Technology Research Paper Examples & Study Documents

Get access to our online database of Technology Research Paper writing samples.

Get inspired with 750,000+ our samples

Find Writing Inspiration in Our Data Base

WordsChoose values from min to maxminmax
1 page ≈ 275 words

Assessing the Successful Detection of Viruses and Malicious Programs

Microsoft Process Explorer This program provides the best way in which a computer…

Words: 1586Pages: 6

Essay on Wireless Technology

Within the same carrier, a 4G connection will be faster and more…

Words: 938Pages: 4

Effectiveness of Efforts Against Denial of Services Attacks

S 2009). The denial of services most probably achieved by inundating the…

Words: 1575Pages: 6

Concepts of data warehouses

Inmon, data warehouse may take physical or logical form to capture information…

Words: 1529Pages: 6

How to build a PC

PC Part Picker and PC Hound are sites that you need to…

Words: 896Pages: 4

The Graphics Interchange Format Report

A core advantage is that they can be applied for minute animations…

Words: 409Pages: 2

Selection of an Information System Platform

Most importantly, the same employees’ had worked in the company for more…

Words: 1567Pages: 6

Data Mining with SPSS

New companies are in the search for more information about the kind…

Words: 2536Pages: 10

Leadership Plan Research

This research paper recognizes the essence of communication, which is a foundation…

Words: 2185Pages: 9

Emerging Data Storage Technologies

There are three things of great concern when it comes to data…

Words: 2928Pages: 11

Disaster Recovery Plan

A disaster recovery plan is established upon the assessment of the risks…

Words: 1312Pages: 5

Data Management Essay

However, with time, it tends to become obsolete and cannot work with…

Words: 940Pages: 4

How might technological advancements affect public transportation

Furthermore, the research explores both positive and negative impacts that have been…

Words: 2398Pages: 9

Essay on Researches

It is usually what an individual seeks to look into after the…

Words: 1571Pages: 6

Definition of System Development Life Cycle

The Role and Impact of Project Manager The project manager has the following…

Words: 1557Pages: 6

Understand the Qualitative Approach

However, corporate citizens are in recent years often viewed as having a…

Words: 845Pages: 4

SECURING INTERCONNECTED RELATIONAL DATABASE CASE STUDY OF HARVARD UNIVERSITY

DATE……………… School (…) Department (…) Program (…) Acknowledgments First I would like to give special thanks to…

Words: 7964Pages: 30

Cyber Breach Case Research

The challenges facing cybersecurity globally have weakened the complex systems that were…

Words: 4302Pages: 17

The Dumbest Generation in America

For instance, within four minutes that the youth are reading a one-page…

Words: 1465Pages: 6

Advantages and Disadvantages of using surveys to collect data

Surveys on the other hand also have disadvantages; for instance, the ability…

Words: 1242Pages: 5

Technology tools Research Paper

In addition to that, organizations that invest on IS more, are likely…

Words: 1135Pages: 5

Firewalls Research Paper

Although there are other ways to secure a network, a firewall has…

Words: 2147Pages: 8

Triple Bottom Line Framework

The Triple Bottom Line dimensions are also referred to as Ps. The…

Words: 1814Pages: 7

Buffer overflow attacks prevention

Crucial endeavor in avoiding buffer overflow attacks is to understand vulnerabilities in…

Words: 683Pages: 3

Petya Threat in E commerce

In any case, the organizations should be aware of the transactions they…

Words: 1197Pages: 5

NIST categories and controls

NIST has categories in it that enable it to organize its main…

Words: 838Pages: 4

Windows 10 vs MacOS High Sierra Who's winning the Innovation Market of Technology

Although Apple has had an upper hand for a long time, it…

Words: 589Pages: 3

Multithreading and Multiprocessing Operating systems

Symmetric and asymmetric multi-processor allows for the processing functions that enhance the…

Words: 3460Pages: 13

Effects of Technology and Social Media on Emotional Development

This paper highlights effects of technology and social media on emotional development,…

Words: 1542Pages: 6

Computer Viruses Essay

According to him, it could look official but it could be deceiving…

Words: 396Pages: 2

Intrusion Detection System Essay

This very critical since no one can imagine the current world for…

Words: 1523Pages: 6

Critical Thinking Decision Theory within the Global Marketplace

From the talks, I gathered that leaders in the corporate world have…

Words: 1941Pages: 8

Research on the system of smart city park based on cloud computing Critique

PAPER SUMMARY 4 2. Critique of general paper structure: Abstract 5 2. Methodology 5 2. Critique of Paper’s…

Words: 2921Pages: 11

IT Control and Security Research

Governments and organizations have had to come up with strict measures that…

Words: 3247Pages: 12

Use of Information technology For Competitive Advantage

The companies or the organizations are able to exploit the changes in…

Words: 3811Pages: 14

E Business Security

But with rapid success comes the vulnerability of threats and risks that…

Words: 1308Pages: 5

Ethical Practice in the use of Biometric Systems

This technology is now used widely in this digital era in hospitals,…

Words: 988Pages: 4

Resource Based View of Information Systems

Generally, empirical evaluations applying the theory have strongly sustained the resource-based view…

Words: 1498Pages: 6

Samsung Company Help Desk Management

The human resource department has set aside the helpdesk department that handle…

Words: 1721Pages: 7

Action Plan For Compliance

In the application of the identity items, the health care giver will…

Words: 657Pages: 3

Challenges and opportunities for libraries in the 21st century

Many libraries have been getting closed down due to many factors including…

Words: 1662Pages: 7

Network Design Research

All these methods can work when used properly. For this assessment, we…

Words: 641Pages: 3

Responding to Cyber Attacks

For instance, mobiles have an alarm application that can be used by…

Words: 1566Pages: 6

Globalization Research

Despite globalization being regarded to be not new in the market, the…

Words: 2435Pages: 9

Nationalities of The International Companies

SAP company’s nationality is Germany and it works as a manager of…

Words: 562Pages: 3

Decision Support Systems Research

The following are the three major components of a decision support systems…

Words: 712Pages: 3

Impact of Social Media on Business

It is important to state that, before one understanding what social media…

Words: 1149Pages: 5

Enterprise resource planning software

Information sharing is also enhanced between the different modules in the Enterprise…

Words: 3041Pages: 12

Comparative study of Enterprise Resource Planning Vendors

It is therefore key to understand the strengths, weaknesses and tradeoffs that…

Words: 1670Pages: 7

Ethical Issues in Information Systems

Technology is one of the most important tool today and its existence…

Words: 940Pages: 4

Evolution of Drone Technology

Historically, there are particular references that offer enough cues to show the…

Words: 1140Pages: 5

DIGITAL DIVIDE Research

It is in many cases categorized as a social issue in the…

Words: 2355Pages: 9

Numerical Weather Prediction

Many observation systems like weather satellites and radiosondes are used to collect…

Words: 1701Pages: 7

What is the importance of public speaking

These stages are the essentials of communication that include correspondent, message, indoctrination,…

Words: 2704Pages: 11

Port Security Research Paper

However, one part that has not been looked into as much is…

Words: 2950Pages: 11

Theoretical Perspective of Information Security

The paper counters call for additional theories that major in information systems…

Words: 1581Pages: 6

CORPORATE PHYSICAL SECURITY Research

These problems have been influenced by the rapid growth in globalization. This…

Words: 1872Pages: 8

Network Security Monitoring

The increased device interconnection as provided by IoT is unabated. With this…

Words: 3459Pages: 13

Amazon risk assessment

Amazon Web Services (AWS) 4 2. Risk management 5 2. AWS risk management 6 2. Risk assessment on…

Words: 3256Pages: 12

Wal Mart Analysis

The organization operates with the aim of delivering affordable and quality products…

Words: 1636Pages: 6

Computer Assisted Instruction and Learning in Elementary Education

The 21st century education is the center in which all progress and…

Words: 1525Pages: 6

Symmetric cryptography Research

The first most widely known algorithm is the Data Encryption Standard (DES)…

Words: 990Pages: 4

Forms Of Cryptography Strengths And Weakness

In asymmetric method there is only one key which is applied for…

Words: 873Pages: 4

Asymmetric Algorithm in Cryptography

Another strength is that asymmetric encryption is also used for communication over…

Words: 678Pages: 3

Change in a healthcare unit

The healthcare unit under discussion is medium in size with a 300-capacity…

Words: 688Pages: 3

Effects of Malware on a Machine

It's not possible to comprehend all the details on malware since multiple…

Words: 2343Pages: 8

Inside a Denial of service Attack

Currently, DoS attack is becoming a fast-growing concern because of the detrimental…

Words: 998Pages: 4

Designing a process flow diagram in healthcare facility

This paper, therefore, aims at developing a project management plan and a…

Words: 736Pages: 4

TCP IP network security Finding a Research Topic

Every day, technological devices become more efficient in speed, size, and convenience…

Words: 1127Pages: 5

The five IT Megatrends that Shape the Digital Future

Which five Web sites do you visit most frequently 3 4. Question Four 4 a. Most…

Words: 2532Pages: 10

THE IMPACT OF DIGITAL TECHNOLOGY ON BUSINESS ACTIVITY

Statement of problem 3 1. Purpose of the research 4 1. Significance of the research 5 Theoretical perspective 6 1…

Words: 4508Pages: 17

Internet of Things in Agriculture

Notably, the IOT has had more impact on the developed countries as…

Words: 716Pages: 3

Disaster management Research

The main aim of the plan is to minimize the effects, minimize…

Words: 4147Pages: 16

Tech Issues in the Organization

The business organization uses IT-systems to conduct various operations. For instance, firms…

Words: 1810Pages: 7

Water Bottle Packaging Research

One of the considerations made is the environmental friendliness. To increase user…

Words: 348Pages: 2

Trends in Database Administration

Hackers practice their malice to benefit from the data that will be…

Words: 2165Pages: 8

Impact of Intelligent Personal Assistants in the Beer Industry

It is in the 21st century that the revolution has been observed…

Words: 1268Pages: 5

Impact of Changing Trends in Cyber Security in Organizations

With each cyberattack on average pegged at around $5million, technology becomes the…

Words: 2132Pages: 8

Privacy and ICT Ethics

The core purpose behind the current ICT advancements is to facilitate our…

Words: 2719Pages: 10

Cyber technology Research

Local Area Networks (LAN) and Wide Area Networks (WAN) make up the…

Words: 897Pages: 4

Opportunities and Challenges of Blockchain Technology

This paper will examine the challenges and propose viable solutions to problems…

Words: 2009Pages: 8

Windows Server Deployment Proposal

They are currently hiring to strengthen their various departments. In order for…

Words: 1482Pages: 6

Cloud Hosting Vendors

The cloud services are usually hosted in the service centers where they…

Words: 1103Pages: 5

Opportunities and Challenges of Cloud Computing

However, this paper shall only offer a theoretical approach to the subject…

Words: 1681Pages: 6

Essay on web security

Cyber identity fraud is the quickest developing crime in the world, happening…

Words: 3519Pages: 13

Collaboration Technologies and IT Infrastructure

In project development or an organization, they allow team members to discover,…

Words: 1204Pages: 5

Enhancing Creativity with Technology

With the help of new inventions, we’ve seen the scenery that was…

Words: 2950Pages: 11

Changing Face of Work in Australia

Retrieved from: https://heinonline. org/HOL/Page?handle=hein. journals/alterlj40&collection=journals&id=258&startid=258&endid=262 Rawling introduces the article by stating that…

Words: 1199Pages: 5

Database integrity controls

5 Conclusion………………………………………………………………………………. 6 DATABASE INTEGRITY CONTROLS Abstract Data integrity has been defined as the ability…

Words: 1256Pages: 5

Nursing informatics essay

The health information system has a purpose of managing several dimensions within…

Words: 1935Pages: 8

Electronic health records assignment

The goals of the EHR system are a provision of quality and…

Words: 2257Pages: 9

Effective use of technology in hiring process

Applications send through mail and postal address by job hunters are received…

Words: 971Pages: 4

Web content accessibility guidelines

The first principle is perceivable whose guidelines are; to provide alternatives for…

Words: 380Pages: 2

Iot devices research paper

According to a report released by the World Health Organization (WHO), there…

Words: 3293Pages: 13

Security vs privacy

The key differences are usually seen in application though one might miss…

Words: 1018Pages: 4

Nalysis of company it and management information systems of apple

The company faced a decline in sales thereafter as a consequence of…

Words: 1725Pages: 7