The paper details for each term paper, essay, book report, dissertations and thesis on Computer Technology that are listed below include a description of the paper. the number of pages, and a sample of text.
Use the ESSAY SEARCH TOOL at the top of the page to narrow your search. Can't find what you are looking for, check out our Custom Essay Writing and Research Paper service. Buy your sample paper from the professionals at the Paper Store.
A 5 page discussion of the marketing potential presented by this online gaming opportunity. The author contends that this potential lies in the XBox features that allows players to remove themselves from their real-life worlds. Bibliography lists 5 sources.
A 5 page paper which examines the emotional and social realities found in the future of cyberspace as seen in William Gibson’s collection of short stories “Burning Chrome.” Bibliography lists 3 additional sources.
This 13 page paper examines the use of a virtual private network, the advantages and disadvantages, the use of IPSec as the protocol for security and argues that the weakness of IPSec may be overcome with the use of SSL in some circumstances. The bibliography sites 13 sources.
3 pages in length. The first issue identified from the user's perspective is the manner by which user interface is inextricably interconnected with interaction design; in order to appeal to a general audience, the interaction design must reflect a pleasing user interface. This may be defined in any number of ways, not the ...
This 7 page paper is an outline for information needed to deign a stock control system. The paper looks at who the users are and the way they use the system, a potential questionnaire to assess the needs of the operational users and description of the potential design for the new systems functional and non ...
12 pages in length. Technology has become an inextricable component of contemporary society; its presence – both ominous and valuable at the same time – is perceived as a dichotomy of grand proportions where mankind's progression into the twenty-first century is concerned. While Florman (1996) looks with great anticipation toward future technological achievements, ...
This paper looks at the decision to adopt Wi-Fi and the way it may be implemented. The paper is written using a range of secondary looking at the current technological abilities and the potential future developments. The paper shows the different choices and outlines the advantages and disadvantages of the different choices, paying particular attention ...
This 16 page paper considers the potential of using a mobile telephone payment system to pay for car parking. The paper looks at the potential in terms of market access and technology and then considers the choices using IP technology, voice systems and text messages. The bibliography cites 17 sources.
This 3 page paper provides an overview of each of the 7 layers in the OSI model, including responsibility of each layer, technology and sample protocols used. Bibliography lists 2 sources.
This 11 page paper considers some of the security issues that may be faced by a WAN set up by a university f collage. The paper looks at the threats and argues the most secure solutions is to ensure the initial set up is undertaken correctly including the coding. The bibliography cites 9 sources.
This 19 page paper (not including the table of contents) is a report that considers who a new information system may be designed for a fictitious company. The paper looks at how the employees and the system may interact and how the hardware and the software should be designed. The bibliography cites 23 sources.
This 6-page paper focuses on two case studies (University of New York and FedEx) and the integration of technology within both of these organizations. Questions answered include improvements the technology has made, goals for the future and privacy issues.
A 4 page report to a manager explaining why it is in the company's best interests to supply antivirus software to employees to use on their home and laptop computers. Even the most careful of employees can gain a virus from time to time, particularly a new one of which they may not be ...
This 3 page paper examines ISDN, its history and its future. Trends are discussed. Positive and negative features of ISDN are discussed. Bibliography lists 6 sources.
This 3 page paper why software developers release security patches and reports a few of the security patches released by Microsoft over the last few years and the vulnerabilities they protected the user from. Bibliography lists 6 sources.
A 3 page essay that examines the position of Postman in Technopoly, The Surrender of Culture to Technology (1992). Postman espouses the position that science's revelations have become so far beyond the comprehension of the ordinary person that the population at large is not capable of grasping their meaning. Postman sees modern culture as being ...
This 3-page paper describes attributes to be considered when it comes to information technology systems development. Bibliography lists 2 sources.
This 9 page paper examines the development of autonomic computing, how the theory is transforming into reality with different development to deliver autonomic elements that are embedded within system and tools being offered by companies to help developers create this type of content. The paper examines this in line with IBM's vision of autonomic computer ...
This 7 page paper examines grid computing, what it is, how it is used, the way in which it materialised and considers the advantages and disadvantages of gird computing. The bibliography cites 14 sources.
This 9 page paper examines the use of fuzzy logic in computer systems with special attention its use with fuzzy logic controllers (FLC). The development of fuzzy logic is shown with a three stage model and the value of neural networks to help system learning is discussed. The bibliography cites 8 sources.
This 7 page paper looks at the purpose role and the development of threading in a network environment looking at multi-layer threading and hyper-threading. The bibliography cites 9 sources.
This 4-page paper offers a model case of how an IT system might operate in a fictitious upscale retail grocer. Bibliography lists 3 sources.
This 3-page paper compares and contrasts FAT and NTFS on the Windows operating systems. Bibliography lists 3 sources.
This 4-page paper focuses on B2B and B2C Web sites, and discusses the differences between sites in terms of their purposes, their customers and their content. Bibliography lists 3 sources.
This 20 page paper looks at what groupware and collaborative team work entail; why scientists need to collaborate; what collaboratories are; approaches to studying collaboratories in general and scientific collaboratories specifically; and how such collaboratories can be improved. Bibliography lists 20 sources.
Showing 651 - 675 of 869 results
Looking for the perfect essay? Order Your Custom Paper Now »