Javascript is disabled. Please enable it for better working experience.

Research Papers on Technology

All technology students are required to write research papers multiple times in their educational tenure. This also requires much review of the past literature for a proper understanding of the topic. Researchomatic, therefore, provides its consumers with a wide range of research papers on technology and related topics to support and assist students in getting quality literature for secondary data.

Abstract
Rating
Abstract In this Research paper, the evolution of technology has been discussed. The paper discusses the development of technology from the year 1865 to 2011. The paper explores and explains how the technology and its advancements are significant in our daily lives. Table of Contents Abstracti Introduction1 Discussion1 Conclusion4 References5 Appendix6 Evolution of Technology Introduction In the last century, the ...
Effects Of Service Quality
Rating
EFFECTS OF SERVICE QUALITY Effects of Service Quality Abstract The paper discusses the effect of service quality on information technology. With the passage of time, the outsourcing services in the IT sector became a backbone of organization's operational and management infrastructure. From software to web development, the companies outsource a variety ...
Network Plan
Rating
NETWORK PLAN Network Backup Plan Table of Contents Introduction3 Outline the steps and resources3 Designing a Network4 Review of the data targeted for backup5 Conclusion5 Network Backup plan Introduction Networking is a process that links two or more computers together in order to transfer data. Networks are constructed with a combination of computer hardware and software. Network infrastructure design ...
Internet And Children
Rating
Internet and Children Introduction The Internet is a tool for all age ranges widely in homes, offices and schools and makes the children smarter or socialized. It is useful and can be fun but also gives access to sites and content unsuitable for minors. Thus, needed by adults (parents, teachers, grandparents and ...
Network Security
Rating
NETWORK SECURITY Network Security Network Security 1. Joe the janitor was recorded on the company security camera one night taking pictures with his cell phone of the office of the CEO after he is done cleaning it. The film is grainy (from repeated use and reuse); and you cannot ascertain what specifically ...
Information System
Rating
INFORMATION SYSTEM Information System Information System Introduction In this paper, we are discussing the importance of information system in business process. We are considering the information system of Tesco plc. Tesco is merchandise and global grocery retailer headquartered in UK. It is considered to be the world's 3rd largest retailer after Wal-Mart and Carrefor. ...
Abstract
Rating
Abstract The paper discusses the importance of Internet security in the workplace. The employee considerations in relation with the security policies are also mentioned. It details out the implementation of Internet security in accordance with the ethical approaches. The impact of Internet restrictions are also mentioned along with the effective implementation ...
Software Testing
Rating
SOFTWARE TESTING Software Testing Abstract Measurement of nonlinearity in social service research and evaluation relies primarily on spatial analysis and, to a lesser extent, social network analysis. Recent advances in geographic methods and computing power, however, allow for the greater use of simulation methods. These advances now enable evaluators and researchers to ...
Computer Hardware
Rating
COMPUTER HARDWARE Computer Hardware Computer hardware Not everyone has faithfully the similar hardware. But individual like you, who have a desktop computer, probably have most of the mechanisms, which are known as the computer hardware. Wireless Information System: A Wireless Information System is defined as any software or hardware that is not relied on wires ...
Information Security
Rating
INFORMATION SECURITY Information Security Information Security Introduction The present paper is based on a case study of a high-tech-small-firm (HTSF) that carries out their inter-organizational search for new knowledge by spanning both technological and network boundaries. The aim of the paper is to examine how this spanning of technological boundaries and a network ...
821 - 830 of 961 Go To Page 78  79  80  81  82  83  84  85  86  87