StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Role of the Command Line Interface in Modern Computing Operating Systems Information Technology Literature review
11 pages (3047 words) , Download 0 , Literature review
Free
Despite many terms used by scholars such as ‘text interface’ and ‘command screen,’ among other terms to describe the command-line interface (CLI), it is a user interface that involves typing of commands in a given computer operating system. It differs rather distinctively from the modern use of the mouse in performing commands.
Preview sample
Application of Social Technology in Organizations Information Technology Case Study
8 pages (2482 words) , Download 0 , Case Study
Free
The author of the paper evaluates the concept of assemblages’ development and application of social technology in organizations. In order to offer a practical evaluation and illustration of the concept application, the essay adopts the Cisco case study a global leader in IT products and services consultancy.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Internet Enhanced Concern on Data Mining, Internet Cookies, and Search Engines Information Technology Essay
9 pages (2574 words) , Download 1 , Essay
Free
The use of the internet has increased with connections getting cheaper. The rise of internet use in daily life has led to privacy concerns (Smith, Dinev & Xu, 2011). The privacy debate that has been raised by internet users is mostly based on the two issues known as internet-specific and internet-enhanced concerns.
Preview sample
How the Internet Is Changing the Way We Think Today and in the Future Information Technology Essay
9 pages (2622 words) , Download 0 , Essay
Free
It is no doubt that access to information is a critical process in day-to-day activities (Greenemeier 2013, p. 84). The internet has managed to penetrate every aspect of human activities that the world would stop at a standstill if the internet disappeared at any one time. Everything has been made easier through the sharing, speed, and amount of ideas or information found on the internet.
Preview sample
How is the Internet Changing the Way We Think Information Technology Case Study
8 pages (2350 words) , Download 0 , Case Study
Free
Sometimes this has taken place gradually, but often communication has made great leaps, as when writing emerged in the Middle East more than 3000 years B.C.E. Inventions and discoveries brought about revolutions in the way society interacted or lifted the level of communication to another height to be explored.
Preview sample
Using Multimedia Metadata to Improve Network Efficiency Information Technology Research Proposal
10 pages (2692 words) , Download 0 , Research Proposal
Free
The availability of huge information online requires special computing for quality information extraction. Accessing these network resources is quite challenging therefore the need metadata. Metadata will help to improve network efficiency by ensuring the retrieved information meets the objective of the user of the internet.
Preview sample
Regulation of Internet Content in a Digital World Information Technology Assignment
14 pages (3948 words) , Download 0 , Assignment
Free
Connected machines are fast becoming the eyes and ears of the enterprise. By adding devices and networking tools to the products they sell and the apparatus they use, corporate businesses are finding new methods to get powerful visions for themselves and use new forms of data. IT management is the basic requirement of a business to keep the data safe and handy.
Preview sample
The Use of Communication Technologies Information Technology Research Proposal
8 pages (2583 words) , Download 0 , Research Proposal
Free
The use of communication technologies in paying one’s roles at the workplace is because of the knowledge economy, which makes professionals not much concerned about the place of work, but the delivery of the results. This essay seeks to explore the communication technologies and workplace intimacies assemblage.
Preview sample
Information Security in Global Communication Enterprises Information Technology Case Study
12 pages (3999 words) , Download 1 , Case Study
Free
The background information provided the nature of the risks that included loss, theft, and hacking and malware attack. Further description provided the possible solutions that GCE’s IT department needed to implement to overcome the risks. They included encryption, password authentication, antimalware installation, and remote data wiping.
Preview sample
Future of Operating System Security Information Technology Essay
8 pages (2303 words) , Download 1 , Essay
Free
Without a doubt security of OS in the future will be imperative, and even though malicious attacks will increase, business organizations will espouse advanced measures to counter such attacks. Furthermore, privacy issues will increase given that the use of the internet is expected to increase; therefore, the number of computer systems will heighten thus increasing the privacy threats.
Preview sample
Security in Wireless Sensor Networks Information Technology Lab Report
11 pages (3072 words) , Download 0 , Lab Report
Free
Unreliable communication (for example, unreliable transfer, conflicts, and latency) has been identified as the first security concern. The second security issue is the unattended operation (such as exposure to physical attacks, remote management, and no central management points) and the attack on the sensor security such as the Monitor and Eavesdropping, Traffic Analysis, and camouflage.
Preview sample
Web 2,0 Technologies and Blogging Information Technology Essay
6 pages (1659 words) , Download 0 , Essay
Free
Web-sharing platforms like blogs, social networks, photo and video sharing platforms, and so forth (Anderson, 2007). Drawing from the properties of Web 2.0 that provide blogs with their sharing platform, blogs encourage the active involvement of visitors by allowing comments on content and replies to other visitors. This paper is an in-depth analysis of blogs as Web 2.0 applications.
Preview sample
Ethical and Legal Issues Surrounding Peer-to-Peer File Sharing Information Technology Essay
8 pages (2145 words) , Download 1 , Essay
Free
In the past few decades, there have emerged a wide variety of communication mechanisms that are used to communicate between various devices. These mechanisms are used for different purposes in different scenarios. In this scenario, Peer-to-Peer (P2P) is a popular communication mechanism that is widely used for sharing different kinds of files between computers.
Preview sample
Making Sense of Internet Censorship Information Technology Essay
8 pages (2391 words) , Download 0 , Essay
Free
It is usually carried out by the government due to various reasons which include moral reasons, religion, business, societal norms, intimidation, and fear of legal consequences. Censorship has always led to criticism as well as praises from different members of society. This is considering the control of some of the contents is important as it has a negative impact on society.
Preview sample
Cloud Computing in Australian E-Healthcare System Information Technology Case Study
18 pages (4615 words) , Download 2 , Case Study
Free
Cloud computing is a familiar phenomenon in the recent past as far as modern computing is concerned. The pace at which the utility is adopted especially among private enterprises is high, and this can be attributed to the intense competition in providing the best services to the consumers.
Preview sample
The Digital Economy Discussion Paper Information Technology Research Proposal
8 pages (2280 words) , Download 2 , Research Proposal
Free
In digital economy, innovation and adaptation are the key features of competitive advantage. Digital services facilitate higher level of collaborative working and the technologies provide new opportunities to meet customer needs and all these are basis for efficacies (Pagani, 2013). The use of search engines in locating information is a fundamental aspect in digital economy. 
Preview sample
Analysis Wireless Technologies Information Technology Assignment
6 pages (1580 words) , Download 0 , Assignment
Free
Since the advent of Information and Communication Technology (I.C.T), various innovations have been developed with an aim of making the work of human beings become easier. Among the technological innovations that have been invented include the use of Wi-Fi, Bluetooth, Zigbee, RFID, and other wireless technological innovations.
Preview sample
The Role That Connectivity through Social Media Platform Information Technology Literature review
8 pages (2408 words) , Download 0 , Literature review
Free
Social network sites such as Facebook, Twitter, YouTube and Flickr among others are contemporary trends of communication that are shaping the face of communication in the 21st century. These emergent phenomena in communication technology have so far attracted a huge number of users globally.
Preview sample
Characteristics of Information Privacy Information Technology Literature review
9 pages (2638 words) , Download 0 , Literature review
Free
Internet social networks and email accounts have been subjected to hacking, therefore, violating the privacy of many individuals. The speed and ease of capturing and storing information have increased dramatically; this has greatly magnified and distorted existing privacy problems. Stalking has taken a new dimension, and people have to be afraid of cyberstalkers who can be anywhere in the world.
Preview sample
Implications of Computer Technology Information Technology Literature review
6 pages (1852 words) , Download 0 , Literature review
Free
Computer technology has become integral to a modern lifestyle at work, in recreation and social networking; however, this convenience can be problematic for some individuals and may lead ultimately to addiction. Therefore, personal lifestyles have undergone radical transformation under the influence of this technology but not for the better.
Preview sample
Green Information Revolution Information Technology Essay
9 pages (2423 words) , Download 0 , Essay
Free
The benefits of computers have made many organizations and government institutions implement information technology in their processes. Many computer systems and peripheral devices have been introduced in organizations and government institutions for effective and efficient service delivery. Internet introduction has made many people own devices.
Preview sample
The Structure and Operation of Public Sphere Relative to Advance in Communication Technologies Information Technology Literature review
8 pages (2347 words) , Download 0 , Literature review
Free
The idea that the internet is a platform where individuals can use as a democratic communicative space, is well known to promote a healthy public sphere especially with the introduction of social networking platforms. The popularity of social networking sites is due to advance in technology that resulted from highly developed ICT which is mediated by computers and phones.
Preview sample
Comparison and Contrast between a Security Threat Assessment and a Security Risk Assessment Information Technology Literature review
11 pages (3611 words) , Download 0 , Literature review
Free
For many people, risk and threat are two similar concepts and are used interchangeably.  This is not a correct assumption, and in the security industry, risk and threat do not mean the same thing; so what is the difference between risk and threat?  Even among professionals, the risk is mistaken for threat and vice versa. Nonetheless, these two concepts cannot be mistaken for one another.
Preview sample
Importance of Security in Cyberspace Information Technology Essay
8 pages (2183 words) , Download 1 , Essay
Free
Large companies and individual users have both suffered the negative impacts that have been created by the continued use of IT devices and methodologies. In the current society, the main challenge in cyberspace or the internet platform is that of security risks. There are limitations and drawbacks that have resulted from cyber-attacks both to individuals and also to organizations.
Preview sample
Introduction to Enterprise Systems Information Technology Assignment
5 pages (1566 words) , Download 0 , Assignment
Free
The paper "Introduction to Enterprise Systems" is a  remarkable example of an assignment on information technology. An enterprise system is defined as large scale application software that is used by businesses to plan, run and organize operations. They mainly serve corporations and have information at a central point that is accessed and used many users simultaneously.
Preview sample
How Information Technology can be Applied to Electrical Engineering Information Technology Report
13 pages (3705 words) , Download 1 , Report
Free
Decision making is one of the complex activities an individual engages in. There are several stages involved in the decision-making paradigm. Analyzing the problem is the first stage. The origin of the constraint has to be identified. The second is the consideration of various alternatives at your disposal. The final stage will be selecting the best choice from all of the available alternatives provided.
Preview sample
Information Security Concept Map Information Technology Term Paper
7 pages (2078 words) , Download 2 , Term Paper
Free
The primary function of information security is to prevent unauthorized access, disclosure, or modification of information in order to maintain reliable access and use.Development in the telecommunication sector with the rising of mobile technologies like tablets, laptops, iPads, and netbooks which have recording and internet connectivity features brings in new challenges to cyberspace security.
Preview sample
Machine To Machine Communication Information Technology Case Study
10 pages (2660 words) , Download 0 , Case Study
Free
Communication in machine-to-machine devices or systems is broadly concerned with information and networking technologies. Machine to machine communication is an integral part of internet communication and comes about with several advantages. This nature of communication mostly used in control as well as for monitoring purposes.
Preview sample
The Difference Between Information, Evidence, and Intelligence Information Technology Essay
11 pages (3551 words) , Download 1 , Essay
Free
Premium+
In spite of the long history of discussions and researches that have characterized the field of law enforcement, a standard distinct definition for intelligence and information is yet to be arrived at. An underlying implication of this is the belief that intelligence, information, and evidence mean the same thing, and that they may be roughly described rather than adequately defined.
Preview sample
IT in Ethical Discourse Information Technology Essay
5 pages (1590 words) , Download 0 , Essay
Free
The global environment today where the Internet, as well as its related services, are immediate and accessible, where businesses and people can communicate between themselves instantly, and were more often than not machines are interconnected with one another. The appropriate place of technology in society is beyond an aspect of art than science (Apel, 2001).
Preview sample
Magic Quadrant for Data Warehouse Database Management Systems Information Technology Assignment
9 pages (2644 words) , Download 1 , Assignment
Free
The development of the BigTable solution by Google was so that the storage management system could be relatively simple, and provide access to large data quantities distributed between thousands of computers. BigTable is physically similar to a B+-tree index-organized table having leaf and branch nodes that are disturbed across several machines. 
Preview sample
Development of a Predictive Model by Making Use of a Data from Canberra Weather Measurements Information Technology Coursework
10 pages (1827 words) , Download 0 , Coursework
Free
The overall error rate for Decision Tree was 37.10% while the error for Random Forest was 21.31% which meant that Random Forest was more accurate in predicting Rain Tomorrow. A ROC curve, which contrasts the false positive rate to the true positive rate, indicated that Random Forest had a bigger range than Decision Tree which meant more accuracy.
Preview sample
Issues in Cyber Forensics Affecting ICT Information Technology Literature review
14 pages (3983 words) , Download 1 , Literature review
Free
The digital evidence presented in the court of law must by no means be tailored and the persons tasked with the handling of the digital evidence must be knowledgeable and experienced. Furthermore, documentation of every procedure utilized to the presented digital evidence has to be preserved and the evidence must be available to the third party.
Preview sample
Cloud Computing of the Design and Purchase of IT Hardware Information Technology Report
10 pages (3593 words) , Download 0 , Report
Free
The information technology industry has had numerous transformations over the past years. Among the developments has been the need to transform computing and use it as a utility. This has made software an attractive service and has shaped the design and purchase of IT hardware (Armbrust et al, 2010).
Preview sample
Has Communication Technology Made People Less Effective Communicators Information Technology Essay
5 pages (1583 words) , Download 0 , Essay
Free
The essay will briefly outline the benefits and risks posed by communication technologies on communication. In light of a working definition of what constitutes effective communication, the essay will evaluate the claim that communication technology has made people less effective communicators. Most business communication is now done via e-mails, texts, instant messaging, intranets, blogs, websites, and other technology-enabled media.
Preview sample
Security Challenge in Cloud Computing Information Technology Literature review
12 pages (3254 words) , Download 1 , Literature review
Free
Cloud computing is defined as an IT service set that is offered to a customer through a network on a hired basis as well as with the capacity to scale down or up the requirements of their services. Normally cloud computing services are distributed by a third-party source that possesses the infrastructure.
Preview sample
Project Scope Statement of Web Project Information Technology Report
6 pages (1834 words) , Download 0 , Report
Free
The website has to be designed with the rationale of being credible so that it can attract more users. A credible website in this case gives a good first impression and is attractive, the navigation is easy and intuitive, and it has no generic photos. The website should also have press mentions and customer testimonials, must feature a constant flow of reviews by customers.
Preview sample
E-Banking and E-Commerce Security Issues and Solutions Information Technology Coursework
11 pages (3039 words) , Download 1 , Coursework
Free
With all the kinds of online transactions, there are security issues that come along with it. The use of online transactions in the majority of people across the world is determined by the security and privacy of user’s personal data, which include credit card numbers, virus attacks, and fear of identity theft among others.
Preview sample
Information Security Information Technology Report
7 pages (1982 words) , Download 0 , Report
Free
The information is also transmitted via networks to other electronic devices Personal information security is vital to ensure the privacy of secret information and document. Organizational information requires a lot of protection from competitors and hackers. This helps to avoid losses and damage to organizational reputation.
Preview sample
Cloud Computing Security Information Technology Coursework
15 pages (4272 words) , Download 2 , Coursework
Free
The majority of the companies that offer online related services have adapted to using more and more energy for their data centers. Cloud computing services development has speeded up the way in which computational services are sourced by organizations and corporations for better delivery of services.
Preview sample
Physical Security Systems Information Technology Coursework
12 pages (3776 words) , Download 1 , Coursework
Free
Physical security is an integrated set of physical measures intended to protect people, deter unauthorized access to the property, and defend assets against theft, damage, or sabotage. Physical security systems serve to mitigate identified risks by linking layered security elements to offer countermeasure.
Preview sample
Outlines of Some of Domestication Key Themes Information Technology Term Paper
11 pages (3163 words) , Download 0 , Term Paper
Free
The process of consumption originally derived more general studies but the current framework provides a constructive way of assembling a range of perspectives and assumptions of the relationships with it. Nonetheless, the concept was initially applied in British studies to offer a framework for ICT’s thinking in the home and not the portable ones.
Preview sample
Benefits and Requirements for VLANs within the Network Information Technology Term Paper
10 pages (2500 words) , Download 0 , Term Paper
Free
Switches are normally used in creating VLANs because they are able to create the same network divided into different domains but do not experience the latency issues experienced by a router used in the same capacity. VLAN is mainly implemented with consideration of traffic patterns and the need to maintain effective communication without feeling the effect of distances.
Preview sample
Enterprise Information Systems: Three Australian Medical Health Websites Information Technology Case Study
16 pages (4454 words) , Download 0 , Case Study
Free
Similarly, the report looks at two user groups and their specific needs on choosing a health fund website based on health fund products from BUPA. Likewise, the report looks at the process of doing a search on Medibank, NIB members ’ joining process, and the BUPA searching process from the systems perspective.
Preview sample
Memory Management - Virtual Memory with Paging and Segmentation Information Technology Literature review
12 pages (3734 words) , Download 1 , Literature review
Free
Dhamdhere affirms that the memory that is nonphysical, commonly regarded as virtual memory, is in fact a hard disk’s portion that is installed to emulate the RAM of the computer. The virtual memory (VM) notion originates from a period when physical memory, was exceedingly costly. Furthermore, the hard disk portion that serves as physical memory is regarded as a page file.
Preview sample
Information Communication Technology and the Role of Social Media during Queensland Floods Information Technology Assignment
13 pages (3408 words) , Download 0 , Assignment
Free
There are high chances that the trend will continue to the level that ICT literacy will be a functional requirement for people’s work, personal and social lives. Globalization coupled with innovative information and communication technologies are affecting various societies in the world and are prompting organizations to re-engineer and re-think the ways they run their operations.
Preview sample
The Impacts of Information Technology on Education Information Technology Literature review
6 pages (1786 words) , Download 1 , Literature review
Free
Information and Communication Technology (ICT) continually transform the ways in which knowledge is passed and the ways in which teachers and students interact in the learning process. Traditional learning methods are increasingly losing the capacity to meet the changing student needs in today’s educational systems.
Preview sample
Advantages and Disadvantages of Improving the Digital Divide Information Technology Literature review
9 pages (2612 words) , Download 1 , Literature review
Free
In today's world where knowledge-intensive activities are considered to be an important element of the economy, the allocation of knowledge across societies is progressively more linked to stratification. The increased dissemination of the internet across societies has led to postulation about the potential effects of the new medium on the population at large.
Preview sample
Internet and Our Information Privacy Information Technology Literature review
9 pages (2801 words) , Download 0 , Literature review
Free
Article 12 of the United Nations Charter defines privacy as the right of an individual to control his or her own individual information. An individual retains the right to reveal or keep such information private. Most nations recognize this as a basic human right, but the internet continues to invade our personal spaces every day.
Preview sample
Debate on Internet Privacy Information Technology Essay
10 pages (2761 words) , Download 0 , Essay
Free
It is easy to collect and disseminate personal information very rapidly than before. It has changed the way people think about the protection of private personal information. There are many technologies handling personal information that is the potential to have a damaging effect on one’s privacy over the internet.
Preview sample
651 - 700 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us