Essays and Research Papers on Computer Technology

Select a sample research paper or essay from the list below to view details.

The paper details for each term paper, essay, book report, dissertations and thesis on Computer Technology that are listed below include a description of the paper. the number of pages, and a sample of text.


Use the ESSAY SEARCH TOOL at the top of the page to narrow your search. Can't find what you are looking for, check out our Custom Essay Writing and Research Paper service. Buy your sample paper from the professionals at the Paper Store.

This 7 page paper provides an overview of AI, or artificial intelligence, and its use. This paper specifically considers the use in chaotic financial markets. Bibliography lists 8 sources.

A 4 page review of an article published in the December 2003 edition of “Hospital Materials Management” concerning an automated inventory system. This paper recounts the benefits of such systems and notes their growing acceptance through many business arenas. No additional sources listed.

This 9 page report discusses how an intruder can compromise network security by subverting the ARP protocol. The address resolution protocol or "arp" is a protocol used by the "IP" or Internet Protocol to plot the pathways for IP network addresses to the hardware addresses being used by a data link protocol. Bibliography lists 5 ...

This 15 page paper examines the way that information systems are used at the state owned Saudi Arabian oil company Saudi Aramco. The paper considers how the technology and information systems fit in with the company’s overall strategy, helping it to achieve its; goals, and then examines the system in more detail. The systems ...

This 15 page paper discusses the use of virtual reality in schools. Following an introduction that includes comments about virtual reality and the two basic ways humans have to learn, the writer reports opinions on the benefits of virtual reality as well as how it has been used in some schools. A summer pilot program ...

A 6 page paper discussing considerations for supplying a LAN for a CPA firm. The network designed for the CPA firm should be a thin client, three-tier client/server system operating on Fast Ethernet. Small groups of users should be connected via token ring groups connected to a 100 mbps Fast Ethernet backbone network. ...

Database Use at Penske

  • 3 page paper

A 3 page paper discussing Penske’s use of Microsoft Access with customer relationship management (CRM) applications, specifically as it applies to the sales management function. At present, Penske makes only minimal use of the CRM application, and greater, more efficient use of that function can benefit both Penske and its customers. Penske has ...

A paper which considers threats to Microsoft's dominance of the software industry, particularly in reference to security issues and the increasing popularity of Linux and the use of open source codes. Bibliography lists 6 sources

This 4 page report discusses Internet Protocol Telephony – the basics of what it is, how it has changed telecommunications, why organizations benefit from it and who are the leaders in the marketplace. Bibliography lists 7 sources.

This 10 page paper looks at the technology of WLANs, the advantages and disadvantages and then concentrates on a single security weakness; the use of address resolution protocol (ARP), which is included in the 820.11 b specifications. The problem are outlines and some solutions discussed. The bibliography cite 11 sources.

A 3 page paper comparing Management Information Systems (MIS) and Decision Support Systems (DSS). Though the purpose of each is to lead managers to make better and more effective decisions, there are differences between these two complementary systems. A DSS can make business more effective by disallowing many missteps that would be made ...

A 3 page paper written as an example for AIU class EDU600 Unit 3 Individual Project. It has been well established for many years that at least a portion of aggressive behavior stems from personal uncertainty, lack of self-esteem, lack of social skills and an attempt to cover feelings of inferiority with a mask ...

A paper which looks at mass customisation and personalisation; smart environments and smart mobs, and the differences between emergence and prototyping. Bibliography lists four sources

This 3-page paper focuses on the impact of information systems technology on the accounting profession. Bibliography lists 5 sources.

In consideration of the question as to whether the PC environment storage of mission critical data is both a step forward and back, the issues of application development are explored in terms of security, maintenance, management structure, and recommended tools. Bibliography lists 6 sources. jvPCenvi.rtf

“Pyramid Power” IT

  • 8 page paper

An 8 page paper discussing the IT pyramid and its various levels, then identifying the place that two companies, USAA and Ford Motor Company, occupy in the pyramid. Includes 2 figures. Bibliography lists 3 sources.

A 7 page paper discussing current developments in central and electronic security systems that are also capable of controlling home systems such as heating and lighting. The smart house holds great promise for the future. Paradoxically, however, though most systems center on security, there is very little mention of security measures for the ...

This mock magazine offers six RT computer articles on the title and a 6 page editorial on what's included in those articles. Subjects include: Re-evaluating your replacement strategy, Sasser worm, MS revisit of NGSCB security plan, top technologies for 2005, Hitachi 400GB drive, and Linksys, Boingo Boost Hotspots. Bibliography lists 5 sources. jvPCmag.rtf

If there is no living without networking, there is no living without network security, and this growing threat makes it wise to consider other options to the Windows OS. Two operating systems, UNIX and LINUX, are possibilities. They are compared in terms of implementing network security. Considering what is at stake, LINUX proves the better ...

This 3 page paper discusses the fictional upgrade to the company, Baker and Young. IT recommendations are made. Bibliography lists 1 source.

This paper presents an overview of denial of service attacks (DDoS), what they are, what their effects are and how they can be prevented. Bibliography lists 6 sources.

DSL Technology

  • 12 page paper

This 12 page paper is written in two parts. The first part, making up two thirds of the paper, considers the development of DSL technology. This includes the influences on speed such as distance form the exchange and wire gauge, various types of DSL, such as ADSL and HDSL, how DSL works and the potential ...

An 11 page paper discussing the marketing of current developments in central and electronic security systems that are also capable of controlling home systems such as heating and lighting. The smart house holds great promise for the future. Paradoxically, however, though most systems center on security, there is very little mention of security ...

A 26 page revision of the 25-page paper of same name. This version adds P2P networking and discussion of a 3D interface available from a software publisher, in addition to the other topics already addressed in the original paper. Bibliography lists 20 sources.

Windows is said to give programmers certain advantages over UNIX, particularly in the area of usability. However, Kirch (1999) refutes this statement, stating that UNIX offers a GUI interface and all the Windows advantages. According to Kirch, the reason the myth lives on is an unsolved mystery since there is no evidence that programming in ...

Showing 526 - 550 of 869 results

Looking for the perfect essay? Order Your Custom Paper Now »

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again: