Essays and Research Papers on Computer Technology

Select a sample research paper or essay from the list below to view details.

The paper details for each term paper, essay, book report, dissertations and thesis on Computer Technology that are listed below include a description of the paper. the number of pages, and a sample of text.


Use the ESSAY SEARCH TOOL at the top of the page to narrow your search. Can't find what you are looking for, check out our Custom Essay Writing and Research Paper service. Buy your sample paper from the professionals at the Paper Store.

Database Use at Penske

  • 3 page paper

A 3 page paper discussing Penske’s use of Microsoft Access with customer relationship management (CRM) applications, specifically as it applies to the sales management function. At present, Penske makes only minimal use of the CRM application, and greater, more efficient use of that function can benefit both Penske and its customers. Penske has ...

A paper which considers threats to Microsoft's dominance of the software industry, particularly in reference to security issues and the increasing popularity of Linux and the use of open source codes. Bibliography lists 6 sources

This 4 page report discusses Internet Protocol Telephony – the basics of what it is, how it has changed telecommunications, why organizations benefit from it and who are the leaders in the marketplace. Bibliography lists 7 sources.

This 10 page paper looks at the technology of WLANs, the advantages and disadvantages and then concentrates on a single security weakness; the use of address resolution protocol (ARP), which is included in the 820.11 b specifications. The problem are outlines and some solutions discussed. The bibliography cite 11 sources.

In consideration of the question as to whether the PC environment storage of mission critical data is both a step forward and back, the issues of application development are explored in terms of security, maintenance, management structure, and recommended tools. Bibliography lists 6 sources. jvPCenvi.rtf

A 3 page paper comparing Management Information Systems (MIS) and Decision Support Systems (DSS). Though the purpose of each is to lead managers to make better and more effective decisions, there are differences between these two complementary systems. A DSS can make business more effective by disallowing many missteps that would be made ...

A 3 page paper written as an example for AIU class EDU600 Unit 3 Individual Project. It has been well established for many years that at least a portion of aggressive behavior stems from personal uncertainty, lack of self-esteem, lack of social skills and an attempt to cover feelings of inferiority with a mask ...

A paper which looks at mass customisation and personalisation; smart environments and smart mobs, and the differences between emergence and prototyping. Bibliography lists four sources

This 3-page paper focuses on the impact of information systems technology on the accounting profession. Bibliography lists 5 sources.

“Pyramid Power” IT

  • 8 page paper

An 8 page paper discussing the IT pyramid and its various levels, then identifying the place that two companies, USAA and Ford Motor Company, occupy in the pyramid. Includes 2 figures. Bibliography lists 3 sources.

A 7 page paper discussing current developments in central and electronic security systems that are also capable of controlling home systems such as heating and lighting. The smart house holds great promise for the future. Paradoxically, however, though most systems center on security, there is very little mention of security measures for the ...

This mock magazine offers six RT computer articles on the title and a 6 page editorial on what's included in those articles. Subjects include: Re-evaluating your replacement strategy, Sasser worm, MS revisit of NGSCB security plan, top technologies for 2005, Hitachi 400GB drive, and Linksys, Boingo Boost Hotspots. Bibliography lists 5 sources. jvPCmag.rtf

If there is no living without networking, there is no living without network security, and this growing threat makes it wise to consider other options to the Windows OS. Two operating systems, UNIX and LINUX, are possibilities. They are compared in terms of implementing network security. Considering what is at stake, LINUX proves the better ...

This 3 page paper discusses the fictional upgrade to the company, Baker and Young. IT recommendations are made. Bibliography lists 1 source.

This paper presents an overview of denial of service attacks (DDoS), what they are, what their effects are and how they can be prevented. Bibliography lists 6 sources.

DSL Technology

  • 12 page paper

This 12 page paper is written in two parts. The first part, making up two thirds of the paper, considers the development of DSL technology. This includes the influences on speed such as distance form the exchange and wire gauge, various types of DSL, such as ADSL and HDSL, how DSL works and the potential ...

An 11 page paper discussing the marketing of current developments in central and electronic security systems that are also capable of controlling home systems such as heating and lighting. The smart house holds great promise for the future. Paradoxically, however, though most systems center on security, there is very little mention of security ...

A 26 page revision of the 25-page paper of same name. This version adds P2P networking and discussion of a 3D interface available from a software publisher, in addition to the other topics already addressed in the original paper. Bibliography lists 20 sources.

Windows is said to give programmers certain advantages over UNIX, particularly in the area of usability. However, Kirch (1999) refutes this statement, stating that UNIX offers a GUI interface and all the Windows advantages. According to Kirch, the reason the myth lives on is an unsolved mystery since there is no evidence that programming in ...

An 11 page paper discussing the needs that a data mart/data warehouse should fill for an organization contemplating designing and implementing one. The wealth of information that exists within every organization can lie dormant in the form of historical data only, or it can be used for a more strategic approach to planning for ...

This 4 page paper discusses the fear of some toward technology and its uses in society. Bibliography lists 6 sources.

A 4 page analysis of computer network design. The author analyzes factors such as SAM, paged pool size, registry size, CPU size, pagefile size, and physical RAM. Bibliography lists 1 source.

This 7 page paper focuses on the the problem that occurred early in 2000 when several companies' web sites came to a halt due to hackers flooding their servers. Several issues concerning security are explored, including but not limited to the use of encryption technology and hacker insurance. Bibliography lists 9 sources.

CPU Standards Comparison

  • 10 page paper

The central processing unit (CPU) of a microprocessor moved beyond earlier hardware-based processing units to accommodate embedded software architecture with specific evolutions in CPU development standards. While the standards offer consumer protection and manufacturers guidance, the evolution of the CPU standards are based in the need to keep up with technology and by constantly raising ...

This 4 page paper discusses the ways in which a non-techno savvy person can still create a dynamic online presentation. Bibliography lists 3 sources.

Showing 601 - 625 of 869 results

Looking for the perfect essay? Order Your Custom Paper Now »

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again: