Essays and Research Papers on Computer Technology

Select a sample research paper or essay from the list below to view details.

The paper details for each term paper, essay, book report, dissertations and thesis on Computer Technology that are listed below include a description of the paper. the number of pages, and a sample of text.


Use the ESSAY SEARCH TOOL at the top of the page to narrow your search. Can't find what you are looking for, check out our Custom Essay Writing and Research Paper service. Buy your sample paper from the professionals at the Paper Store.

This 8 page paper provides an exercise in systems development. A set of mock interviews are provided. The interviews confront users on their experiences with a particular application. Appendices provide user data, questions and the interviews themselves. Bibliography lists 4 sources.

A paper which looks at the use of CMC in both distance learning and the classroom environment, with a critical analysis of current literature on the topic. Bibliography lists 8 sources

This 3 page paper provides an overview of security issues for the professional. Several examples of breaches are provided, inclusive of one to come from Microsoft. Bibliography lists 3 sources.

This 6 page paper examines the ecommerce site of eBay for its security features and problems. Specific examples of lax features given, with probably fixes. Discussion of ethics, legalities and standard operating procedures. Bibliography lists 2 sources.

This 3 page paper discusses open source software and why many companies are switching from proprietary software to open source. Bibliography lists 2 sources.

This 8 page paper examines the use of Component Based Software Development (CBSD), what it is, how it works, the advantages and disadvantages of the system and the implications n terms of managing the system when it is up and running. The bibliography cites 8 sources.

6 pages in length. Much has changed since the ancient Greeks first conceived of the notion of intelligent machines; indeed, the extent to which modern man has become wholly dependent upon automation is both grand and far-reaching. Post World War II, however, is the key point in artificial intelligence (AI) presence – a ...

This 11 page paper is written in three parts, The first part defines a Wireless Local Area Network,(WLAN), and looks at how it can be sued. The second part of the paper gives to examples of successful installation of WLAN, one in a university and one in a commercial environment The last part of ...

Wireless Networking

  • 17 page paper

This 17 page paper examines wireless networks. The paper starts with the development of wireless technology tracing it through to today. The paper then looks the current situations of wireless networks, how they are used and their manifestation in different. The technical operation of wireless networks is explained with the different options, such as ...

6 pages in length. In this day and age of tremendous technological advancements, there is almost nothing that cannot be accomplished with the help of wireless networks. The ease with which business can be conducted has served to increase both the speed and efficiency of contemporary commerce, proving more advantageous than Ethernet. ...

This 3 page paper compares the Mac operating system with Windows and presents a great deal of information to support the thesis that the Mac is better. Comparisons are made in terms of graphics, availability of software and many other aspects of computing. Bibliography lists 6 sources.

This 3 page paper discusses the vulnerability problems in Windows by Microsoft. Examples, projections offered. Bibliography lists 2 sources.

This 3 page paper considers what impact broadband technology will have on the design and development of multimedia. The paper undertakes this by first defining what the term multimedia means how it has been used and the constraints. The paper then defines broadband, its’ advantages and how these can enhance the use of multimedia. The ...

This 16 page paper examines IP telephone technology. The paper begins by defining what it is and how it is used. The technology itself is then considered, along with the way that this is likely to increase in the future. The paper argues that the adoption model will be similar to that seen with other ...

Mobile Commerce Industry

  • 20 page paper

A 20 page paper. Mobile commerce (M-commerce) is said to be the natural extension of e-commerce. This premise is based on the number of mobile devices in the world, including PDAs, cellular/mobile phones and laptop computers. Despite the hype, m-commerce has not become as popular as initially predicted. There are many reasons for this, including ...

Network Security

  • 10 page paper

This 10 page paper looks at network security today. Specifics in terms of how hackers work are included. Target.com is utilized as an example and specific problems are duly noted. The subject of network security is addressed in general as well. Bibliography lists 9 sources.

This 10 page paper looks at network security issues. Target.com is utilized as an example and its vulnerabilities are highlighted. Specific network information provided by a student is included. Target is discussed specifically and net security is discussed in general as well. Bibliography lists 10 sources.

This 30 page paper examines IP Telephony, explaining what it is and how it works and also the way it is developing and being taken up by different users. The paper focuses on the take up within the UK, and also consider who the major suppliers are in the UK. The paper then moves onto ...

This 4 page paper describes a media player prototype developed by the student showing how human computer interaction studies has aided with the development of the design in terms of the interface design and also the functionality provided. The bibliography cites 3 sources.

This 7 page paper provides an overview of AI, or artificial intelligence, and its use. This paper specifically considers the use in chaotic financial markets. Bibliography lists 8 sources.

A 4 page review of an article published in the December 2003 edition of “Hospital Materials Management” concerning an automated inventory system. This paper recounts the benefits of such systems and notes their growing acceptance through many business arenas. No additional sources listed.

This 9 page report discusses how an intruder can compromise network security by subverting the ARP protocol. The address resolution protocol or "arp" is a protocol used by the "IP" or Internet Protocol to plot the pathways for IP network addresses to the hardware addresses being used by a data link protocol. Bibliography lists 5 ...

This 15 page paper examines the way that information systems are used at the state owned Saudi Arabian oil company Saudi Aramco. The paper considers how the technology and information systems fit in with the company’s overall strategy, helping it to achieve its; goals, and then examines the system in more detail. The systems ...

This 15 page paper discusses the use of virtual reality in schools. Following an introduction that includes comments about virtual reality and the two basic ways humans have to learn, the writer reports opinions on the benefits of virtual reality as well as how it has been used in some schools. A summer pilot program ...

A 6 page paper discussing considerations for supplying a LAN for a CPA firm. The network designed for the CPA firm should be a thin client, three-tier client/server system operating on Fast Ethernet. Small groups of users should be connected via token ring groups connected to a 100 mbps Fast Ethernet backbone network. ...

Showing 576 - 600 of 869 results

Looking for the perfect essay? Order Your Custom Paper Now »

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again: