper consisting of three pages the X.500 subsets of Microsoft's Active Directory and Directory Service by Novell are discussed as Microsoft attempts to unseat the industry leader Novell. There are six bibliographic sources cited.

  • I, Robot and Race/Slavery

    A 3 page paper which argues that robots, such as pictured in I, Robot the film, should not be treated as slaves and property. Bibliography lists 4 sources.

  • Organizational Data Collection and Knowledge Management

    In ten pages this paper discusses the organizational management of knowledge in an examination that includes various information technology capacities and data mining and warehousing. Nine sources are cited in the bibliography.

  • BayesiaLabs Data Mining System

    In five pages this paper examines this system of data mining in a consideration of its functions and marketing benefits with the knowledge extraction process among the topics of discussion. Three sources are cited in the bibliography.

  • Security and Secrecy Issues Following the Cases of Wen Ho Lee and Robert Hanssen

    This 10 page paper considers a range of security and secrecy issues following the cases of Robert Hanssen and Wen Ho Lee, in the light of the Webster Report. The paper discusses what policies and practices can be put into place to protect security, why securely breaches have taken place with specific attention to government organizations, the problem of balancing privacy and confidentiality issues with investigating espionage, the problems of data security and role of digital forensics and evidence standards and the short falls of many systems. The bibliography cites 10 sources.

  • Video Games and Social Responsibility

    In three pages this paper discusses the continued controversy surrounding the violent content of video games and considers whether or not video game designers have a social responsibility to eliminate the gratuitous violence and abuse of women that are prevalent in video games, an entertainment market that consists predominantly of children. Four sources are listed in the bibliography.

  • PROPOSED PAPER OVERVIEW OF BLOCKCHAIN AND BANKING

    Provides an overview of a proposed paper centering around how blockchain technology can be used in the financial and banking industry. There are 5 sources listed in the bibliography of this 5-page paper.

  • The Technological Evolution of Computers

    The focus of this ten page paper is a delineation of the many changes that have occurred in computer technology since the introduction of the analog computer. Storage medium and CPU technology have experienced particularly dramatic changes. Nine sources are cited.

  • File Access Security Systems of UNIX

    UNIX file access security systems are examined in ten pages with such topics as the kernel, Kerberos, and the file permission system discussed. A figure and two tables are included and nine sources are cited in the bibliography.

  • Overview of India's Tata Consultancy Services

    In three pages this global software services consultancy firm based in India is examined in an overview of company mission, offered services, clients, and various other aspects. Two sources are cited in the bibliography.

  • Microsoft Windows ME Operating System

    The advantages and disadvantages of the Windows ME operating system by Microsoft are analyzed in six pages. Four sources are listed in the bibliography.

  • Ths History of the Linux Operating System

    This paper provides a brief history of Linux and its creator, Linus Benedict Torvalds. The author also discusses the MINIX operating system. This three page paper has four sources listed in the bibliography.

  • Google’s Decision to Launch an Operating System

    This 3 page paper examines the decision made by Google to launch Chrome; a new operating system which will compete with Microsoft Windows. The paper discusses some of the potential motivations behind the strategy and assesses how successful the launch announcement has been in supporting that strategy. The bibliography cites 1 source.

  • History and Function of the Linux Operating System

    This paper, written in MLA format, provides an overview of the Linux operating system with regards to versions 2.4 and 2.2. This five page paper has five sources listed in the bibliography.

  • Bluetooth Technology

    This 6 page paper discusses Bluetooth technology in detail, but at a layman's level. Bibliography lists 5 sources.

  • King Harald Bluetooth and the Stuff Named for Him

    The writer explains Bluetooth technology with regard to how it works, what it is, and where they got that name! There are four sources listed in the bibliography of this three page paper.

  • Cloud Computing in the Future

    In a paper of six pages, the writer looks at cloud computing. The pros and cons of cloud computing and SaaS are examined. Paper uses five sources.

  • Dealing with Disaster using Computer Networks

    A disaster, natural or otherwise, can tax Local Area Nets and Wide Area Nets to the breaking point. This paper examines the design elements that should go into structuring a system robust enough to handle the extra load that would result from such a disaster. Includes Asynchronous Transfer Mode. This paper has eight pages and nine sources are listed in the bibliography.

  • Using Computer Networks and Security Issues

    In eighteen pages this paper examines computer network usage and the threats to security such networks confront with the future of network security also contemplated. Twenty five sources are listed in the bibliography.

  • The Use of Prime Numbers in Cryptography

    This 6 page paper examines the role and importance of prime numbers, or prime factors, in cryptology. The paper looks at public key cryptography (PKC) and the RSA algorithm demonstrating the way in which public and private keys are calculated with the use of prime numbers. The bibliography cites 5 sources.

  • An Overview of Public Key Cryptography

    Public key cryptography is a concept discussed in three pages. Positive and negative aspects are discussed. Four sources are listed in the reference page.

  • Employees and Corporate Cyber Security

    In five pages cyber security is examined along with the difficulties organizations have in maintaining security and the involvement of the employees is also considered. Ten sources are cited in the bibliography.

  • Cyber Security and the Human Element

    In a paper of four pages, the writer looks at the human element in cyber security. Steps for drafting an effective approach to policy are examined. Paper uses three sources.

  • Data Compression

    This 8 page paper discusses aspects of data compression including its theory and how it works. Bibliography lists 9 sources.

  • Expand and Peribit Data Compression

    In five pages Expand and Peribit's data compression methods are contrasted and compared in terms of bandwith maximization, solutions' costs and support offered. Five sources are listed in the bibliography.

  • P2P Connections, Grid Computing, and Their Impacts

    In five pages this paper discusses how the future of computers has been impacted by P2P connections and grid computing. Ten sources are listed in the bibliography.

  • A Primer on Fiber Optics

    The writer gives an introduction to fiber optics. The paper starts by looking at the historical development that has led to the current state of optic fibers. The predicted future of optic fibers are then discussed. Three sources are cited in the bibliography of this four page paper.

  • Wireless Sensor Networks and New Power Sources

    In six pages this paper presents a literature review on wireless sensor networks and new sources of renewable energy. Six sources are listed in the bibliography.

  • A Brief History of Wireless Networking

    This 5 page paper gives an outline of the history of wireless networking, starting with the developments of Marconi, and the first wireless network at the University of Hawaii up to the development and use of 802.11g. The bibliography cites 6 sources.

  • Protocols of Wireless Networking

    In seven pages this paper examines the WiFi and HomeRF wireless networking protocol in a comparative analysis of small office and home networking choices. Seven sources are cited in the bibliography.

  • Face Recognition Software Faceit

    In eight pages this face recognition software designed by Visionics is examined along with the moral and ethical problems it generates. Five sources are listed in the bibliography.

  • Fashion Industry, Technology, and Inventory Control

    In eight pages this paper considers the fashion industry changes that resulted from technology in a consideration of inventory tracking and software. Five sources are cited in the bibliography.

  • Development of Agile Software

    In a paper consisting of seven pages agile development as it pertains to software design is discussed by assessing disadvantages as well as benefits and the extreme programming lifecycle agile development stages. There are fifteen bibliographic sources listed.

  • Expert System

    A 3 page paper that defines expert systems and discusses their relationship to artificial intelligence. The paper identifies the elements of an expert system and provides examples of the categories of these systems. Bibliography lists 4 sources.

  • Computer Software and Hardware Assessment Questions

    In four pages four computer hardware and software questions are answered and include hardware ergonomics samples, T carrier and DSL differences, automated purchasing system changing and the selection of software and hardware, and artificial intelligence. Three sources are cited in the bibliography.

  • Do Computers Have Creative Ability? An Artificial Intelligence Consideration

    In seven pages this paper considers will examine the issues of 'what ifs' as they pertain to artificial intelligence and the creative abilities of computers. Three sources are cited in the bibliography.

  • Artificial Intelligence v. Human Brain

    In six pages this paper compares the learning capabilities and reasoning capacities of the human brain as opposed to the possibilities offered by artificial intelligence. Five sources are cited in the bibliography.

  • CRM for a Travel Agent

    The paper reviews a case to assess an appropriate IT solution. The solution is a CRM program, which is explained, with a justification. Six sources are cited in the bibliography of this six page paper.

  • Security and Wireless Technologies

    This paper examines wireless technologies' benefits in nine pages which includes research studies regarding increasing productivity of workers and also addresses security issues and risk reductions through 802.11b standards and Bluetooth among other topics of relevance. Eight sources are cited in the bibliography.

  • Cluster Computing and Supercomputers

    In eight pages this paper discusses the usage of cluster computers and supercomputers and which system would work best for such corporations as Boeing, Nedcor, GE, and Wal Mart. Eight sources are listed in the bibliography.

  • High Paying Jobs and College Dropouts

    In six pages this journalistic formatted article examines students who opt to drop out of college to enter the workplace in high paying IT jobs such as those in Silicon Valley in a consideration of reasons for this growing trend. Five sources are cited in the bibliography.

  • Textile Manufacturing and Accurate Measuring of Color

    This paper considers the importance of measuring color accurately in the textile manufacturing industry in ten apges.

  • Upgrading Riordan Manufacturing's Working Information

    A 3 page paper discussing upgrade needs in sales and marketing. Riordan Manufacturing has a wealth of information available to it, but it is not using that information to its best advantage. Providing the sales force with laptop computers networked to Riordan's primary system will provide a start on building current information, while the addition of appropriate database or forecasting software can make use of the information that already exists. Bibliography lists 1 source.

  • Object Oriented Database Systems (OODB)

    This 5 page paper discusses benefits and attributes of object-oriented database management systems. The writer argues that these systems will be needed increasingly as organizations' data management needs become more complex. The writer further argues that although this type of database is more difficult to manage, it uses data more effectively and is therefore a good choice. Paper includes a SWOT analysis. There are 8 sources listed in the bibliography.

  • A Proposal for an Oracle Database Solution

    The writer makes a proposal for a new database to be created using an Oracle database. The data needed and benefits and weaknesses of the proposal are assessed. One source is cited in the bibliography of this five page paper.

  • Wilco Construction Company System Outputs

    In a paper consisting of five pages an output system design for Wilco Construction is discussed in terms of system tracking of inner office transactions, employee data storage, and future profitability such a system promises. Three sources are cited in the bibliography.

  • Computer Hacking's Impact

    In seven pages this paper analyzes computer hacking and its effects upon corporations and individuals. Five sources are cited in the bibliography.

  • Sui Generis and Database Protection

    This 14 page paper considers the protection that is granted to databases under EU law with the application of sui generis, which is embedded in Directive 96/9/EC on the legal protection of databases. The protection that is afforded is discussed and the way this has changed since Simon Chalton posed a rhetorical question in the title to his 2001 article "Database Right: Stronger than it Looks?" The bibliography cites

  • Types of Computer Programming Languages

    In a paper consisting of 5 pages the various computer programming language types are examined along with a consideration as to why there is such a diversity and a consideration of using C over other compilers in an assessment of advantages as well as disadvantages. Eight sources are cited in the bibliography.

  • Web Based Application Tool and Cross Platform Programming Language Known as Java

    In three pages Sun Microsystems' Java technology is examined in terms of its uses as a versatile programming language and its Web applications' capabilities. Five sources are cited in the bibliography.

  • Choosing a Computer

    This 7 page paper looks at how a computer may be chosen. The paper is written in three parts, looking first as the way the student may want to use the computer, then at the software that will be needed and finally at the hardware requirements. A computer system and software is selected using an $800 budget. The bibliography cites 7 sources.

  • EBAY AND NEED FOR SECURITY

    About eBay and its Internet security efforts. There are 12 sources listed in the bibliography of this 10-page paper.

  • Computers and Usage of Security Blankets

    In seven pages this paper discusses how security blankets can be used in the protection of digital copyrights and prevention of computer security circumventing. Ten sources are cited in the bibliography.

  • Examination of Database Security

    In six pages the importance of database security is considered as well as the significance of the database administrator's role in protection and assessment of risk factors. Five sources are cited in the bibliography.

  • Failure Prevention and Development Problems Associated with Software Engineering

    In eight pages this paper examines such software engineering issues as problematic development and preventing failure with compatibility regarding operating systems and networking among the topics of discussion. Fifteen sources are cited in the bibliography.

  • Overview of Computer Aided Software Engineering

    The various aspects of CASE or Computer Aided Software Engineering are examined in eight pages. Seven sources are cited in the bibliography.

  • ISO 9000, CMMs, and Software Engineering Improvement Models The Use of Process Improvement Models in the Software Engineering Industry Including the Capability Maturity Model (CMM) and the Importance of the ISO 9000

    In eight pages this paper considers how the software engineering industry utilizes such improvement models as ISO 9000 and the capability maturity model. Seventeen sources are cited in the bibliography.

  • Software Engineering and TQM

    In twelve pages this paper discusses Total Quality Management with regard to software engineering and the importance of quality control with references made to the models of Juran and Crosby and Deming. Eleven sources are cited in the bibliography.

  • Software Quality and Can It Be Measured?

    In nineteen pages whether or not software quality can ever be measured is considered in terms of defining quality and developmental software along with various applicable theories including hard systems modeling, soft systems modeling, agile engineering, requirements engineering, and actor network theory. Twenty nine sources are listed in the bibliography.

  • Security Measures in Operating Systems

    In a paper of twelve pages, the writer looks at security measures for operating systems. A variety of such measures are compared and contrasted. Paper uses six sources.

  • ICT Segments in the Middle East

    The ICT market in the Middle East has a great deal of potential to develop. This 4 page paper defines and explains the ICT market segments in this area. The bibliography cites 2 sources.

  • 4 Methodologies for Information Systems Development

    In nine pages information systems development is examined in a consideration of four methodologies including Information Systems work and Analysis of Change, Effective Technical and Implementation of Computer-based Systems, Dynamic Systems Development Method, and Jackson Structure Design with definitions and diagrams provided. Six sources are listed in the bibliography.

  • Stating a Business Case for the Linux Operating System

    In ten pages this paper explains a company's reason for bypassing Windows in favor of the Linux operating systems for computers. Eight sources are cited in the bibliography.

  • NT2000, UnixWar, and Linux Operating Systems' Hardware Considerations

    In six pages the hardware requirements of these 3 operating systems are compared and contrasted. Nine sources are cited in the bibliography.

  • Microsoft's Operating Systems Dominance and the Emergence of Linux

    In four pages the Linux v. Microsoft battle of the operating systems is examined. Five sources are cited in the bibliography.

  • Magnetic Disc Storage Industry and EMC

    In twenty five pages EMC's status in the magnetic disc storage industry is considered in a paper that includes an executive summary, analysis of the industry, strategies, and conclusions based on the presented research. Fifteen sources are cited in the bibliography, with two illustrations and one table provided.

  • Memory Management and Functionality of Windows XP

    In five pages this paper examines the virtual memory management functionality of Windows XP. There are five sources cited in the bibliograhpy.

  • Client Server Computing and the Significance of Java

    In ten pages Java's client server computing significance is examined in a discussion of its applications and the increased use of Internet servlet tools. Eight sources are cited in the bibliography.

