Are Cell Phones Dangerous
Are Cell Phones Dangerous Information Technology Research Paper
8 pages (2000 words) , Download 1 , Research Paper
Cell phones operate at low power, usually below 1 Watt, by transmitting and receiving electromagnetic radiation that lies in the Radiofrequency (RF) range of the electromagnetic spectrum. Scientific Research proves that Radiation which in scientific terms is called “ionization” can be moderately absorbed by the brain tissue.
Preview essay
Current and Future Use of Internet Technologies
Current and Future Use of Internet Technologies Information Technology Case Study
10 pages (2500 words) , Download 1 , Case Study
Both small and large enterprises have welcomed the internet as a real tool in business approaches and a major channel for business growth. This addition of information and communications technology (ICT) in trade has transformed trade between companies and as well as those with other companies and their customers. 
Preview essay
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
The Challenges of Decision Making in an Environment of High Speed and Complexity
The Challenges of Decision Making in an Environment of High Speed and Complexity Information Technology Term Paper
10 pages (2500 words) , Download 1 , Term Paper
As the paper highlights, the competitive advantages of the e-economy have encouraged several companies both - public and private - to move from the traditional system of doing business into the e-business. This part of the economy has exploited the availability of information technology to do business and is more important in decision-making.
Preview essay
The Effectiveness of Video Modelling
The Effectiveness of Video Modelling Information Technology Research Paper
12 pages (3000 words) , Download 1 , Research Paper
The proposal provides a brief literature review and evaluates the limitations of the current research. An overview of available studies in the context of video modeling use for children with autism is provided. The proposal includes a brief review of methodology and discusses possible limitations and bias. The list of references is provided.
Preview essay
Activity on Node Network Diagram
Activity on Node Network Diagram Information Technology Assignment
3 pages (750 words) , Download 1 , Assignment
It is quite essential to state that the project is estimated to be completed under budget by €29,167. A number of performance monitoring techniques have been employed to analyse the current status of the project. The techniques include the Quad Plot IV, Critical Ratio Control Chart and Earned Value Chart.
Preview essay
Problems of the Communication Technologies
Problems of the Communication Technologies Information Technology Term Paper
11 pages (2750 words) , Download 1 , Term Paper
The use of wireless communications systems is prone to possible mistakes that could cause a company much more than what they expect. These security risks include “break-ins, Wi-Fi sniffing snafus and incidents where Bluetooth sniper rifles were used to steal company secrets”. The first of the six is “unauthorized smartphones on wi-fi networks.”
Preview essay
User Satisfaction and Its Implications to CPOE Implementation: Community Hospitals in Westchester, New York
User Satisfaction and Its Implications to CPOE Implementation: Community Hospitals in Westchester, New York Information Technology Thesis Proposal
24 pages (6000 words) , Download 2 , Thesis Proposal
Two articles published in the Journal of the American Medical Association serve to illustrate this debate? The first article, “Role Of Computerized Physician Order Entry Systems In Facilitating Medication Errors” (Koppel et al., 2005) highlighted that CPOEs actually facilitated as many as 22 types of medical errors instead of enhancing patient safety.
Preview essay
Jacob Walsh - Lead Software Developer
Jacob Walsh - Lead Software Developer Information Technology Resume/CV
1 pages (250 words) , Download 1 , Resume/CV
Free
Possess major experience in solving complex UI/UX problems through debugging, user testing, and market analysis. Able to plan and carry out front-end innovation projects, design future concepts and facilitate idea generation and concept development. Thrive in a fast-paced, collaborative and dynamic environment. Hope that a stellar track record of work combined with analytical skills and detail-oriented approach to every task is suitable for [Company Name]
Preview essay
Software Engineering and Human Computer Interaction
Software Engineering and Human Computer Interaction Information Technology Dissertation
10 pages (2500 words) , Download 1 , Dissertation
The author states that human-computer interaction is the investigation on how end users interact with computers and/or gadgets, including problems that may take place and whether the use is simple and/or efficient. In Human-computer-interaction we want to reduce the number of issues related to the usability.
Preview essay
E-Government in Saudi Arabia
E-Government in Saudi Arabia Information Technology Research Paper
10 pages (2500 words) , Download 1 , Research Paper
Governments the world over are working on implementing E-Government. These efforts do not only focus on the area of digitalization in itself, but also on the reorganization of civic services based on new ICT. The term ICT is understood mainly as internet technologies and applications based on the internet but also comprise network technologies.
Preview essay
Security, Risk, and Compliance
Security, Risk, and Compliance Information Technology Research Paper
8 pages (2000 words) , Download 2 , Research Paper
The conclusion from this study states that network breaches are serious problems that can lead to a lot of headaches and heartaches not just for the organization itself, but for the people whose information is stored by the organization's network.  Their data can be compromised by any attack, and this can open up the organization to serious liability.
Preview essay
Book Listing Website using PHP, MySql and HTML
Book Listing Website using PHP, MySql and HTML Information Technology Literature review
8 pages (2000 words) , Download 2 , Literature review
According to the paper, human-computer interaction is a discipline concerned with the design, evaluation, and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. HCI in general terms can be inferred as a mix of a discipline belonging to the field of engineering.
Preview essay
Digital Telecommunications and Networks
Digital Telecommunications and Networks Information Technology Assignment
8 pages (2000 words) , Download 1 , Assignment
The report has focused on the advantages and disadvantages of the Static Routing and Dynamic Routing. Finally, the report has explained the criterions for selecting the specific routing protocol. Hubs are a network device which uses to connect one or more computers. It passes the data packet to the destination through broadcasting the packet.
Preview essay
Organisational Information System at Business Wear Ltd
Organisational Information System at Business Wear Ltd Information Technology Research Paper
17 pages (4250 words) , Download 2 , Research Paper
The conclusion from this paper states that the Internet and business information system has turned out to be the major part of every business and organization. The needs and implementations of business information technology in the business are growing more rapidly and offering better reorganization in the global business markets.
Preview essay
Computer Hacking
Computer Hacking Information Technology Dissertation
14 pages (3500 words) , Download 2 , Dissertation
The author states that a number of ill-informed individuals have related the term of ‘hacking’ with the practices of cybercrime that has resulted in misunderstandings regarding the domain of hacking that plays a vital role in maximizing security in the computing field, and thus, this paper will involve efforts to argue over the importance of hacking.
Preview essay
What Is Telecommunication
What Is Telecommunication Information Technology Article
7 pages (1750 words) , Download 1 , Article
As the study declares, the competition itself is the biggest challenge when seen from another perspective since there are so many service providers who already are settled in the market. It has come down to every penny spent by the end user. Every one of them is providing the same facilities and packages.
Preview essay
Network Architecture and Security Considerations in IISC
Network Architecture and Security Considerations in IISC Information Technology Term Paper
15 pages (3750 words) , Download 2 , Term Paper
The cost of designing network architecture and security consideration is normally done against the aforementioned factors that it aims to minimize. Identity Internet Solutions Company acknowledges that fact that its ability secure its IT from malicious networks is anchored on the strength of its network architecture and security considerations.
Preview essay
FAA and the Implementation of En Route Automation Modernization
FAA and the Implementation of En Route Automation Modernization Information Technology Research Paper
34 pages (8500 words) , Download 1 , Research Paper
The main purpose of this program is to processes the in-flight route changes and route request in a faster way. There have been and would continue to be noticeable implications and challenges in regards to this implementation. This paper focuses on the current FAA progress-to-date in the development and implementation of ERAM.
Preview essay
Digital Communication System
Digital Communication System Information Technology Assignment
10 pages (2500 words) , Download 1 , Assignment
According to the paper, a digital communication system essentially needs less power as compared with the analog system. It is faster and has several advantages in terms of providing a better signal to noise ratio over the same bandwidth. Along with the evolution of human species has evolved its comfort tools such as clothing, transportation.
Preview essay
Planning Skills in Graphic Design
Planning Skills in Graphic Design Information Technology Personal Statement
17 pages (4250 words) , Download 1 , Personal Statement
The author states that such planning allows him to enhance or change his projects where required. He is a hard and disciplined worker and believes in himself. He is also a team player and works well with others. For example last year, four of them freelancers worked on a website.
Preview essay
Analysis of IT Personnel Management
Analysis of IT Personnel Management Information Technology Research Paper
18 pages (4500 words) , Download 1 , Research Paper
Information technology in a broader sense is referred to as the use of hardware and software store, retrieve and manipulate information. Servers, operating systems, databases etc come under information technology. Information technology is being used by businesses since almost 5 decades and has evolved drastically with the passage of time.
Preview essay
Web 2.0 Security
Web 2.0 Security Information Technology Research Paper
7 pages (1750 words) , Download 1 , Research Paper
The author states that additionally, the websites which encompass the features of Web 2.0 offer its users the free option to work together or cooperate with each other in the community media discussion as designers of user-produced information material in a virtual society, as compared to those websites where clients are restricted.
Preview essay
Cyber Criminals and Other Data Security Dangers
Cyber Criminals and Other Data Security Dangers Information Technology Term Paper
16 pages (4000 words) , Download 2 , Term Paper
There are numerous cases where IT managers have failed to provide or define adequate security for an enterprise-wide infrastructure of an organization. Likewise, they emphasize more or external security threats rather than internal vulnerabilities. As per Gartner, 70% of security incident occur internally i.e. from the organization premises.
Preview essay
History of Phishing and Development
History of Phishing and Development Information Technology Research Paper
20 pages (5000 words) , Download 1 , Research Paper
The author states that Phishing is an emerging problem regarding online data security and information safety. There are several cases of the identity theft and online frauds using phishing and other hacking techniques, but this paper will concentrate mainly on the positive aspects of the phishing like that its use for the website verification.
Preview essay
Impact of Technology on Organizational Performance
Impact of Technology on Organizational Performance Information Technology Research Proposal
12 pages (3000 words) , Download 2 , Research Proposal
The paper will incorporate all core as well as enabling technologies and will evaluate them from the perspectives of organizational structure, behavior, and relationships. This will also take into account the diverse functional roles within a typical organization ranging from finance, technology, human resources to customer satisfaction.
Preview essay
Requirements and Software Systems for Different Levels of Management
Requirements and Software Systems for Different Levels of Management Information Technology Assignment
7 pages (1750 words) , Download 1 , Assignment
It is evidently clear from the discussion that every business unit in an organization has their own first line managers, who are responsible for managing the workforce.  These managers are not exposed to a lot of information but nevertheless have to use some software systems in the extremely automated work environments.
Preview essay
IPhone - Mobile Phone, iPod, and Internet Device
IPhone - Mobile Phone, iPod, and Internet Device Information Technology Assignment
11 pages (2750 words) , Download 1 , Assignment
Apple is known the seller of high-end computer products such as Macintosh computers, iPod, the new iPad and the best- selling iPhone. The company made a big difference by introducing the PC in the electronics industry at the start of the 20th century. It first introduced the line of Macintosh in 1984 which is a well- known computer model.
Preview essay
Websites of Three Airlines Companies
Websites of Three Airlines Companies Information Technology Assignment
8 pages (2000 words) , Download 2 , Assignment
This paper will review the websites of three airlines companies in relation to the way they managed their information with their web portals. By comparing the websites of Emirates Airways, Qatar Airways, and Singapore Airlines, this paper will discuss information managing practices employed by these companies with the help of their websites.
Preview essay
Private Internet Usage in the Workplace and Privacy
Private Internet Usage in the Workplace and Privacy Information Technology Research Paper
16 pages (4000 words) , Download 1 , Research Paper
The author states that organizations have found it necessary to regulate internet usage in the workplace, especially with the emergence of many social networking sites. Telstra is one such organization that formulated an organizational policy aimed at enhancing best practice while engaging in social networking.
Preview essay
The Impact of Computer-Mediated Communication
The Impact of Computer-Mediated Communication Information Technology Research Paper
20 pages (5000 words) , Download 1 , Research Paper
The author states that changes are taking place in every aspect of our life because of the immense improvements in technology and scientific advancements. Technological development has attained an all-time peak at present and it is developing further and further and we cannot even imagine how it is going to shape the future of the world.
Preview essay
Virus Detection Software
Virus Detection Software Information Technology Research Paper
12 pages (3000 words) , Download 1 , Research Paper
In definition, viruses refer to specific programs that people deliberately make, to get in the way of system documentation and functionality, therefore, doing away with important information stored in the system for different uses. Virus detection software plays a critical role in enhancing the safety of computer systems.
Preview essay
Electronic Medical Records
Electronic Medical Records Information Technology Term Paper
12 pages (3000 words) , Download 1 , Term Paper
The particular brand to be studied in the paper is the so-called Epic Electronic Health Records. That particular technology integrates various functionalities into one useable tool that any healthcare practitioners can use with ease. They do not need to worry about the ways on how to use it because it comes with instructions 
Preview essay
Development, Applications, and Future Trends of Telematics Systems
Development, Applications, and Future Trends of Telematics Systems Information Technology Assignment
18 pages (4500 words) , Download 1 , Assignment
The effective use of the right system can help in significant improvements in the fleet security, productivity, and efficiency; this can help to reduce fleet mileage, operational costs and the fuel consumption. The improved efficiency can lead to an increase in profitability. The modern telematics is more complex and sophisticated.
Preview essay
Client-Server Communications Technology
Client-Server Communications Technology Information Technology Research Paper
7 pages (1750 words) , Download 1 , Research Paper
With the emergence of technology we need more data communication and data transfer to survive in the fast technology age. For this purpose we need a network that can deliver better, fast and secure data transfer. The main aim of this research is to analyze the connection and connectionless client-server structure and communication protocols.
Preview essay
Active Directory - a Contemporary Network Management Techniques
Active Directory - a Contemporary Network Management Techniques Information Technology Research Paper
5 pages (1250 words) , Download 1 , Research Paper
Active Directory employing a similar database, for the exercise of main MS Windows settings, Active Directory as well permits network administrators to allocate deploy software, policies, as well as implement important updates to an association. AD supplies data and information as well as settings in a fundamental database.
Preview essay
Abu-Dhabi City Using GIS Techniques
Abu-Dhabi City Using GIS Techniques Information Technology Essay
8 pages (2000 words) , Download 1 , Essay
The main purpose of this paper is to focus on how the GIS technology can help in crime analysis and thereby fighting crime in Abu Dhabi by the police. The analysis involves the use of satellite images and other valuable data from independent and UAE based sources to perform hotspot analysis to identify trouble spots.
Preview essay
Future of Quantum Computing
Future of Quantum Computing Information Technology Research Paper
11 pages (2750 words) , Download 1 , Research Paper
Up-to-date QC based technicalities facilitates a system built on these ideologies, a supposed quantum computer system, to carry out jobs that are at present considered not possible to carry out resourcefully on a usual computer, in the same way as infringement present encryption principles (Yahoo News, 2009).
Preview essay
Managing Performance in Turbulent Times
Managing Performance in Turbulent Times Information Technology Research Paper
4 pages (1000 words) , Download 1 , Research Paper
In 1998, when Google entered the markets, it was hardly known by anyone. At that time, popular brands like Yahoo, Excite, Hotmail and Netscape dominated the market. These companies had the reputation of being the pioneers in the internet and e-business. However, in today's world, Google has beaten all these brands.
Preview essay
Direct Digital Synthesis
Direct Digital Synthesis Information Technology Research Paper
6 pages (1500 words) , Download 1 , Research Paper
The paper aims to investigate what the components of a DDS system are and the interactions of those components; the different component parameters that engineers can select and tweak; and how those parameters impact the overall performance of the DDS systems in general. The name suggests the nature of its function.
Preview essay
Information Systems and Processing Controls
Information Systems and Processing Controls Information Technology Assignment
6 pages (1500 words) , Download 1 , Assignment
Computer-assisted audits have increased speed because manually most time is spent on routine calculations. On the contrary, a computer program quickly runs through the financial statements and compiles the data and figures. It also reduces the cost of hiring as the cost of obtaining a computer auditing software is cheaper compared to hiring of an auditor. 
Preview essay
Managing Information and Technology in Samsung Electronics
Managing Information and Technology in Samsung Electronics Information Technology Case Study
12 pages (3000 words) , Download 1 , Case Study
The author states that information systems strategic role includes utilization of information technology in developing services, products, and capabilities which offer a company considerable advantage beyond the competitive forces the company faces within the international marketplace.
Preview essay
Internet Censorship in the United Arab Emirates
Internet Censorship in the United Arab Emirates Information Technology Essay
5 pages (1250 words) , Download 1 , Essay
The conclusion states that internet censorship within the UAE results to very illicit and diverse opinions; however from the information about internet censorship in the UAE, internet censorship does protect and preserve their cultural values. This is because the concept of internet censorship protects the Islam Society from pollution from some of the bad contents from the internet.
Preview essay
Effectiveness of Security Technology in Reducing Security Threats
Effectiveness of Security Technology in Reducing Security Threats Information Technology Research Paper
10 pages (2500 words) , Download 1 , Research Paper
Chapter one presents the problem statement, research objectives, research questions and significance of the study. Chapter two reviews the available literature on security issues. Chapter three presents the methodology and time feasibility. Chapter four deals with the discussions and findings of the research based on the data collected.
Preview essay
Digital Subscriber Line (DSL)
Digital Subscriber Line (DSL) Information Technology Term Paper
8 pages (2000 words) , Download 1 , Term Paper
The author states that despite being termed as a new technology, the history of DSL dates back to 1800 when the first telephone was invented by Alexander Graham Bell. This invention was the first stage in the evolution process of DSL technology. However, the main theory behind DSL came to life in 1980.
Preview essay
Concept and Significance of SSCM
Concept and Significance of SSCM Information Technology Book Report/Review
10 pages (2500 words) , Download 1 , Book Report/Review
The critical discussion would aim at generating an effective understanding of SSCM while evaluating different challenges faced in its implementation. It would also render effective recommendations relating to the problems faced. SSCM aims to focus on integrating, coordinating, organizing and also controlling the supply chain activities.
Preview essay
An Evaluation of Two RAD University Tutorials
An Evaluation of Two RAD University Tutorials Information Technology Research Paper
3 pages (750 words) , Download 1 , Research Paper
The tutorial is a short text layout with diagrams and illustrations of the ATM concepts. It provides a good technical explanation of what each ATM network part does, its purpose and overall functions. The topic is a detailed discussion of ATM network technology and usage of technical networking terminologies related to the cell-relay technology.
Preview essay
Malware Hiding and/or Spreading on Mobile Devices
Malware Hiding and/or Spreading on Mobile Devices Information Technology Book Report/Review
4 pages (1000 words) , Download 1 , Book Report/Review
Use of mobile devices has risen rapidly in the previous years. Many people across the world have thus turned to the devices to run a number of tasks such as playing games, banking transactions and getting the direction to various places. Some organizations and even individuals store some very confidential data n the mobile devices
Preview essay
The Internet In Everyday Life
The Internet In Everyday Life Information Technology Research Paper
8 pages (2000 words) , Download 1 , Research Paper
The quality of cyberspace studies has also improved. He mentioned that internet has helped in the widespread of information. It has become the most important issue in everyday’s life. Many gossips and fantasy are associated with the development of communication through the internet. The internet has a vital role in advancing the society.
Preview essay
Operating System Windows XP
Operating System Windows XP Information Technology Research Paper
4 pages (1000 words) , Download 1 , Research Paper
The author states that a good example of a program is Microsoft Excel. When you get Microsoft XP Home Edition you also get many other programs that come with it, for instance, go to start and then all programs and then go to Microsoft Office. There is Microsoft Office Excel, Microsoft Office Access, Microsoft Office Word, and Microsoft Office Publisher.
Preview essay
Automatic Control and Systems Engineering
Automatic Control and Systems Engineering Information Technology Literature review
19 pages (4750 words) , Download 1 , Literature review
This document proposes a new move toward the automatic carrying out of commerce processes by means of Event-Condition-Action (ECA) system that can be automatically triggered by a lively database. First of all, we suggest the notion of blocks that can categorize process flows into more than a few patterns.
Preview essay
451 - 500 results of 6974 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you samples on subject Information Technology for FREE!

Contact Us