The paper details for each term paper, essay, book report, dissertations and thesis on Computer Technology that are listed below include a description of the paper. the number of pages, and a sample of text.
Use the ESSAY SEARCH TOOL at the top of the page to narrow your search. Can't find what you are looking for, check out our Custom Essay Writing and Research Paper service. Buy your sample paper from the professionals at the Paper Store.
An 8 page paper. The first section explains mesh, bus, ring and star topologies and comments on how they are different. The second part explains and discusses Ethernet, Token Ring, FDDI and wireless protocols. Bibliography lists 4 sources.
This 8 page paper evaluates IDS and their relevance by first focusing on a catastrophic event that occurred in February of 2000. An outline is included. Annotated bibliography lists 10 sources.
This 3-page paper compares the LINUX/UNIX systems with that of the Windows operating systems. Bibliography lists 3 sources.
A 4 page summary and analysis of the article Partnerships, Personalization, and Personal Security Top the News. No additional sources cited.
In six pages this paper examines Internet security issues in an overview that focuses on the best practices computer and Internet users should adopt. Twelve sources are listed in the bibliography.
This is a 7 page paper that provides an overview of Apple's iPhone 4. A comparative analysis of specifications and value is performed. Bibliography lists 6 sources.
This five page paper presents a discussion on learning styles and applying them to software instruction. It opens with a discussion on the different learning styles that have been discovered and how they work.It then moves into an exploration as to which learning style may apply to each self teaching method of software programs. Bibliography ...
This 3 page paper examines fixes to the vulnerable systems of governments, particularly as it pertains to the kiosk. Bibliography lists 4 sources.
This 4-page paper discusses risk assessment as it pertains to security issues for Amazon.com. Bibliography lists 3 sources.
This 6 page paper examines the concept. The death march is defined. Suggestions are made. Bibliography lists 5 sources.
This 5-page paper provides a case analysis of CareGroup and technology. Bibliography lists 4 sources.
This is a 4 page paper that provides an overview of systems design and analysis. Issues such as support, implementation, and controls are explored. Bibliography lists 6 sources.
This 4-page paper discusses Patton-Fuller's information technology system and open systems interconnections. Bibliography lists 3 sources.
This is a 4 page paper that provides an overview of computer operating systems. The use of threads and processes are explored. Bibliography lists 3 sources.
This 3 page paper looks at a number of methods that a firm can use to provide IT support for its employees, from the creation of a positive supportive culture through to the provision of a help desk.
This 3 page paper examines SNMP and CMIP and the protocols are compared and contrasted. Bibliography lists 3 sources.
This 3-page paper compares the Linux, Windows Vista and Symbian operating systems. Bibliography lists 2 sources.
This 4 page paper concludes that for corporations that are large and need remote access and are concerned about security, the upgrade certainly pays, but Windows Server 2003 stands on its own and is certainly viable even in 2010. The two products are compared and contrasted. Bibliography lists 3 sources.
This 4-page paper discusses risk assessment and strategies for protection of an information system. Bibliography lists 4 sources.
This is a 3 page paper that provides an overview of information technology. Impacts upon quality of life and productivity are examined. Bibliography lists 4 sources.
This 3-page paper discusses cloud computing from an accountant/auditor's perspective. Bibliography lists 2 sources.
A 12 page paper discussing information, data, knowledge and knowledge management. The paper uses Wal-Mart's checkout scanning data gathering as an example. Bibliography lists 8 sources.
This 4-page paper provides an overview about podcasts, how they're produced, and the advantages and disadvantages of being a podcaster. Bibliography lists 3 sources.
This 7-page paper answers questions about data network architecture and protocols. Bibliography lists 4 sources.
This 10-page paper analyzes the basic elements of E-commerce security. The paper discusses securing data transactions, the e-commerce server, and the transaction by PKI and authenticating and authorization of the users. There are 5 sources cited.
Showing 801 - 825 of 869 results
Looking for the perfect essay? Order Your Custom Paper Now »