  • Protocol Layering Advantages and Disadvantages

    In five pages TCP IP and OSI protocol models are contrasted and compared in a consideration of protocol layering advantages and disadvantages with the advantages emphasized. Seven sources are cited in the bibliography.

  • Avatar Game Interaction

    In 3 pages this paper examines uses, inputs, outputs, and interactions as it relates to the avatar and platform game influences.

  • Amazon and the Potential for New Technology

    This 7 page paper looks at the way Amazon.com may benefit from the adoption of new technology. The paper considers the use of RFID for stock control to compliment the existing systems and increase value in the value chain. The first part of the paper looks at how this would add value to Amazon. The last page discusses the way the change could be introduced. The bibliography cites 10 sources.

  • Computer System Security Types

    In four pages this paper discusses business and individual Internet security with software problems and Mac OS, Windows and Linux operating systems examined. Three sources are cited in the bibliography.

  • Operating Systems, Applications, and Software Architecture

    In 5 pages this paper examines hardware and operating systems in terms of their relationship with software architecture with its definition and influential factors among the topics discussed. Eight sources are listed in the bibliography.

  • Comparison of UNIX, OS2, and Windows Computer Operating Systems

    In fifteen pages these various computer operating systems are presented in an overview with pertinent information provided and a conclusion that user familarity and system compatibility are key determining issues. Fifteen sources are cited in the bibliography.

  • A Comparison of Three Operating Systems

    This 3 page paper compares three common operating systems: Windows NT/2000, Linux and Windows 2000 Server. There are 5 sources listed in the bibliography.

  • Microsoft SQL and Oracle 10g

    In three pages Oracle is considered in an overview that also compares Microsoft's SQL with Oracle's 10g database system. Three sources are cited in the bibliography.

  • Requirement for a New IT System

    The writer presents a requirements document supporting implementation of information technology system that would support an improvement in payroll functions. Background to the requirement, function with one or many other stakeholders and influence of the organizational structure are all considered. The paper is five pages in length.

  • Ubicom SX's Family of Controllers

    In twelve pages this paper discusses bus interface and ports as they relate to the Ubicom's SX series controllers. Six sources are cited in the bibliography.

  • Portfolio Management and Information Technology Investigation

    In thirteen pages this paper discusses IT portfolio management as it relates to communications and project management. Eight sources are cited in the bibliography.

  • Information Technology Portfolio Management

    In five pages this paper discusses IT portfolio management in a consideration of projects and cost issues. Six sources are cited in the bibliography.

  • Hewlett Packard and Dell Printer Wars

    In four pages this paper considers the competition between Dell and HP and the decision by HP to stop offering Dell HP printers after Dell announced offering Lexmark printers that are low priced with customer needs being disregarded by each in the process. Three sources are cited in the bibliography.

  • Portable Printer Marketing and Business Plan

    In five pages a portable printer known as PalmPrint is examined in terms of a marketing and business plan, mission statement, and SWOT analysis. Five sources are cited in the bibliography.

  • Project Managers

    A 15 page paper answering 10 questions about project management. All questions directly relate to the final chapters of Project Management: The Managerial Process by Gray and Larson (2003) addressing the traits of effective project managers; conflict management; culture shock; organizational partnerships; and portfolio management. Bibliography lists 10 sources.

  • Prototype Model Building and Layer manufacturing

    In ten pages this paper discusses ProMetal Rapid Tooling System, Envisiontech's Perfactory Concept Modeler, and the 3D Thermojet Printer in a consideration of forming processes and computers in layering manufacturing. Three sources are listed in the bibliography.

  • Structured Evolutionary Prototype Development and Prototype Software Development Introductory Discussion

    In three pages this paper discusses evolutionary rapid prototypes in an introduction of prototype software development. Four sources are cited in the bibliography.

  • Handheld Notebooks and Palm Computers and Pen Based Input Technology

    In six pages this paper discusses the technological implementation of pen based inputing and its market capabilities. Seven sources are cited in the bibliography.

  • Case Study on Network Design

    In twenty three pages a case study on a small advertising studio's network design is examined in terms of office needs and applicable networking, hardware, software, and financial considerations. Eighteen sources are cited in the bibliography.

  • Article Review, Software Development Study

    A 3 page summary of a research article on software development. Research has suggested that user participation in the analysis stage of software development will be more significant to the overall success of software development than user participation in the design stage. Most of this research has focused only on project team members and not on operational users whose work will be impacted by the system being developed. Wu and Marakas designed a study that explored the “impact of operational end user participation in two important stages of the system development life cycle,” specifically, the analysis and design phrases of software development (Wu and Marakas, 2006, p. 127). No additional sources cited.

  • Software Project Management Issues

    In five pages this paper discusses software project implementation and the social considerations that are involved in a Wal Mart featured case study. Fifteen sources are cited in the bibliography.

  • Software Quality and Configuration Management

    In six pages software quality is the context within which configuration management is considered that includes discussion of product configuration management such as source code, development production and application releases, along with maintenance and software examinations. Five sources are listed in the bibliography.

  • Software Quality and Systems Development

    In seven pages this paper discusses Total Quality Management and other systems developmental approaches in a consideration of the importance of software quality. Six sources are cited in the bibliography.

  • Quality of Software and the Impact of Testing

    In twelve pages this paper discusses various approaches to software testing in a consideration of software quality effects with topics including automation, acceptance and regression testing, integration, and unit testing. Twelve sources are cited in the bibliography with three charts also included.

  • Question on the Productivity of Software Testing

    In nine pages this paper on software testing productivity considers customer emphasis, cost, and operating efficiency in attempt to answer the question Are testing and quality assurance the cause of productivity impacts, or are they the effect?' Eleven sources are cited in the bibliography.

  • Flat Panel Computer Monitors Advantages and Disadvantages

    In six pages the advantages and disadvantages of flat top panel desktop computers and displays for laptops are assessed. Seven sources are listed in the bibliography.

  • Project Life Cycle and Software

    In four pages this paper examines the life cycle of a product in comparison with its project life cycle from a software perspective. Three sources are cited in the bibliography.

  • Background and Analysis of the UNIX OS

    The computer operating system known as UNIX is the focus of this overview of ten pages that includes its background history and analysis of its computing significance. Five sources are cited in the bibliography.

  • UNIX, Linux, and Windows OS Security

    In six pages this paper assesses the ease of use and evaluates the strengths and weaknesses of Windows 2000, NT, and XP, Linux, and UNIX operating systems' security. Ten sources are cited in the bibliography.

  • Fitness Center IT System Design

    In fourteen pages designing an information technology system to adequately meet the needs of a fitness center is considered in terms of system definition, essential needs based upon competitive advantage, design planning, stages of design and management with various approaches discussed. Eight sources are listed in the bibliography.

  • Questions on Information Technology Acquisitions

    In four pages and 5 parts this paper answers IT acquisitions' questions involving strategy and company alignment, U.S. General Services Administration's contract value for federal agency IT purchase, reduction of IT acquisition figures that are ongoing, acquisition evaluation approaches, and IT outsourcing advantages and disadvantages. Five sources are listed in the bibliography.

  • Information Systems in Wireless Telephone Sales and Marketing

    A 6 page paper discussing information systems' contributions to sales and marketing of wireless plans and devices. Information systems can be a true help or a detriment to the salesperson seeking to meet quota or simply close a high percentage of customers entering the store. "Fast" hardware and particularly well-designed software can combine to present a view to the customer of efficiency and dedicated customer responsiveness, both of which positively influence total sales. Bibliography lists 7 sources.

 

Most Relevant Research Papers

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

 

Copyright © 1994-2018 The Paper Store Enterprises, Inc. & Research Papers Online. All rights reserved.