Javascript is disabled. Please enable it for better working experience.

Research Papers on Technology

All technology students are required to write research papers multiple times in their educational tenure. This also requires much review of the past literature for a proper understanding of the topic. Researchomatic, therefore, provides its consumers with a wide range of research papers on technology and related topics to support and assist students in getting quality literature for secondary data.

Graduate Academic Portfolio
Rating
GRADUATE ACADEMIC PORTFOLIO Graduate Academic Portfolio Table of Contents Degree Plan5 Core Courses (12 Semester Hours) Date Grade5 Technology Management Track (18 Semester Hours)6 Safety Management Track (18 Semester Hours)6 Transcript Data6 Course Description: Problems in Safety Management11 Course: Designation: Applied Industrial Research15 Course Designation: Operations and Organizations19 Course Designation: Management of Technology in Organizations22 Course Designation: Emerging Technology26 Course Designation: Leadership ...
Huffman Trucking Company
Rating
HUFFMAN TRUCKING COMPANY Network Protocols at Huffman Trucking Company Network Protocols at Huffman Trucking Company With a mission to be “a profitable growing, adaptive company in an intensively competitive logistical services business environment,” it is essential that Huffman Trucking influence the technology to continue providing the best customer service and business efficiencies plausible. ...
Columbia's Final Tragedy Mission
Rating
COLUMBIA'S FINAL TRAGEDY MISSION Columbia's Final Tragedy Mission Abstract Space Shuttle Columbia's last mission 'STS-107' took place between January 16, 2003 and February 1, 2003. At 7:59:32 PM, Central Time United States lost communication with Columbia a few minutes after the news of the world began transmitting images of the shuttle disintegrating ...
Abstract
Rating
Abstract In this study we try to explore the concept of “Identity Theft” in a holistic context. The main focus of the research is on “Identity Theft” and its relation with “crimes occurring in the world of advanced technology and user interface”. The research also analyzes many aspects of “Identity Theft” ...
Histoplasma Capsulatum
Rating
Histoplasma Capsulatum Introduction Histoplasma capsulatum causes the disease known as Histoplasmosis which alters the virulent human body. In the Americas are the most important endemic areas due to favorable climatic conditions for the development of this fungus. The disease is related to their occupation and exposure to infectious particles found in excreta ...
Virtual Reality
Rating
VIRTUAL REALITY Virtual Reality in Medicine Virtual Reality in Medicine Introduction Almost since its introduction, computers have become a part of the diagnostic and therapeutic arsenal of the modern physician as well as with the advent of personal computers in basic everyday tools of the office. This virtual reality, the youngest daughter ...
Graphics Designing And Physics
Rating
GRAPHICS DESIGNING AND PHYSICS Newton's Laws in the Graphic Designing Field and Object Animation Newton's Laws in the Graphic Designing Field and Object Animation Introduction Physics based animation concept is emerging extensively. Many production houses are developing action and animated films based on physics based graphics animation. This defines the multitude of simulation appropriate ...
Network Organization, Addressing, And Routing Protocols
Rating
NETWORK ORGANIZATION, ADDRESSING, AND ROUTING PROTOCOLS Network Organization, Addressing, and Routing Protocols Network Organization, Addressing, and Routing Protocols A computer network or a network is when two or more computers are connected together to share resources such as hardware, data, and software. There are various types of network types e.g. LAN ...
Cyberterrorism
Rating
CYBERTERRORISM Cyberterrorism Table of Contents Introduction3 Discussion3 Information Warfare and Cyberterrorism4 Risk and Critical Infrastructure Attacks5 Cyberterrorism as an Adjunct Attack6 Al-Qaeda and Information Technology6 Conclusion8 Cyberterrorism Introduction Technology is growing parallel to the growth of tools, technology, and weapons since the origin of life. During the last hundred years, warfare has evolved close range and small war weapons to technical and ...
Hardware And Software
Rating
HARDWARE AND SOFTWARE Hardware and Software Hardware and Software Introduction This paper describes the hardware and software used to support staff working groups, and enterprise computing within my current organization. We will talk about what is hardware and software, types of hardware and software, and software innovations. According to Rainer (2010) hardware consists ...
811 - 820 of 961 Go To Page 77  78  79  80  81  82  83  84  85  86