Javascript is disabled. Please enable it for better working experience.

Research Papers on Computer

High schools and universities require students to write research papers for almost all computer related subjects. Researchomatic, therefore, provides its consumers with one of the biggest consumer bases in the online library market with its research papers on computer and related fields to support and assist students in getting quality literature. Computer students from all around the world can access these research papers for inspiration.

Cloud Computing
Cloud Computing Cloud Computing Introduction Cloud computing is a term used in the Information Technology industry, which refers to providing services to clients rather than selling hardware or software to them. There is no single definition of cloud computing, and there is a vast difference in the opinions among many organizations and IT ...
Packet Sniffers
PACKET SNIFFERS Packet Sniffers [Name of the Institute] Packet Sniffers Introduction The network computers share communication channels. For these shared channels "travel" information desired by any computer connected to the network and can pass this information on a number N of other computers. Suppose that host A wants to send information to another host B. ...
Improving University Computer Network
Improving University Computer Network Improving University Computer Network Network concept A computer network is a group of computers connected together by a complex system of extra wiring and equipment or by wireless. With this connection, the computers that are part of the network can share different services like Internet connection, share ...
Game Programming
Game Programming Introduction The encoding of a video game is a complex, long and required many skills. It is therefore very likely that all aspects of creating a video game do not interest you. Programming a game consists of too many skills: 2D rendering / 3D, physics, artificial intelligence, networking, audio rendering, ...
Installing Voip Infrastructure On Existing Enterprise Network
Installing VOIP Infrastructure on Existing Enterprise Network By [Name of Instructor] Table of Contents Introduction3 Company5 Current Standing8 Reading Audit12 Infrastructure Upgrade (cables, codes, etc.)15 Resources Required16 Key Parameters19 Network Assessment19 Recommendations for Network Improvements22 Installing VOIP Infrastructure on Existing Enterprise Network Introduction Telephony has been a source of human interaction since the time it has been invented. But as with all the other things ...
Antivirus Tools
ANTIVIRUS TOOLS Antivirus Tools Antivirus Tools Cost per server It is very easy to buy antivirus, antispyware in around the world. Because most people don't have credit cards. So, they need to buy antivirus from local shop but most people don't know all available antivirus program price list. Their are many antivirus which ...
Installing Voip
INSTALLING VOIP Installing VOIP Infrastructure on Existing Enterprise Network Table of Contents Executive Summary3 The Company4 Resources Required4 Key Parameters5 Network Assessment6 Recommendations for Network Improvement7 References9 Executive Summary The purpose of this executive summary is to present an insight into the critical evaluation and explanation of the architecture, behavior and operation of voice over IP communications systems. In addition, the ...
Methods And Modelling
Methods and Modelling Methods and Modelling Object-oriented methods and the unified modeling language Object-oriented concepts are crucial in software analysis and design because they address fundamental issues of software modifiability, adaptation, and evolution. Object-oriented methods are based on the concepts of information hiding, classes, and inheritance. Information hiding can lead to systems that ...
Modern Transport Protocols 802.16 (Wimax)
MODERN TRANSPORT PROTOCOLS 802.16 (WIMAX) Modern Transport protocols 802.16 (WiMax) Modern Transport protocols 802.16 (WiMax) Introduction We already have several years talking about connections Wi-Fi, a technology wireless in its different versions (802.11a, b and g) can provide transfers from 11 to 54 Mbps, found in so-called Wi-Fi hotspots in hotels, airports, stations ...
Internet Security
INTERNET SECURITY Internet Security and Uses Internet Security and Uses Introduction The Internet has been used widely nowadays. It has been used in every field of life such as business, communication, education and so on. Therefore, the Internet becomes one of the most important things that people need in our life. Because of ...
71 - 80 of 128 Go To Page 3  4  5  6  7  8  9  10  11  12