Research Papers on Computer Technology

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • Systems Analysis, Computer Design, and Mathematics

    In three pages this paper examines the employment position of systems analyst and the importance of mathematical proficiency. One source is cited in the bibliography.

  • E-Learning In Employee Training

    This 3 page paper presents examples of two companies that have been using E-learning in their employee training programs. The companies, Circuit City and Wal-Mart, while both retailers, are vastly different organizations. The writer describes the programs put in place by each company, the goals of the programs and the outcomes. Bibliography lists 2 sources.This paper provides examples of E-learning programs as used by two companies, Wal-Mart and Circuit City. The author explains programs used in each company's employee training, and the results. This three page paper has two sources listed in the bibliography.

  • Collaborative Group Online Learning Management

    In 10 pages this paper examines an online collaborative learning environment in terms of management pros and cons. There are 8 sources cited in the bibliography.

  • ICT School Strategies Development

    In thirty seven pages teaching information and communication technology is discussed with the objective being student IT skills effectiveness. UK secondary schools for the years seven through thirteen are the focus. Thirty four sources are listed in the bibliography.

  • The Effectiveness And Efficiency Of Multimedia Software As An Instructional Delivery System: Assessment

    3 pages in length. The fact that learning can be integrated with fun is one particular reason why multimedia software is beneficial as an instructional delivery system, inasmuch as it serves to facilitate the learning objective. Bibliography lists 4 sources.

  • Human Learning and Computer Technology

    In a paper consisting of five pages the ways in which computers can enhance human learning skills are discussed in this educational consideration. Twelve sources are cited in the bibliography.

  • How Hospitals Are Analyzing Data

    Big Data Analytics is the most recent innovation to work with huge amounts of data. Hospitals not only have a massive amount of data, it is diverse, including documents, images, and other forms of records. This essay provides a PERT chart that displays the progression of information and data to be analyzed or prepared through several steps. The essay specifies how training will occur, what the expected outcomes will be, and how troubleshooting will happen. There are five sources used in this six page paper.

  • BENCHMARKING DATA AND HEALTHCARE

    Focuses on how healthcare is starting to rely on Big Data, and use it for benchmarking purposes. Best practices and case studies are analyzed. There are 4 sources listed in the bibliography of this 5-page paper.

  • Network Security Issues

    In seven pages this paper discusses firewall and encryption as they relate to telecommunications' network security with the pros and cons of each method examined. Eight sources are cited in the bibliography.

  • Criminal Justice and Computers

    In five pages the criminal justice system is examined in terms of the significant impact of computers with FBI investigations of organized crime through computer usages discussed along with education and careers in the field of criminal justice also considered. Three sources are cited in the bibliography.

  • Digital Music - Blog Entries

    This 8 page paper looks at different aspects of digital music. Written in the style of blog entries the development of digital music formats, the influence of iTunes on the industry, piracy and measures to prevent piracy, music and cellular telephones and the opportunities offered to unsigned bands. The bibliography cites 10 sources.

  • Google And Internet Search Engine Industry

    This 4 page paper begins with a brief overview of Google, Inc. The paper provides an analysis of Google using Porter's 5 Force analysis. Bibliography lists 6 sources.

  • Post Industrialization Graphic Design

    In five pages this paper considers how graphic design has changed as a result of computer technology in a discussion of how graphic designers must rely upon eye catching creativity and the importance of conveying messages for marketing purposes. Two sources are cited in the bibliography.

  • Graphic Design, Typography, and the Impact of CAD Design

    In ten pages this paper discusses how graphic design and typography have evolved in a consideration of the impact of computer aided design. Ten sources are cited in the bibliography.

  • Hospital Technology

    The purpose of technology in hospitals is to increase efficiency and accuracy of their healthcare systems and to improve patient care. This essay explains clinical information systems, identifies a hospital that uses it, discusses how it was adopted, and offers various types of information about implementation. There are fifteen sources used in this fifteen page paper.

  • Hospital Information Systems and Inventory Process

    In four pages this paper discusses a hospital's inventory system automation upgrade as featured in a December 2003 article that appeared in Hospital Materials Managements. There are no other sources cited.

  • Firms Tend to Under-Invest in the are of Information Technology

    Why firms do not invest enough in IT is explored along with why either under or over investing is problematic. There are three sources cited in the bibliography of this three page paper.

  • Modern Instructional Strategies and Computer Technology

    In five pages modern instructional strategies are examined within the context of computer technology's influence and the impact on technology development with an argument presented supporting educational uses in learning at the elementary and secondary academic levels. Six sources are cited in the bibliography.

  • Digital Technology's Pros and Cons

    In eight pages this paper examines the global impact of technology in this consideration of the positive and negative aspects of digital technology. Five sources are cited in the bibliography.

  • TECHNOLOGY, CUSTOMERS AND THE EXAMPLE OF VOLVO

    This 7-page paper examines the impact of technology on customers (in this case, customer service) by examining the case of Volvo Cars Belgium. Bibliography lists 2 sources.

  • Database Management Systems That Are Relational and Object Oriented

    In 5 pages this paper evaluates the merit systems of each system of database management and also considers information retrieval and storage. Five sources are cited in the bibliography.

  • Federal Government Sharing of Strategic Information

    In seven pages this paper discusses the problems associated with capital planning and budget computer information storage in a consideration of the compartmentalization of information and its strategic federal governmental sharing. Three sources are cited in the bibliography.

  • INSURANCE CLAIMS ANALYSIS: TECHNOLOGY

    This 6-page paper focuses on how technology helps improve claims processing in the insurance industry. Bibliography lists 3 sources.

  • Access to Internet for Remote Areas: Annotated Bibliography

    This 4 page paper gives an overview of twelve sources related to internet technologies. This paper includes a discussion of drones and balloon as possible remote internet solutions. Bibliography lists 12 sources.

  • Online Security

    In seven pages this paper considers Internet security issues in a consideration of such topics as hacker insurance and encryption technology. Nine sources are cited in the bibliography.

  • Opportunities To Create Value From Explicit Knowledge In A School ITC System

    Many schools are using the ITC systems. This three-page paper considers the way that the explicit knowledge which is held within the system may be utilised in order to add value to the way in which school is run. The bibliography cites 1 source.

  • Case Study on Business Networking Decisions

    In eleven pages this discusses a networking change to a frame relay network from an X.25 network in this consideration of corporate networking decisions which includes assessment of pros and cons of each along with future alternatives. Seven sources are listed in the bibliography.

  • An Examination on Artificial Intelligence

    In five pages artificial intelligence is defined and considered in terms of historical background and the controversies that have long surrounded it. Five sources are cited in the bibliography.

  • Alan Turing's Test and rtificial Intelligence

    In ten pages the artificial intelligence contributions of Alan Turing and his 'imitation game' test are examined along with a discussion of test flaws included. Seven sources are cited in the bibliography.

  • An Overview of Tablet Computers

    Tablet computers are becoming increasingly popular. The writer gives a broad overview of the technology, starting by defining the term tablet computer and then looking at the current life cycle stage, the patterns in use and take-up, ending by looking at the way in which tablet computers may be used in the future. Seven sources are cited in the bibliography this four page paper.

  • Computer Graphics Applied to Photography

    This 3 page paper discusses what the advances in computer graphics mean for traditional photography. The writer discusses the way in which images can be manipulated and transmitted around the world. There are 3 sources listed in the bibliography.

  • The Use of Databases in a Typical Organization

    This 5 page paper starts by defining what is meant by a database and a database management system. The paper then looks at how a database is used in a typical organization; the example discussed has an Oracle database system. The way it is used and managed is outlined. The bibliography cites 4 sources.

  • Overview of Databases

    In three pages a business database is defined and then discussed in terms of its uses in a case study that considers a website and its database as an example along with a business report compilation and how databases may be applied to obtain information contained within. Two sources are listed in the bibliography.

  • DATABASE MANAGEMENT SYSTEMS AND SECURITY COMPARISONS

    This 7-page paper compares object oriented database systems, relation oriented database systems and object-relation database systems, and determines security and other features of each. Bibliography lists 6 sources.

  • Proposal for a New Security Model Using Integrated Circuit Card Embedded with User’s Biometrics

    This 16 page paper proposed a new security system using biometric data embedded in a card. Following an introduction a literature review looking at relevant areas of technology is undertaken and the results are sued to suggest a new security system that can be attached and work with other security measures, such as the metal detectors at the entrance at buildings. The bibliography cites 15 sources.

  • CLOUD COMPUTING, ITS ADVANTAGES AND DISADVANTAGES

    Discusses the advantage and disadvantages of cloud computing, with focus on the security issues. There are 5 sources listed in the bibliography of this 14-page paper.

  • Control Management Systems Change

    In a paper consisting of sixty five pges the need for change management assessment in current automating systems as well as the issue of control management systems changes overall are discussed with a sample company used regarding control systems that are Web and Internet based. Thirty sources are cited in the bibliography.

  • Self Service Kiosks for Hotel Check-in and Check-out

    A 5 page paper discussing the development and use of kiosks for use in hotel lobbies that customers can use to check in, select their own rooms, pay for their rooms and print receipts for themselves. Already in use at several large chains, the kiosks can improve productivity and reduce costs, while increasing customer satisfaction by eliminating or reducing wait time to check in. Desk service still will be available for those who cannot or choose not to use the automated system. Bibliography lists 4 sources.

  • HEALTHCARE ORGANIZATIONS AND THEIR DATA

    Focuses on particular types of data that might be gathered by healthcare organizations. Also discussed is how that data might be used. There are 2 sources listed in the bibliography of this 3-page paper.

  • Overview of Data Mining

    In four pages data mining is examined in terms of how it works, details of its practice, and considers its future outlook. Four sources are cited in the bibliography.

  • Analysis of Data Structures and Algorithms

    In ten pages this paper considers the business applications of algorithms and includes an examination of programming, program structure, and a supplemental flow chart. There are six bibliographic sources listed.

  • PROPOSED PAPER OVERVIEW OF BLOCKCHAIN AND BANKING

    Provides an overview of a proposed paper centering around how blockchain technology can be used in the financial and banking industry. There are 5 sources listed in the bibliography of this 5-page paper.

  • CLUB IT AND INFORMATION TECHNOLOGY ANALYSIS

    Discusses information technology needs for Club IT. There are 3 sources listed in the bibliography of this 4-page paper.

  • Homeland Security's use of Geographical Information Systems

    Homeland Security uses many different forms of technology in their role of protecting the US. One type of technology which is used for a number of purposes is geographical information systems (GIS). The writer defines and described the technology and then examines the way that it is used by the government agency. Thirteen sources are cited in the bibliography of this sixteen page paper.

  • The Technological Evolution of Computers

    The focus of this ten page paper is a delineation of the many changes that have occurred in computer technology since the introduction of the analog computer. Storage medium and CPU technology have experienced particularly dramatic changes. Nine sources are cited.

  • Evolution of Computer Technology

    In four pages computer evolution is traced from the 500 B.C. abacus to contemporary desktop computers. Four sources are cited in the bibliography.

  • Communications and Fiber Optics

    In six pages communications and fiber optics technology in terms of development and applications are presented in this overview. Seven sources are cited in the bibliography and a Roman Numeral outline consisting of one page is also included.

  • Overview of India's Tata Consultancy Services

    In three pages this global software services consultancy firm based in India is examined in an overview of company mission, offered services, clients, and various other aspects. Two sources are cited in the bibliography.

  • Computer Science Majors and Computers

    Core computer curriculum is discussed in six pages as it pertains to a computer scienc major with an emphasis upon getting back to basics which cement a strong vocational foundation. There is no bibliography included.

  • Computer Science and Graph Theory's Future

    In three pages this paper defines graph theory and considers its mathematical uses and then it is applied to its future computer science uses. Four sources are cited in the bibliography.

  • Information Access and Computer Science

    In seven pages the technology of computer information retrieval systems is examined and discusses how it can be incorporated into other techniques such as summarization and information extraction in order to create a system of answering questions that is both user friendly as well as technologically sophisticated. One source is cited in the bibliography.

  • What is Bluetooth Technology

    The writer discusses Bluetooth technology, which is a type of wireless communications technology. The writer also discusses the history of this type of communication, as well as the reason for the name. The paper is three pages long and there are seven sources listed in the bibliography.

  • Bluetooth Technology

    This 6 page paper discusses Bluetooth technology in detail, but at a layman's level. Bibliography lists 5 sources.

  • Literature Review: Cloud Computing Efficiencies

    In a paper of four pages, the writer looks at cloud computing. The efficient value delivered by cloud computing is explored in a review of literature. Paper uses five sources.

  • Computer Network Security: Security Devices

    This 6 page paper discusses some of the devices used to enhance the security of computer networks, including keys, firewalls and digital certificates among others. Bibliography lists 6 sources.

  • Dealing with Disaster using Computer Networks

    A disaster, natural or otherwise, can tax Local Area Nets and Wide Area Nets to the breaking point. This paper examines the design elements that should go into structuring a system robust enough to handle the extra load that would result from such a disaster. Includes Asynchronous Transfer Mode. This paper has eight pages and nine sources are listed in the bibliography.

  • Employees and Corporate Cyber Security

    In five pages cyber security is examined along with the difficulties organizations have in maintaining security and the involvement of the employees is also considered. Ten sources are cited in the bibliography.

  • Data Compression

    This 8 page paper discusses aspects of data compression including its theory and how it works. Bibliography lists 9 sources.

  • Compression of Text, Audio, and Video

    In ten pages this paper discusses different file compression types with audio and video MPEG format compression a primary focus. Eight sources are listed in an MLA bibliography.

  • Fuzzy Logic Controllers (FLC) In Computer Systems

    This paper analyzes the use of FLC in computer systems. The author includes a three-stage model of the FLC system and discusses the importance of neural networks. This nine page paper has eight sources in the bibliography.

  • Overview of Grid Computing

    In seven pages grid computing is defined and discussed in terms of uses, beneficial and detrimental aspects. Fourteen sources are listed in the bibliography.

  • Organizational Efficiency and Cloud Computing: A Research Proposal

    In a paper of three pages, the writer looks at the issue of organizational efficiency as it pertains to cloud computing. A research proposal is given for a quantitative study that might establish a significant link betwixt cloud computing and efficiency. Paper uses five sources.

  • Medical Imaging and Neural Networking

    In five pages this paper considers medical imaging and how the improvements of data analysis and accuracy have been enhanced through neural networking. Twelve sources are cited in the bibliography.

  • Image Records For The ARMA

    3 pages in length. Working toward the ultimate goal of a paperless society, one of the most critical steps in this process has been the advent of digital electronic imaging as a means by which to store records. The process of converting paper documents over to their digitized counterparts has become an instrumental component in the overall processes of recordkeeping, not the least of which includes allowing for greater productivity in the absence of endless paper records. Because digital electronic imaging incorporates the single or combined application of text, graphics, handwritten or machine generated, it has proven a viable resource for virtually every type of industry and organization. Bibliography lists 3 sources.

  • 21st Century Retrieval of Information

    In seven pages this paper discusses the issues involved in the retrieval of information during the twenty first century. Six sources are cited in the bibliography.

  • The Bead Bar Network

    This 6 page paper looks at a case study provided by the student; Bead Bar, to assess the outline of a potential network structure. The paper considers the background of the company, the use of the network, topology and architecture and the inherent advantages and disadvantages in the choices made. The recommendations made included a distributed network and a client/server architecture. The bibliography cites resources.

  • Description of Fiber Optics

    In four pages fiber optics are examined in a discussion that considers the uses of fiber optic cables in such professions as telecommunications and medicine. Five sources are cited in the bibliography.

  • Integrated Technology and Smart Business

    This 4 page paper looks a concept of a ‘Smart Business’ and integrated technology answering three questions set by the student. The first question discusses the way in which information technology may be perceived in an objective manner, the second question considers the influence of politics and power on the way IT is implemented and the last price concept of smart business to a case study provided by the student. The bibliography cites 4 sources.

  • Smart House

    In fourteen pages this paper examines the concept of the ‘smart house’ in an informational overview that includes its history, various components, pros and cons, progress, and also discusses some famous smart houses such as Bill Gates’ compound in Seattle, Washington. Eleven sources are cited in the bibliography.

  • Power and Wireless Senor Networks

    This 13 page paper examines the role of wireless senor networks and looks at how they are powered and considers the way they may be developed in the future. The paper starts by looking at the range of commercial military and other uses that sensor networks can are used for. The paper then discusses the way they are powered, including the use of batteries and power harvesting from heat and wind and the management of that power. The paper finished by considering the way the powering of wireless sensors may develop in the future. The bibliography cites 16 sources.

  • LAN and WAN Wireless Technologies

    In eight pages this paper examines the numerous wireless network advantages and also considers how LAN and WAN wireless technologies are used and the differences that exist between them. Five sources are listed in the bibliography.

  • Expert System

    A 3 page paper that defines expert systems and discusses their relationship to artificial intelligence. The paper identifies the elements of an expert system and provides examples of the categories of these systems. Bibliography lists 4 sources.

  • An Artificial Intelligence Overview

    Iin ten pages theories and scientific research with regard to AI are explored and while science fiction is mentioned practical artificial intelligence applications as well as implications for the future are the central focus. Five sources are cited in the bibliography.

  • Real Uses of Artificial Intelligence Versus Portrayals in Science Fiction

    In five pages the ways in which such films as Blade Runner, Neuromancer and The Matrix have portrayed artificial intelligence is contrasted with the promising and nonthreateneing real life uses. Six sources are cited in the bibliography.

  • Artificial Intelligence and John Searle

    In five pages this paper discusses the degrees of separation between machine and man as theorized by John Searle and his views regarding AI. There is 1 source cited in the bibliography.

  • Impact of Artificial Intelligence Development

    In five pages artificial intelligence is examined in terms of its history and recent development. Three sources are cited in the bibliography.

  • Business Education and Technology Integration

    In five pages this paper examines the business education curriculum and the importance of technology integration. Five sources are cited in the bibliography.

  • Organizational Conduct and ELearning Effects

    In twelve pages elearning is examined in terms of how it affects organizational behavior with a discussion of corporate successes that have resulted from elearning traning. Eight sources are cited in the bibliography.

  • Questions on Electrical Engineering

    In three pages two questions pertaining to electrical engineering issues are answered. Six sources are cited in the bibliography.

  • Electrical Engineer's Duties

    In a paper consisting of eight pages electrical engineers and their duties regarding computer systems in the military are examined. Eight sources are cited in the bibliography.

  • Change and Geocast Network Systems

    In five pages this paper discusses the problems confronting Geocast Network Systems when it introduced a new product and concept for the transmission of information. Three sources are cited in the bibliography.

  • Security and Wireless Technologies

    This paper examines wireless technologies' benefits in nine pages which includes research studies regarding increasing productivity of workers and also addresses security issues and risk reductions through 802.11b standards and Bluetooth among other topics of relevance. Eight sources are cited in the bibliography.

  • Electronic Commerce and Technologies

    This 3 page paper gives an overview of how social media and mobile devices help electronic commerce. This paper includes and description of what e-commerce is and how these other devices help boost business. Bibliography list 3 sources.

  • Denial of Service Attacks Overview

    In six pages DDoS are presented in an overview that identifies them and examines their impact and prevention options. Six sources are cited in the bibliography.

  • Processes and Threads in Operating Systems

    In a paper of four pages, the writer looks at threads and processes in operating systems. The phenomenon of deadlock is also examined. Paper uses three sources.

  • Computer Operating Systems at Huffman Trucking

    Based on a fictitious case study the network diagrams are examined in order to discover the operating systems that are used in the firm and at each location, followed by consideration of the motivations for the use of the systems that are present. One source is cited in this three page paper.

  • Overview of Information Economics

    In nine pages this paper assesses information economics in an overview that describes Dynamic Systems Development Method, Rapid Applications Development, and the relationship between the two. Ten sources are cited in the bibliography.

  • Business Intelligence

    This 3 page paper examines and defines business intelligence. Bibliography lists 3 sources.

  • Home Computer System Purchase

    In five pages this paper considers hardware, software, speed, and size as each pertains to buying a home computer. Four sources are cited in the bibliography.

  • Crimes Committed by Computers

    In twelve pages this paper examines computer hacking and traces its origins back to the 1960s and includes a discussion of John 'Captain Crunch' Draper who hacked into phone company lines in the 1970s along with other relevant topics considered pertaining to cyber crime. Fifteen sources are cited in the bibliography.

  • Computer Hacking History

    In three pages this paper briefly considers computer hacking in a history that dates back to the Sixties. Twelve sources are cited in the bibliography.

  • Computer Hacking's Impact

    In seven pages this paper analyzes computer hacking and its effects upon corporations and individuals. Five sources are cited in the bibliography.

  • Disadvantaged or Low Income Learners and Computer Literacy

    A proposal outline consisting of eleven pages describes computer literacy program funding designed to assist students who are either disadvantaged or from low income households with a sample budget and program benefits also provided. Six sources are cited in the bibliography.

  • ARP Protocol Subversion and Network Security

    In nine pages this report examines ARP protocol subversion which can allow a hacker to significantly compromise computer network security. Five sources are cited in the bibliography.

  • Security Issues and Computer Viruses

    In four pages this research paper examines computer viruses in terms of how they are spread, their destructive characteristics, and various risk factors with system protection techniques also discussed with the emphasis that there are unfortunately no foolproof safeguards. Four sources are citd in the bibliography.

  • Stock System Design

    In seven pages a design for a stock control system and its necessary information are outlined with a discussion of users and system uses, assessment questionnaire, potential system design with both functional and nonfunctional requirements evaluated. One source is listed in the bibliography.

  • Overview of Machine Language and Modern Programming Language Generations

    In twelve pages this paper examines how programming language has evolved from the 1st to 5th generation and the machine language importance necessitated by GUIs or graphical user interfaces and Windows based programming. Nine sources are cited in the bibliography.

  • Types of Computer Programming Languages and Basic Information

    In five pages computer programming language types such as object oriented, imperative, logic, and functional are discussed. Four sources are cited in the bibliography.

  • Types of Computer Programming Languages

    In a paper consisting of 5 pages the various computer programming language types are examined along with a consideration as to why there is such a diversity and a consideration of using C over other compilers in an assessment of advantages as well as disadvantages. Eight sources are cited in the bibliography.

  • Web Based Application Tool and Cross Platform Programming Language Known as Java

    In three pages Sun Microsystems' Java technology is examined in terms of its uses as a versatile programming language and its Web applications' capabilities. Five sources are cited in the bibliography.

  • Overview of Prolog Programming Language

    In ten pages this paper discusses the versatile Prolog computer programming language in this overview of its history and many uses. Five sources are cited in the bibliography.

  • The Use of Coaxial Cable in Communications

    This 6 page paper examines the use of this particualr kinds of cable. The telephone and cable industries are explored. Bibliography lists 4 sources.

  • Personal Finance and the Impact of Technology and Computers

    In six pages this paper discusses how personal finance has been affected by technology and computers. Four sources are cited in the bibliography.

  • Overview of Mobile Commerce

    In six pages mobile commerce is examined in an overview that considers wireless application protocol and communications, p commerce, t commerce, and v commerce. Seven sources are cited in the bibliography.

  • Biometric Technology & Identity Theft

    A 10 research paper that discusses biometric technology and how it can be used to protect against identity theft. This literature review explores a possible solution to curbing the incidence of identity theft—the field of biometric technology. Biometric solutions to security are explored with emphasis on fingerprint scanners as the best available solution. Bibliography lists 8 sources.

  • Best Practices for Internet Security Protection

    Internet security 'best practices' are the focus of this paper consisting of 6 pages. The bibliography cites 12 sources.

  • Computers and Usage of Security Blankets

    In seven pages this paper discusses how security blankets can be used in the protection of digital copyrights and prevention of computer security circumventing. Ten sources are cited in the bibliography.

  • Computer Security Issues

    This 4 page paper discusses computer security in four areas: auditing and monitoring; cryptosecurity; transmission security; and TEMPEST. Bibliography lists 7 sources.

  • Computer Security

    8 pages in length. As the first of billions of emails flew through cyberspace nearly thirty years ago, the idea of computer security was not at the forefront of users' minds. In fact, the very notion of any threat inherent to the World Wide Web was so unheard of that even those who stood a great deal to lose from unauthorized entry were basically oblivious to the looming danger that would appear only years later. Today, computer security is the number one priority for anyone who uses the Internet, a reality born of unforeseen infiltration by those who seek to do great harm to the recipient of such an attack. Bibliography lists 8 sources.

  • Examination of Database Security

    In six pages the importance of database security is considered as well as the significance of the database administrator's role in protection and assessment of risk factors. Five sources are cited in the bibliography.

  • Security in a Role-Based Environment

    In a paper of four pages, the writer looks at database security. Role assignment is discussed in the context of providing superior security. Paper uses two sources.

  • Technology and Batteries

    In ten pages this report considers how batteries are still a modern necessity despite ever increasing technological advancements. Five sources are cited in the bibliography.

  • IA AND IS IN A HEALTHCARE INFORMATION SYSTM

    Investigates the need for information assurance and information security in a healthcare organization's information system. There are 4 sources listed in the bibliography of this 7-page paper.

  • Why Passwords and Good Information Security Technologies Are Compromised by Users

    In three pages this paper discussed why in a corporate an/or business environment passwords and decent information technologies that are in place are still compromised by the people who use them and also considers how information security can be improved. Four sources are cited in the bibliography.

  • Aspects of Robotics

    In five pages this paper discusses robotics in a consideration of various aspects including robotics vision techniques, evolutionary robotics, and frame problem. Four sources are cited in the bibliography.

  • Contemporary Robotics

    In fifteen pages this research paper discusses U.S. industrial uses for robotics and considers artificial research technologies and other recent developments in the industry. Nine sources are cited in the bibliography.

  • Robotics Science and Technology

    In four pages this paper discusses robotics in a scientific and technological overview. Four sources are cited in the bibliography.

  • Failure Prevention and Development Problems Associated with Software Engineering

    In eight pages this paper examines such software engineering issues as problematic development and preventing failure with compatibility regarding operating systems and networking among the topics of discussion. Fifteen sources are cited in the bibliography.

  • IT and Engineering

    This research paper describes the applications of software engineering that can meet the needs of the IT infrastructure. Four pages in length, four sources are cited.

  • Development of 3D Printing

    The paper is made up of 6 slides that outline issues associated with 3D printing. The invention is presented along and then the way 3D printing operates is described. Four sources are cited in the bibliography of this 2 page paper.

  • Computer Evolution from Mainframe to Distributed Systems

    In ten pages this paper considers the computer's 1944 beginnings with IBM and their evolution from mainframe to distributed systems with thin clients, fat clients, networking, and personal computers among the topics of discussions. Eighteen sources are cited in the bibliography.

  • Internet and the Impacts on Post-Secondary Education

    In a paper of five pages, the author reflects upon the use of computer technology in post-secondary education, especially in relation to the role of the Internet and the skills needed by incoming learners. There are four sources.

  • Web Page Design and the Uses of Frames and Tables

    In four pages this paper examines web page creation in a contrast and comparison of frames and tables and how they are used. Five sources are cited in the bibliography.

  • Lasers, Technology and Beams

    In eleven pages laser technology and laser beams are the primary focus of this research paper and informational overview of procedures, uses, and life impacts. There is included an exhaustive bibliography.

  • Wi Fi Network Selection and Integration

    In twelve pages this paper discusses adopting a Wi Fi network and various modes of implementation and information technology infrastructure integration. Ten sources are listed in the bibliography.

  • Microsoft's Operating Systems Dominance and the Emergence of Linux

    In four pages the Linux v. Microsoft battle of the operating systems is examined. Five sources are cited in the bibliography.

  • Magnetic Disc Storage Industry and EMC

    In twenty five pages EMC's status in the magnetic disc storage industry is considered in a paper that includes an executive summary, analysis of the industry, strategies, and conclusions based on the presented research. Fifteen sources are cited in the bibliography, with two illustrations and one table provided.

  • Manufacturing Process Control Role of the PLC

    In five pages this paper examines the control of manufacturing processes and the role the PLC plays. Five sources are cited in the bibliography.

  • Money Laundering Detection Through Information Technology

    In thirteen pages this paper considers a research project proposal on money laundering detection through information technology approaches with a literature review included. Ten sources are cited in the bibliography.

  • Protocol Layering Advantages and Disadvantages

    In five pages TCP IP and OSI protocol models are contrasted and compared in a consideration of protocol layering advantages and disadvantages with the advantages emphasized. Seven sources are cited in the bibliography.

  • Nanotechnology: Role In Speeding Up Computers

    10 pages in length. The yearly trek to upgrade outmoded electronic devices that have barely been paid off from the previous year has indeed become a tradition; with the ever-progressing nature of technological breakthrough, a computer that had all the new bells and whistles for 2007 can hardly draw one-quarter of its original sales price in 2009 when being sold on eBay. This never-ending cycle whereby perfectly good - if only a tad bit slow - computers are being tossed into the closet to make room for speedier versions of themselves has become somewhat of an obsession with the IT manufacturing industry and all those who eagerly wait to scoop the next version of electronic velocity. However, the time is nearing where such a huge step in the arena of computer speed - nanotechnology - is about to be realized that may well extinguish the need for inevitable annual upgrade. Bibliography lists 5 sources.

  • Disaster Recovery Planning

    In five pages this paper examines how companies can protect computers from viruses, hackers, or natural disasters. Six sources are listed in the bibliography.

  • Computers and the Use of Natural Language Processing

    In seven pages this paper examines computer word processing and the uses of natural language in a consideration of history and program improvement suggestions. Five sources are listed in the bibliography.

  • Natural Language Processing and Speech Recognition

    In five pages this paper examines speech recognition technology in terms of language processing system applications and uses. Six sources are cited in the bibliography.

  • Preventing Network Attacks

    A 5 page discussion of network security. This paper emphasizes the importance of approaching this problem not just from a technological perspective but also from a human perspective. Bibliography lists 2 sources.

  • Wireless Networks for a Small Business; Governance and Security

    This 10 page paper looks at the issues a small business may need to consider when implementing a wireless network. The 802.11 family is examined and the governance and security issues are discussed with reference to ISO 17799. The bibliography cites 7 sources.

  • General Overview of Network Security

    In ten pages network security is examined in an overview that considers Target.com in a consideration of various threats from hackers and how they operate. Nine sources are cited in the bibliography.

  • Implementing New Technology; A Consideration Of Virtual Private Networks

    This 6 page paper considers the case of a medium-sized company which is considering implementing new technology. With offices in different parts the country the company is considering installing a virtual private network. The paper looks at the potential of the virtual private network, including its' background, the technology and the advantages and disadvantages of the technology. The bibliography cites eight sources. The bibliography cites 7 sources.

  • Online Trading and the Infrastructure of Technology

    In three pages this paper examines an online trading brokerage network's infrastructure and considers the impact of technology on the fictitious Primus Securities. Four sources are cited in the bibliography.

  • Comparison of Databases

    In three pages Microsoft Access is compared to Filemaker Database and Oracle Database. Four sources are cited in the bibliography.

  • Welding and Robotics

    In eleven pages this paper discusses how robotics are being applied to the welding industry in a consideration of the socioeconomic effects and costs involved. Eight sources are cited in the bibliography.

  • IMPROVING DATA ANALYSIS FOR VILA HEALTH

    Discusses the use of data collection and analysis in reducing risk and increasing quality assurance at a fictitious hospital. There are 6 sources used in the bibliography of this 6-page paper.

  • Peer to Peer Network and Client Server Network Computing

    In five pages this paper examines two types of computing network and considers the advantages and challenges of each in a business environment. Three sources are listed in the bibliography.

  • Analogue to Digital Photography Shift and its Implications

    In four pages this paper discusses the transition from analogue photography to digital photography in terms of implications with topics including authenticity, originality, and truth examined. Five sources are cited in the bibliography.

  • Structured Evolutionary Prototype Development and Prototype Software Development Introductory Discussion

    In three pages this paper discusses evolutionary rapid prototypes in an introduction of prototype software development. Four sources are cited in the bibliography.

  • Quantum v. Classical Computation and Physics

    In seven pages this paper discusses computation and physics in this comparative analysis of quantum and classical computing variations. Five sources are cited in the bibliography.

  • ELECTRONIC MEDICAL RECORDS AND RISKS

    Discusses contingencies and risk management pertaining to electronic medical records. There are 3 sources listed in the bibliography of this 4-page paper.

  • Technology In The Management Of Distribution Companies

    Technology has revolutionized the way in which distribution companies are able to operate. This 4 page paper looks at the way in which some aspects of technology are currently impacting on the distribution and logistics industry, considering the benefits and difficulties of a present, and considers how they may develop in the future. The technology discussed includes logistics software, satellite navigation systems and radio frequency identification (RFID). The bibliography cites to sources.

  • Improving Security Performance in an Organization with the Use of RFID Smart Cards and Biometric Data

    This is an in-depth paper examining the potential use of smartcards in order to improve security within an organization needs to control entrance into the facility. The idea is that a smart card, with embedded RFID technology may be used to gain access through automated entrance points, with identity verified through the use of biometric data. The paper starts with an introduction, presents an in-depth literature review examining the importance of security, the technology and the way in which it may be utilized, ending with a case study supported by suggested methodology and then some potential results. Fifty-one sources are cited in the bibliography of the seventy-three page paper.

  • Handheld Notebooks and Palm Computers and Pen Based Input Technology

    In six pages this paper discusses the technological implementation of pen based inputing and its market capabilities. Seven sources are cited in the bibliography.

  • Case Study on Network Design

    In twenty three pages a case study on a small advertising studio's network design is examined in terms of office needs and applicable networking, hardware, software, and financial considerations. Eighteen sources are cited in the bibliography.

  • Software Quality and Systems Development

    In seven pages this paper discusses Total Quality Management and other systems developmental approaches in a consideration of the importance of software quality. Six sources are cited in the bibliography.

  • Flat Panel Computer Monitors Advantages and Disadvantages

    In six pages the advantages and disadvantages of flat top panel desktop computers and displays for laptops are assessed. Seven sources are listed in the bibliography.

  • Stress of the Workplace and the Impact of Technology

    In four pages this paper discusses the negative affects of stress in the workplace and the detrimental impact of technological developments. Four sources are cited in the bibliography.

  • Teachers and Technology Training That is Effective

    In five pages technology training and its effectiveness regarding the training of teachers are discussed. Six sources are cited in the bibliography.

  • Banking Sector and Technology's Impact

    In eight pages the impact of technology on banking is examined in an overview of talking teller machines, biometrics, and issues including customers service and employee effects. Eight sources are listed in the bibliography.

  • History of the Internet

    In eighteen pages this paper presents an extensive history of the Internet with business, ecommerce, and user information provided. Twelve sources are cited in the bibliography.

  • Background and Analysis of the UNIX OS

    The computer operating system known as UNIX is the focus of this overview of ten pages that includes its background history and analysis of its computing significance. Five sources are cited in the bibliography.

  • Windows LINUX and UNIX Implementations

    In ten pages this paper examines Windows operating system alternatives to achieving network security in a consideration of LINUX, UNIX, and their implementation and performance evaluation. Six sources are cited in the bibliography.

  • UNIX vs Windows In Terms of File Processing Functions

    This paper provides an overview of the various pros and cons of each operating system, UNIX and Windows. This four page paper has four sources listed in the bibliography.

  • Education and Virtual Reality

    In fifteen pages this paper applies virtual reality to a school environment with a case study and various 3D virtual reality programs examined. Eight sources are cited in the bibliography.

  • Developments in Voice Over Internet Protocol

    In three pages VoIP developments are discusses with the Nortel Networks and IBM alliance among the topics examined. Four sources are cited in the bibliography.

  • Voice Over Internet Protocol History

    In six pages this paper examines VoIP in a consideration of its history and its future posibilities that include taking over the 'plain old telephone service' or POTS. Seven sources are cited in the bibliography.

  • Essay Questions on Voice Over Internet Protocol Answered

    In four pages this paper considers VoIP with various essay questions answered.

  • The Uses of TCP/IP Protocol Today

    This 5 page paper discusses the Transmission Control Protocol/Internet Protocol (TCP/IP), an older technology that is once again being widely used. There are 7 sources listed in the bibliography.

  • VoIP AND OVERVIEW

    Discusses Voice over Internet Protocol (VoIP), some history, current usage and predictions. There are 12 sources listed in the bibliography of this 10-page paper.

  • Overview of VoIP Technology

    In fourteen pages Voice Over Internet Technology and how it operates is examined in an overview that includes packet switching uses, price samples, and this technology's future. Five sources are listed in the bibliography.

  • Websites Design Methodologies

    In five pages website design system methodologies that are information based, relationship based and structure based are discussed. Four sources are cited in the bibliography.

  • UMTS Political Pitfalls of Universal Mobile Telecommunications System or UMTS

    In eleven pages wireless technology and its political pitfalls are examined in this overview of the Universal Mobile Telecommunications System. Ten sources are cited in the bibliography.

  • Daily Life and the Impact of Wireless Technology

    In three pages this paper examines how daily life has been affected by wireless communications technology and also considers future development. Three sources are listed in the bibliography.

  • Home Health and Hospice Company Business Requirement Analysis

    In ten pages a home health and hospice company is examined in terms of its two information technology needs which include adding laptop computers, printers, and a wireless network for visiting nurses to educated patients and a self service automated HR system. Ten sources are cited in the bibliography.

  • Advantages and Disadvantages of Wireless Networks

    This paper examines WAN and LAN wireless network types in eight pages and argues that their disadvantages are outweighed by their advantageous aspectes. Twelve sources are listed in the bibliography.

  • Wireless Network Security Article Analysis

    The writer analyzes an article that describes the problems of providing security for wireless networks. There are two sources listed in the bibliography of this three page paper.

  • Wireless Technology In The Classroom

    A 4 page paper. The writer reports three specific cases where teachers are using wireless technology in their classrooms. In one school, students are using it for a multitude of things and in the other two schools, wireless is used in algebra classes. The essay reports the outcomes related to the use of this technology and comments on some of the purposes of it. Bibliography lists 7 sources.

 

Most Relevant Research Papers

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

 

Copyright © 1994-2019 The Paper Store Enterprises, Inc. & Research Papers Online. All rights reserved.