StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
How to Build Your Own Computer Information Technology Essay
7 pages (1894 words) , Download 4 , Essay
Free
Custom built computers are essential in determining the usage of a person and to provide user satisfaction. Hardware components that are used to build a PC must be selected according to use. Hardware components like processor, motherboard, memory, and hard disk drive are the most significant parts of a PC.
Preview sample
Failed IT Project Information Technology Research Paper
5 pages (1250 words) , Download 5 , Research Paper
Free
Project implementation faces many hurdles. For the ultimate success of a project, implementation should be systematic. The decisions taken at various stages of the project may aid in the success of the project or lead to the failure of the project.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The Stuxnet Virus and Its Components and the US Cyber Security Program Information Technology Research Paper
4 pages (1228 words) , Download 3 , Research Paper
Free
Although Iranian officials claimed that the virus caused minor damage to the operations of their nuclear power plant, the discovery of the Stuxnet worm raised several socio-political issues not only in the Iranian congress but also in various governments across the world, such as the U.S. government.
Preview sample
Recommendations for Peachtree Healthcare IT Challenges Information Technology Essay
3 pages (750 words) , Download 5 , Essay
Free
The CEO Max Berndt after so many meetings and discussions with his board of trustee, end up with two new IT infrastructure implementation options. He either has to select the safer mode or he has to go for riskier option which might give him outstanding results.
Preview sample
Network Security Fundamentals, Security Threats, and Issues Information Technology Case Study
4 pages (1234 words) , Download 4 , Case Study
Free
Security consists of tools, technologies, measures, and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet.
Preview sample
Mobile Computing and Social Network Information Technology Research Paper
5 pages (1346 words) , Download 2 , Research Paper
Free
Social networking sites like Facebook, Twitter, MySpace, and YouTubue can be used as a common platform for discussing medical matters. This interaction benefits patients to feel less isolated and hence improves mental health. Through this practice, participants would get a clear view of the symptoms, treatment, and prognosis of their disease.
Preview sample
Information Technology 1-4D Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
Mark Kennedy said, “All of the biggest technological inventions created by man – the airplane, the automobile, the computer – say a little about his intelligence, but speak volumes about his laziness.”
Preview sample
Info Analysis - Computer Information System Information Technology Article
3 pages (750 words) , Download 2 , Article
This is because unlike the other technologies like electricity and railroads, the use of information technology in an organization will depend on the processes that are to be automated. Business processes are different in various organizations. There could be a business process that is found I a certain organization that is unique from all the other organizations.
Preview sample
Impacts of internet on Culture Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
Impacts of internet on Culture. Internet in the modern world has played a key role in not only influencing communication, but also has greatly impacted upon the culture of people worldwide both positively and negatively. According to Shields (2009, p.1) the complex and highly interactive nature of communication in the 21st century because of globalization and the internet, cultural identities all over the world have been altered and transformed altogether.
Preview sample
Enterprise Resource Planning Solutions and Management Information Technology Report
8 pages (2250 words) , Download 2 , Report
Free
An illustration of this is for example when the enterprise enters a purchase order into the system, Sage ERP X3 can at that instance inform a particular buyer in line with the purchase order already entered in the system. Moreover, it can adequately inform persons in management positions any term contrary to the purchase order and thus the enterprise can stop the validation process.
Preview sample
Operation Information System Management Information Technology Report
11 pages (2935 words) , Download 4 , Report
Free
The transformation process model and system thinking concept have been scrutinized. Whereby, the transformation process model involves the interconnection of an interrelated components such as; inputs, transformation process, outputs, feedback, and control systems. On the contrary, system thinking involves taking into consideration not only internal factors affecting the company but also external factors.
Preview sample
SUCCESS FACTORS IN DATA WAREHOUSE PROJECTS Information Technology Essay
11 pages (2750 words) , Download 2 , Essay
Free
SUCCESS FACTORS IN DATA WAREHOUSE PROJECTS Success Factors in Data Warehouse Projects Author Author’s Affiliation Date Introduction A data warehouse is a large database containing reporting and query tools that stores recent and past data collected from various operational systems and merged for management reporting, analysis, and decision making.
Preview sample
Admissions Process at the University of Reading based in Microsoft Dynamics CRM approach Information Technology Coursework
7 pages (1750 words) , Download 2 , Coursework
Free
Admissions Process at the University of Reading based in Microsoft Dynamics CRM approach. As noted in the Browne report having independent platforms for every function or for every department can be cumbersome. It greatly inconveniences the users who at times have to serve in all schools or faculties.
Preview sample
Human Computer Interaction Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Furthermore, this was frustrating to my fellow group members given that we had spent a lot of time and commitment in order to complete the assignment. According to findings obtained from re-examination assumptions, the computer may have crashed due to infection by malicious viruses, which are designed to destroy valuable or bring a system to a halt (Ludwig, 1996).
Preview sample
Convergence of Physical and Information Security Information Technology Research Paper
11 pages (2866 words) , Download 4 , Research Paper
Free
This comes along with various conditions and pre requisites (Purpura 2011, 161); security concern is one of the most concerning one with regard to its usage and applicability. This factor becomes more prominent in cases when large scaled organizations are involved and cooperation is required with regard to the safe operations.
Preview sample
Keylogger scam. Computer crimes Information Technology Book Report/Review
3 pages (750 words) , Download 2 , Book Report/Review
Modern times of technology and virtual networking have given birth to another level of fraudulent crimes being committed across the globe. Cyber crimes have caused losses of millions of dollars to citizens, corporations and government of the United States.
Preview sample
Incorporating PMBOK into the Fiction Corp's Final Project Information Technology Case Study
15 pages (4045 words) , Download 2 , Case Study
Free
The knowledge areas are scope management – this refers to what work would be completed during the project lifecycle, and this also includes work that won’t be included as well. Scope management includes the initial planning process, the controlling and monitoring process and the closing process.
Preview sample
Auto Park Management System - part 2 Information Technology Assignment
3 pages (750 words) , Download 6 , Assignment
Free
Data design is refined to create specific representations for implementation. There are several elements of the data design given in the following. 1. Data Object: Data objects are identified and a relationship between the various data objects is established by using the entity relationship diagram.
Preview sample
SDLC methodologies Information Technology Assignment
3 pages (750 words) , Download 4 , Assignment
Application of JAD assists the customers along with developers to quickly conceive a pre-notion conception related to the scope, objective and conditions of any technological project. Rapid Application Development (RAD) denotes a software development methodology, which focuses on establishing latest application within a very short tenure.
Preview sample
Denial of Service Attacks (DoSs) Information Technology Essay
7 pages (1750 words) , Download 4 , Essay
Free
Denial of Service Attacks (DoSs) One of the most well-known web server security attacks is known as a buffer overflow. Basically, a buffer overflow takes place when a software application attempts to store more data in a static buffer than its capacity to store or manage.
Preview sample
Application and Technology Architectures Information Technology Assignment
3 pages (750 words) , Download 2 , Assignment
The company has been performing great but it has lost its effectiveness because of software implementation and new technology. Billing, inventory management procedures, and order entry are based on the computer assisted and manual technique. RPS gave way its previous operation ways and built new inception with application and technology plans (Fowler, 2003).
Preview sample
Computer Architecture Information Technology Essay
6 pages (1627 words) , Download 3 , Essay
Free
An operating system refers to the concept of hardware activities that allow the hardware to be controlled by computer programmers. It also involves s the management of resources shared among computer users. There are related explanations about different issues that influence the process of designing the current operating systems.
Preview sample
Public perception or opinion on GREEN IT practices in Organisations Information Technology Essay
3 pages (750 words) , Download 2 , Essay
This emphasizes on the usage of IT resources in environmental and efficient way. This whole process of Green computing encompasses manufacturing, designing, disposing and usage. With everything going digital and the world becoming a global village, computing usually consume lots of natural resources specifically from the raw materials that are used to make IT products, their power sources and eventual disposal (Adams, DiRienzo, Chutkan, and Farrall 2008).
Preview sample
Wireless Technologies Research Paper Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
Free
Wireless Technologies. Wireless technologies have become a part of our routine lives. From T.V. remote controllers to the cellular devices, computers and laptops everything is now operated through the integrated wireless technology (Comer, 2008). Fundamentally, it is based upon the radio waves and electromagnetism which supports the safe, fast and reliable data transference (Mathias, 2004).
Preview sample
Communication Security Information Technology Essay
3 pages (750 words) , Download 4 , Essay
In fact, there are numerous techniques of cryptography that are used for securing a wide variety of applications. At the present, cryptography is also used to secure communication networks. This paper outlines the applications of such techniques that can be used to secure communication networks.
Preview sample
Software Development Best Practices, Vision & Goals Statements Information Technology Essay
15 pages (3750 words) , Download 2 , Essay
Free
The study is governed by such objectives: 1)develop an online matching program that would substitute the existing matching program (software application) used to facilitate more than 8 million single men and women in the United Kingdom to find their best matches, 2) the quality, confidentiality, performance, usability, and security would be priority features of the online matching program.
Preview sample
Sustainable Information and Corporate Governance Information Technology Report
13 pages (3687 words) , Download 2 , Report
Free
It largely depends upon the user. However several risks are also associated with it. The study is about the implementation of social networking platform in a University of UK. The university chosen for this purpose is University of Bolton. The implementation will facilitate open and effective communication throughout the campus, but to get superior result, the university need to design a governance strategy.
Preview sample
Information Security: Policy, Processes, and Practices Information Technology Research Proposal
17 pages (4554 words) , Download 3 , Research Proposal
Free
As this is an information age, information is now in the form of digits that flows on an electronic computerized network. Organizations are dependent on these digital communication channels for transferring and exchanging classified information such as confidential information, mission-critical information, and information that is published for the people. 
Preview sample
Information Security of Amazon,com Information Technology Case Study
7 pages (1903 words) , Download 4 , Case Study
Free
The protection of availability, integrity, and privacy i.e. the process of protecting information is called Information Security. With the advancement in technology, the companies are storing information in the database much more than before. This information is highly confidential and needed to be protected with a better security system to prevent public viewing.
Preview sample
Sony DSC-T11/T110D Cybershot User Manual Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Free
The manual provided online is actually the manual used when availing the gadget itself which provides steps on how to use the camera. The manual is available in 19 languages, which makes it easy for a reader using any of those languages to understand the instructions using his own native language.
Preview sample
Short Critical Reflection Paper Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
The searches are more efficient as Google will automatically allows the user a price range of a certain product along with the closest store that offers that product.
Preview sample
Post Mortem Forensic Analysis Information Technology Research Paper
4 pages (1000 words) , Download 2 , Research Paper
Free
In the current advancements of the computing world, an attacker initiates prevalent attacks that are vivid and intense in order to compromise or destroy the target. Researchers have studied these attacks in order to provide a secure mechanism that may effectively detect and fight against these vivid attacks.
Preview sample
Website Criticism: A World Price Engine Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Website Criticism A World Price Engine! http://student.ohecampus.com/Projects/group39/index.html contains images done in blurred colors. It also has blur writings done in maroon color against their dull white background. This website belongs to “A World Price Engine,” deals with a large variety of products.
Preview sample
Hometown Deli Competitive Analysis Information Technology Case Study
4 pages (1068 words) , Download 3 , Case Study
Free
Generally, in any business, there is competition, and economic studies have confirmed that different firms profit differently based on the structure of the industry (Porter, 2008). Different firms in the industry usually sustain different levels of profitability from the way they handle the competition.
Preview sample
Computer Sciences and Information Technology Information Technology Essay
3 pages (750 words) , Download 3 , Essay
It is common for people to immediately think of implementation bugs when the issue of security vulnerability comes up. SDL can be viewed as to have paid too much attention on the bugs’ implementation and this can be explained by the vulnerability cases fixed by Microsoft experienced in history.
Preview sample
Information Technology Acts Paper Information Technology Essay
3 pages (750 words) , Download 3 , Essay
Free
However, the emergence of new technology has also created some of the ethical and security issues. In fact, in this new technology based era these issues have become more and more drastic. This paper presents an analysis of some of the well-known acts which are created and implemented to respond to these issues.
Preview sample
The Enterprise Resource Planning Systems Information Technology Essay
4 pages (1096 words) , Download 2 , Essay
Free
Allowing finance personnel to produce expense/ revenue reports rapidly. Permitting the manager to be familiar with business cash flow in real-time. Allocating sales information by means of the business management, permits for the formulation of improved business decisions foundational on an inclusive analysis of the business.
Preview sample
How the Communications Revolution is Changing Our Lives Information Technology Book Report/Review
5 pages (1464 words) , Download 3 , Book Report/Review
Free
The author states that with the introduction of the internet and wireless technology, the distance between people will be a click away, and even to the remotest of places on earth, communication will bring people together and closer than ever, as witnessed with the application in everyday lives and doing business.
Preview sample
The Transition to Modern and Efficient Software and Hardware Information Technology Essay
3 pages (911 words) , Download 3 , Essay
Free
ANDC is an established company (since 1998).  Our ground personnel is highly qualified and all of the developers possess MCSE or higher.  In answer to the privacy and security concerns, our people respect the company’s proprietary information and utmost care will be taken to ensure network security.     
Preview sample
Structure System Analysis and Design Method Information Technology Research Paper
7 pages (1911 words) , Download 2 , Research Paper
Free
In fact, for the government based software projects, the SSADM is utilized in UK. On the contrary, other than government institutions, the SSADM is commonly implemented by public sectors in the Europe. The SSADM is formerly specified as BS7738 in British Standards for the public regions.
Preview sample
Information System Development Life Cycle: Case of Apple Information Technology Case Study
7 pages (1750 words) , Download 4 , Case Study
Free
The Apple Company strengthened its financial base and diversified their operations to production of consumer electronic products and by 1980 it had dominated the market with a share of 50% and thousands of employees. As the company expanded its operations and increased workers, there was a problem of communication between newly recruited employees and the existing workers.
Preview sample
The Risks And Ramifications Of An Information Security Information Technology Case Study
5 pages (1250 words) , Download 3 , Case Study
Free
The information gathered is then used to identify and attempt to exploit the know or possible vulnerabilities within the system. Penetration test ensures that the new applications, security system, and network infrastructure are not vulnerable to security breaches that could enable unauthorized access to an organization’s valuable assets and resources.
Preview sample
Comparison between Fiber Optic Cable and Wireless Communication Information Technology Research Paper
6 pages (1896 words) , Download 3 , Research Paper
Free
Packet loss may occur during data transmission. However, in heavy traffic models, wireless queuing systems have been implemented to ensure that there is no packet loss (Agrawal 15). These losses are very minimal in fiber optic communication due to advancements incorporated in the fiber architecture.
Preview sample
The United States Army Corps of Engineers Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
The United States Army Corps of Engineers Name Institution U.S. Army Corps of Engineers The United States Army Corps of Engineers stands out as the single largest public engineering and construction management agency. It consists of more than 23 000 civilians and about 18 000 military trained personnel and headed by a Commanding General.
Preview sample
Proposal document Information Technology Dissertation
3 pages (750 words) , Download 4 , Dissertation
The third generation and fourth generation technologies being the front line technologies. VOIP is one of the gifts and part of the same digital journey that is equipped with similar features. The use of VOIP can be made more effective if it is incorporated in a particular field for the ease of work and benefits to the clients of that particular organization.
Preview sample
Cyber Security and Information Security Information Technology Assignment
4 pages (1119 words) , Download 3 , Assignment
Free
Phneah (2013) reports on how organizational risk coming from inside sources is currently evolving and insiders that pose a risk are working in different and more complex ways. For example, Phneah (2013) suggests that previously, risks from inside the company were previously more about financial shifts, but now corporate espionage is becoming a bigger risk.
Preview sample
SWOT Analysis of Yahoo Inc Information Technology Essay
10 pages (2513 words) , Download 3 , Essay
Free
Yahoo Inc has a grand of thirteen thousand and seven hundred employees in its store, a bench of over seven hundred million customers from across the globe, and the country’s fourth most popular and most visited website online. It stands in the category of Google.com and Youtube as the other two websites that attract more customers and attraction.
Preview sample
Graph theory Applications in Computer programming Information Technology Essay
3 pages (750 words) , Download 14 , Essay
Free
It is important to understand that manipulating and analyzing graphs and sub-graphs is nonnumeric which means that the programs involve strong ability make decisions.
Preview sample
Computer Security from the Attack Information Technology Case Study
5 pages (1324 words) , Download 2 , Case Study
Free
He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran Tromer, 2008).
Preview sample
Authentication Methods and Techniques Information Technology Research Paper
10 pages (2834 words) , Download 5 , Research Paper
Free
Introduction Authentication is one of the vital steps involved in providing access control (Tipton & Nozaki, 2011). Authentication is the process through which a system verifies whether a person is actually who he/she claims to be. Throughout the course of history, humans have been using some means of authentication in their day to day dealings.
Preview sample
9001 - 9050 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us