StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Examples of Financial Crime Information Technology Coursework
17 pages (4394 words) , Download 2 , Coursework
Free
The study indicates that most governments apply for financial crime programs on the internet to target civil societies. Governments get supplies from western companies with technologies that enable them to run financial crime on the internet. The use of authentication and encryption helps user resist surveillance from financial crime, but the methods are not used for a positive reason.
Preview sample
Child Device Safety Information Technology Business Plan
6 pages (1752 words) , Download 3 , Business Plan
Free
With safe children, a country is sure of continuity. However, children can easily wander off from the routes they are used to and get lost. Such incidences are common after school, when on vacation, when in crowded places, and in amusement parks. When children wander off, the parents search for them with lots of fears.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Policy and Procedure Development in IT Information Technology Admission/Application Essay
4 pages (1259 words) , Download 2 , Admission/Application Essay
Free
For providing improved functionality for the organization, policies and procedures must be defined. They play a vital role in an organization’s smooth functioning. In order to implement policies and procedures, group discussions are required for constructing and implementing them in a real-world scenario.
Preview sample
Negative Issues of E-mails Information Technology Article
1 pages (371 words) , Download 2 , Article
Free
People who spend more time on email report a greater work overload, e.g. feeling emotionally drained, frustrated, and stressed from work (Barley, Meyerson, and Grodal, 2011). An email has a causal effect on human beings, just thinking about the large inbox directly causes stress, and it causes people to work long hours(checking emails at home.
Preview sample
The Smartphone Technology Information Technology Book Report/Review
5 pages (1510 words) , Download 6 , Book Report/Review
Free
The author states that smartphone technology is an advanced mobile phone technology that enables users to access advanced functionalities in addition to basic communication functionalities. The use of smartphones is rapidly increasing and with time this technology will replace the use of normal mobile phones.
Preview sample
Read and answers-1 Information Technology Coursework
1 pages (250 words) , Download 2 , Coursework
Free
It was created by Olympic Games, a joint United States and Israel code. Apart from affecting the industrial systems, Stuxnet also targets to weaken the military and civilian capabilities of developed countries such as USA. In the United
Preview sample
Managing Operation And Information Information Technology Report
7 pages (1750 words) , Download 2 , Report
Free
The purpose of this report is description of issues of Electronic Prescription System (EPS) developing for the National Health Service (NHS). The NHS is recognised as one of the best health services in the world by the World Health Organisation but its work need to be improved to cope with the demands of the 21st century. Recently there are two main challenges that NHS faced.
Preview sample
The Future of the Internet in The World Wide Web by Wendy Boswell Information Technology Book Report/Review
1 pages (250 words) , Download 2 , Book Report/Review
Free
This source – “The World Wide Web” or as it is more familiarly known as “www” is a good information portal where one could identify and refer to resources through global identifiers known as “Uniform Resource Identifiers” (URI) Though most often it is wrongly thought to be analogous to the whole Internet system, it is, in fact, an important subset of it.
Preview sample
Network Vulnerabilities: Information Technology Essay
2 pages (500 words) , Download 2 , Essay
Free
USB data travel drives are one of the main reasons of compromising the network security. Most of people make use of them to copy their sensitive information from one system to another and use it
Preview sample
Social Networking in Cyberspace: Values Portrayed In Popular Media Information Technology Research Proposal
1 pages (469 words) , Download 3 , Research Proposal
Free
The rise of social networking websites has been fraught with controversies as being attributed to begetting different ills as the destruction of privacy and paving the way to bigger crimes like frauds, child molestation, and pornography among others. The topic for the research and the claims are juxtaposed in a one-page paper.
Preview sample
Draw class diagram for the situation Information Technology Research Paper
2 pages (500 words) , Download 2 , Research Paper
Free
associations.(2005) In class diagrams, classes are represented by rectangles divided into three compartments with the first partition indicating the class name, the class attributes on the second partition and finally the class methods (operations) on the last partition.(Ambler,
Preview sample
Computer-Aided Software Engineering Information Technology Essay
9 pages (2681 words) , Download 2 , Essay
Free
In a big company, where strong business interactions among the people are essential for a flourishing delivery of projects that are of quality, the verified teaming approach of the visual paradigm ascertains that one is able to convey work with work which is of the best quality. This is without regard to the team members’ location and the team size.
Preview sample
The Impacts of Internet on Information Literacy and Library Skills Information Technology Annotated Bibliography
1 pages (250 words) , Download 3 , Annotated Bibliography
Free
The author of the essay casts light upon the impact of the internet. As it is stated in the text, the National Survey of Students Engagement developed a set of items which were used by the researchers making use of the hierarchical linear model and multiple regressions in their research.
Preview sample
Unintentional Threats to Information Security Information Technology Assignment
1 pages (291 words) , Download 2 , Assignment
Free
Emails from an unknown source should not be opened as they might be from some unscrupulous source and means of downloading malicious software like malware which could transfer whatever you type to cybercriminals. Some of the users’ actions are unintentional threats to information security while they are using the internet from their personal or professional computers.
Preview sample
The Reasons Why Organizations Outsource IT Information Technology Essay
17 pages (5153 words) , Download 3 , Essay
Free
IT outsourcing has become a common phenomenon in the current business environment. Aided by a desire for cost reductions and efficiency along with the availability of external data management services, IT outsourcing has become a more convenient alternative for many companies seeking to use their resources more efficiently.  
Preview sample
Creating WiFi Hot Spot Information Technology Lab Report
2 pages (500 words) , Download 2 , Lab Report
Free
A new wizard will open after clicking the link "Set up a new connection or network" that allows connecting virtual private networks, dial-up, setting up a new wireless connection, and creating a new ad hoc wireless network. We will select the last option i.e. create a new ad hoc wireless network as shown selected below.
Preview sample
Analysis of Email Usage Information Technology Essay
8 pages (2457 words) , Download 3 , Essay
Free
According to research, there were problems that arose due to the increased inflow of messages (Lantz, A. 1995). At organizations, messages that were sent by the clients or the customers were responding to according to their priority. There are messages that are responded to the same day while other emails are kept for a later response.
Preview sample
24hr. Fitness Heath Club Information Technology Research Proposal
11 pages (2941 words) , Download 3 , Research Proposal
Free
It has been deemed that the ThCh & IhDj (24/7 Fitness Center), the health and fitness Club is operating in Los Angeles, California, United States on 24/7 basis. The club operates to promote health and offer educational tips to customers of diverse age groups and generation.
Preview sample
Passing data with OSI modle Information Technology Essay
2 pages (500 words) , Download 2 , Essay
Free
n layers: Layer 7- application, Layer 6- presentation, Layer 5- session, Layer 4- transport, Layer 3- network, Layer 2- data link and Layer 1- physical are responsible for transmission of information from a software application in a computer system to another computer
Preview sample
Personally Identifiable Information Information Technology Essay
4 pages (1070 words) , Download 2 , Essay
Free
The use of digital technologies in processing information exposes users to the risk of losing vital personal information to fraudsters. While computers have revolutionized numerous aspects of human life including communication and economics, the same technology has equally presented numerous risks. Cybercrime refers to a unique type of criminal activity carried out through the internet.
Preview sample
Guide to Intrusion Detection and Prevention Systems Information Technology Literature review
16 pages (4294 words) , Download 3 , Literature review
Free
Network engineers, computer science professionals and other information security stakeholders are fighting tooth and nail to ascertain that they adopt the best set of tools for the implementation of secure mechanisms for the detection and prevention of intrusion in to an organization’s computer system or network. 
Preview sample
Internet in Emergency Operations Information Technology Research Paper
1 pages (539 words) , Download 2 , Research Paper
Free
Because of the ease and simplicity the internet has brought to Computer Emergency Response Teams (CERTs) organizations. Janet Computer Security Incident Response Team is responsible for combating internet attacks on universities. “Janet CSIRT is working with CERT-UK to share and enhance its experience in incident response, ” said the spokesperson of the organization” (Brewster, 2014).
Preview sample
The Booking and Ticketing Process of a Movie Theatre Information Technology Research Proposal
3 pages (939 words) , Download 4 , Research Proposal
Free
Proposal for the development of a simulation that is used to solve problems experienced in a local movie theatre. The proposal provides a case description of the movie theatre and the inherent problems in the situation and also provides objectives for the project. The simulation will be developed using the Flexim system.
Preview sample
Introduction and organizations as a soci-technical system Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
both results in the term socio-technical system first introduced by Eric Trist, Kem Bamforth and Fred Emery somewhere around 20th century as indicated by Susan Long (2013). This was a result of a confusion that aroused between the impact of technology and productivity on
Preview sample
The Technological Evolution Information Technology Assignment
2 pages (836 words) , Download 2 , Assignment
Free
This computer system provides past, present, and future information about relevant events taking place in and outside the organization.  Even though computer systems have mushroomed throughout modern businesses, organizations have become more susceptible than ever to poorly planned as well as an ill-advised selection.
Preview sample
Thought Pieces Information Technology Assignment
2 pages (500 words) , Download 2 , Assignment
Free
, (2013), the use of drones have always majorly been associated with the military, rescue services, monitoring the weather, monitoring traffic, and firefighting, among many others. Nowadays, big companies are considering employing drones in the delivery of products, in the
Preview sample
Computer Vision System for Image Quality Assessment Information Technology Research Proposal
6 pages (1815 words) , Download 3 , Research Proposal
Free
The entire process of capture and development of an image is a result of two steps. The first step is the capturing of image by a photographic process. The ideal photographic process is standardised with reference of a pinhole camera. The pinhole camera is a hardware apparatus, which has light reflected from the intended subject passing through the aperture and falling on the plane of image.
Preview sample
Looking for a Position in IT Field in a Dynamic Working Environment Information Technology Resume/CV
2 pages (500 words) , Download 2 , Resume/CV
Free
EDUCATION:Sept. 2008 – Dec 2009 University of Bradford, Bradford, UKSept 2005 – Sept 2006 Abu Dhabi Men’s College, Higher Colleges of Technology, Abu Dhabi, UAESept 2003 – June 2005 Abu Dhabi Men’s College, Higher Colleges of Technology, Abu Dhabi, UAE 2000   (Khalifa bin Zayed High School), Abu Dhabi
Preview sample
Wireless Technologies Proposal Information Technology Assignment
1 pages (250 words) , Download 3 , Assignment
Free
Generally, wireless technologies fall under the categories of Local Area Network (LAN), Wide Area Network (WAN), and Personal Area Network (PAN). For Party Plates the two wireless technologies that are highly recommended by our team
Preview sample
Just Because Internet Technology Is Available Doesnt Mean We Have a Right to It Information Technology Essay
2 pages (500 words) , Download 2 , Essay
Free
The internet has numerous informative materials that help in carrying out inquiries in any aspect of life like political, social, technological, and cultural. Online materials are easily accessed by people all over the world. The online materials may be educational or artistic in nature, and constitutes the original work of other people and as such should be respected.
Preview sample
Introduction to Java Programming Information Technology Research Paper
2 pages (500 words) , Download 11 , Research Paper
Free
The library lends books to the borrowers, at the same time catalogues the books besides making purchase of new books. The first row in the library class diagram contains the
Preview sample
Security project planning Information Technology Research Paper
2 pages (500 words) , Download 2 , Research Paper
Free
In this scenario, information security is process of developing and putting into practice security measures in an attempt to secure information and data. In addition, a business organization can also use a bull eye
Preview sample
Routing and Switching Selection Criteria Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
The examples of distance vector routing protocol are IGRP and RIP whereas that of Link State Routing Protocol are IS-IS and OSPF. There are several factors that limit the working
Preview sample
Corporate Information Strategy and Management Information Technology Essay
7 pages (1922 words) , Download 2 , Essay
Free
High structure-high technology projects: These are projects that are bigger and more complex, which combine the aspects of high volatility requirements and high technology needs, eventually emerging as highly risky projects. Such projects apply new technology that is poorly understood and with poorly defined specifications.
Preview sample
Letter of recommendation Information Technology Essay
1 pages (250 words) , Download 4 , Essay
Free
This project involved the development of an Investment Management System. For the ten months I worked with Mr. Alvi, we never had personal disagreements neither did any of the team members. He conducted himself
Preview sample
Disaster Recovery Plan Information Technology Assignment
4 pages (1050 words) , Download 4 , Assignment
Free
The main aim of the recovery plan is to address two major functional areas: the recovery and the restoration of organizational data and systems. A good disaster recovery plan starts with the formation of the disaster recovery team. The table below shows the key members of the disaster recovery team and their responsibilities.
Preview sample
IT425-1403A-01 : Systems Analysis, Design and Integration Information Technology Assignment
2 pages (500 words) , Download 3 , Assignment
Free
By including management of risks during the development of systems, institutions can balance the need for protecting important assets and
Preview sample
Project Teamworker Information Technology Assignment
6 pages (1691 words) , Download 2 , Assignment
Free
The project has the added potential of assisting students in communicating with their other members in their team; sharing files, and assisting tutors, supervisors & unit co-ordinator in checking the progress and providing oversight into their activities. Other teamwork-based units can implement this system to control the teamwork process.
Preview sample
UNIX Shells Performance Information Technology Essay
2 pages (623 words) , Download 3 , Essay
Free
This is especially undertaking varied tasks that entail numerous commands whereby without its speed their execution would not have been possible in the current state of technological know-how. To execute these tasks, it normally utilizes shells whose role encompasses acting as an interface amid the user and kernel after login by the user.
Preview sample
Storage of User Generated Data Using Distributed Backup Method Information Technology Essay
5 pages (1469 words) , Download 2 , Essay
Free
An IDC report has predicted that there will be growth in the volume of global data by a constant factor of 300 from 2005 to the year 2020 (Aluru & Simmhan, 2013). This growth translates to an increase from 130 exabytes to 40000 exabytes, meaning that data will double in size every year.
Preview sample
Cloud-based information services Information Technology Coursework
1 pages (250 words) , Download 2 , Coursework
Free
ud computing that relates to cost and capability is that it allows many people to work remotely simultaneously without the added cost of buying new hardware such as external drives. Before the advent of the cloud, employees have to carry with them bulky drives to be able to
Preview sample
Sexting as Enforcement of Child Pornography Information Technology Essay
6 pages (1887 words) , Download 2 , Essay
Free
Research shows that more than 75% of adolescents own cell phones with a third of them sending more than 3,000 text messages a month. As a result, new methods of electronic communication and social media such as  Facebook, Twitter, and texting have made parents, healthcare professionals, educators, and law enforcers concerned about the issue.
Preview sample
HCI Reading Journal - Journal #3 Information Technology Research Paper
2 pages (500 words) , Download 2 , Research Paper
Free
y the other day that I realized that I could effectively use the snipping tool in the Windows operating system to accurately copy images to be used in a document. This taught me a lot as a designer. First, as a designer I should understand the users of my interface; their needs
Preview sample
CIS206 U5 Research Assignment Information Technology Essay
1 pages (250 words) , Download 2 , Essay
Free
They also perform backups, documentation, auditing and troubleshooting of security features, and helping users (Malone 2011). The administrator accomplishes the
Preview sample
The Concert Office Database Server Management Information Technology Case Study
8 pages (2401 words) , Download 3 , Case Study
Free
The SSC system needs to be tested thoroughly so as to have surety that the system does react to the inputs and is consistent in all kinds of situations.  The importance of this is that the designers are able to guarantee the company that the system that they have designed for them is what ought to be.
Preview sample
The Investigation on Determinants of User Acceptance of Social Networking Service Information Technology Research Proposal
7 pages (2348 words) , Download 4 , Research Proposal
Free
The high rate of technological advance and the dominance of the internet have played a key role in transforming internet-based social networks. According to Özyer et al (2013), social media and other Social Network Services (SNS) have transformed how people communicate and interact with each other.
Preview sample
Firewall Security Measures Information Technology Essay
13 pages (3250 words) , Download 2 , Essay
Free
The author of the paper touches upon the security means within the information technology sphere. Hence, it is stated that one good decision for testing a firewall is by hiring a third party penetration tester, which likewise tests the whole network system for vulnerabilities. In addition, tt is best for a company to establish a contract with the penetration tester for data protection.
Preview sample
Web 2.0 and Beyond Information Technology Assignment
2 pages (500 words) , Download 3 , Assignment
Free
Web 2.0 technologies include wikis, blogs, social networking sites, video sharing sites. I have personally used social networking site like Facebook, which I found to be connection points with my friends. In
Preview sample
The Verity Requirements Information Technology Essay
1 pages (453 words) , Download 2 , Essay
Free
The management should be keen when determining various dependencies since not all requirements can contribute to the result that an organization desires. Evaluation Alignment with Business Case and Opportunity Cost. There are requirements that have value to stakeholders and are not desirable parts of a solution.
Preview sample
Logistics Software Application Information Technology Case Study
5 pages (1379 words) , Download 2 , Case Study
Free
At the southern gateway of China, the regional aviation hub of East Asia is beneficially located in Hong Kong. From Hong Kong, around half of the world’s population is living in these areas that have five hours of flying time from Hong Kong. In addition, (Liu, Lee, and Jiao 22) the in-flight cargo is also linked all over the world through Hong Kong.
Preview sample
5601 - 5650 results of 10273 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us