Essays and Research Papers on Hardware, Software & Industry

Select a sample research paper or essay from the list below to view details.

The paper details for each term paper, essay, book report, dissertations and thesis on Hardware, Software & Industry that are listed below include a description of the paper. the number of pages, and a sample of text.


Use the ESSAY SEARCH TOOL at the top of the page to narrow your search. Can't find what you are looking for, check out our Custom Essay Writing and Research Paper service. Buy your sample paper from the professionals at the Paper Store.

This is a 4 page paper that provides an overview of information systems architecture. Fundamental principles of sound system design and management are examined. Bibliography lists 4 sources.

This 3 page paper, written in the style of a letter, compares and contrasts the features, functionality and usability of Office 2007 with Office 2003 with a focus on the Word. The bibliography cites 3 sources.

This is a 4 page paper that provides an overview of database software options. Microsoft Access, MySQL, Oracle, and DB2 are compared across several dimensions. Bibliography lists 4 sources.

This 3-page paper discusses concerns and issues pertaining to designing and implementing a wireless network in a hospital. Bibliography lists 4 sources.

Death March Projects

  • 5 page paper

This 5 page paper discusses death march projects: what they are and why they evolve. It answers a series of questions about them. Bibliography lists 3 sources.

This is a 4 page paper that provides an overview of the business case for information systems. The value derived from process integration is emphasized. Bibliography lists 4 sources.

This is a 5 page paper that provides an overview of integrated information systems. A number of outsourcing vendors are recommended. Bibliography lists 6 sources.

Information Ethics

  • 3 page paper

This is a 3 page paper that provides an overview of information systems. Ethics of information systems is emphasized. Bibliography lists 3 sources.

This is a 3 page paper that provides an overview of scanning for malicious code. A hypothetical scenario demonstrates how to explore entropy, system calls, and hex headers for suspicious content. Bibliography lists 2 sources.

This is a 6 page paper that provides an overview of cloud computing. The likelihood of cloud computing being adopted as a future standard is explored. Bibliography lists 5 sources.

This 3-page paper discusses the concept of groupware, its use and other factors. Bibliography lists 3 sources.

This is a 6 page paper that provides an overview of information systems and their value to organizations. Carr's view on the commoditization of information systems and software is explored in depth. Bibliography lists 8 sources.

This is a 12 page paper that provides an overview of operating systems security. Different security measures are compared. Bibliography lists 6 sources.

This is a 5 page paper that provides an overview of network security. A variety of discussion questions are answered. Bibliography lists 5 sources.

This 3-page paper focuses on whether cybercrime against indidviudals or cyberattack against institutions are more dangerous to the United States. The answer is cyberattacks. Bibliography lists 4 sources.

Fiber Optics

  • 4 page paper

This 4 page paper looks at the history of fiber optics, looking at the origins and development over the last two centuries and what they are today. The paper then looks at the way the technology may be developed in the future. The bibliography cites 3 sources.

This 9 page paper examines the design considerations for the provision of an interactive kiosk to support educating visitors to an environmental energy research centre. The paper starts by defining a brief, looking at what is needed and then moves on to the design elements. The design elements are divided into two parts, the physical ...

This is an 8 page paper that provides an overview of developing a program with an array structure. Psuedocode and needed objects are discussed. Bibliography lists 6 sources.

A 5 page paper that responds to specific issues. When Big Data Analytics are implemented in a specific hospital: well they need to hire additional people, will roles of existing personnel change, what are the design considerations for the system, discussion of infrastructure and roadmap, and how much will it cost. Essay includes discussions ...

In a paper of eight pages, the author writes about healthcare databases. The author of this paper explains why healthcare databases are important as well as how they are managed and regulated. There are four sources cited in this paper.

An IT Solution

  • 6 page paper

This 6 page paper examines a scenario in which an IT solution is being sought. The scenario of a travel agency which needs to increase efficiency and improve customers relations is assessed. The problem is identified and the solution of CRM is presented and justified. The bibliography cites 6 sources.

This essay discusses the organizational problems Yahoo! faced. It begins with a brief background on the company, including its structure. The next section discusses organizational behavior theory and concepts applying them to Yahoo's problems. Recommendations are given along with follow-up. Bibliography lists 5 sources. PG717121.doc

Web 2.0

  • 13 page paper

This 13 page paper looks at the concept, characteristics and use of Web 2.0, explaining what it is, here it can be seen and who uses it as well as examining some of the applications and benefits associated with their use. The bibliography cites 17 sources.

This 5-page paper discusses the concept of Big Data, and how it is being used in by banks and other financial institutions. Also included is a discussion about fintech. Bibliography lists 4 sources.

A 43 page paper about computer forensics. This paper discusses multiple aspects of computer forensics, fraud, detection tools: it explains forensic platforms, forensic accounting, usage shares of operating systems, cyberterrorism, cyberslacking, review of real cases, steganography software and detection tools, chain of custody, and a whole lot more. 1 screenshot. Bibliography lists 43 pages. ...

Showing 676 - 700 of 706 results

Looking for the perfect essay? Order Your Custom Paper Now »

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again: